Desiging for targeted attacks

referance from
http://hitcon.org/2012/agenda.html

Increase Attacker Expense

Assume Breach
Then minimize dependencies until they’re at a manageable scale

Eliminate Single Points of Failure
Defense in depth is the fault tolerance of security

Emulate Financial Fraud Monitoring
Know what normal looks like, and perform analytics on the abnormal

Automate Recovery
Such as password resets, OS reinstallation and app installation