Measuring the Utility of a Cyber Incident Mission Impact Assessment (CIMIA) Notification Process

نویسندگان

  • Christy Peterson
  • Michael R. Grimaila
  • Robert Mills
  • Michael W. Haas
  • Gina Thomas
  • Doug Kelly
چکیده

Information is a critical asset on which all modern organizations depend to meet their mission objectives. Military organizations, in particular, have embedded Information and Communications Technologies (ICT) into their core mission processes as a means to increase their operational efficiency, exploit automation, improve decision quality, and enable real-time situational awareness. However, an extreme dependence upon ICT results in an environment where a cyber incident can result in severe mission degradation, or possibly failure, with catastrophic consequences to life, limb, and property. In this paper, we present the initial results of an experiment designed to measure the utility of a Cyber Incident Mission Impact Assessment (CIMIA) notification process. CIMIA is focused upon minimizing the consequences following an information incident by maintaining real-time situational awareness of mission critical resources so appropriate contingency actions can be taken in a timely manner to assure mission success. The results of the experiment show that implementing a CIMIA notification process significantly reduced the response time required for subjects to recognize and take proper contingency measures. The research confirms that timely and relevant notification following a cyber incident is an essential element of mission assurance. KeywordsCIMIA, Cyber incident notification, mission assurance, human subjects experiment, contingency planning

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design Considerations for a Cyber Incident Mission Impact Assessment (CIMIA) Process

Virtually all modern organizations have embedded information systems and networking technologies into their core business processes as a means to increase operational efficiency, improve decision making quality, reduce delays, and/or maximize profit. Unfortunately, this dependence can place the organization’s mission at risk when the loss or degradation of the confidentiality, integrity, availa...

متن کامل

Evaluating the Impact of Cyber Attacks on Missions

Using current methods, it is virtually impossible to determine the impact of a cyber attack on the attainment of mission objectives. Do we know which mission elements are affected? Can we continue to operate and fulfill the mission? Should we wait for recovery? Can we salvage part of the mission? Since it is currently so difficult for humans to comprehend the mission impact of a cyber incident,...

متن کامل

Towards Actionable Mission Impact Assessment in the Context of Cloud Computing

Today’s cyber-attacks towards enterprise networks often un­ dermine and even fail the mission assurance of victim net­ works. Mission cyber resilience (or active cyber defense) is critical to prevent or minimize negative consequences to­ wards missions. Without effective mission impact assess­ ment, mission cyber resilience cannot be really achieved. However, there is an overlooked gap between ...

متن کامل

Improving the Relevance of Cyber Incident Notification for Mission Assurance Thesis

ed representation. In the example, an index labeled "DNS" would be a better choice because it is suitable for any IP address. As a result, this means there must be a separate storage location linking the specific IP address to the DNS. Due to the complex operating environment, there are upstream and downstream dependencies between organizations. To make this concept concrete, an organization ca...

متن کامل

Operational Exercise Integration Recommendations for DoD Cyber Ranges

Permission has been given to destroy this document when it is no longer needed. Cyber-enabled and cyber-physical systems connect and engage virtually every mission-critical military capability today. And as more warfighting technologies become integrated and connected, both the risks and opportunities from a cyberwarfare continue to grow—motivating sweeping requirements and investments in cyber...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011