A system is called "intrusion resistant", if it, as a whole, continues to adhere to it's predefined rules even in case of a part of the system components violate these rules (accidentally or by malicious intent).

The aim of intrusion resistance is to counter-balance for the consequences of continued operation of an embraced device under violation of normaly system-guaranted assumptions (e.g., forged data, access rights).

more details...