Measuring the Utility of a Cyber Incident Mission Impact Assessment (CIMIA) Notification Process
نویسندگان
چکیده
Information is a critical asset on which all modern organizations depend to meet their mission objectives. Military organizations, in particular, have embedded Information and Communications Technologies (ICT) into their core mission processes as a means to increase their operational efficiency, exploit automation, improve decision quality, and enable real-time situational awareness. However, an extreme dependence upon ICT results in an environment where a cyber incident can result in severe mission degradation, or possibly failure, with catastrophic consequences to life, limb, and property. In this paper, we present the initial results of an experiment designed to measure the utility of a Cyber Incident Mission Impact Assessment (CIMIA) notification process. CIMIA is focused upon minimizing the consequences following an information incident by maintaining real-time situational awareness of mission critical resources so appropriate contingency actions can be taken in a timely manner to assure mission success. The results of the experiment show that implementing a CIMIA notification process significantly reduced the response time required for subjects to recognize and take proper contingency measures. The research confirms that timely and relevant notification following a cyber incident is an essential element of mission assurance. KeywordsCIMIA, Cyber incident notification, mission assurance, human subjects experiment, contingency planning
منابع مشابه
Design Considerations for a Cyber Incident Mission Impact Assessment (CIMIA) Process
Virtually all modern organizations have embedded information systems and networking technologies into their core business processes as a means to increase operational efficiency, improve decision making quality, reduce delays, and/or maximize profit. Unfortunately, this dependence can place the organization’s mission at risk when the loss or degradation of the confidentiality, integrity, availa...
متن کاملEvaluating the Impact of Cyber Attacks on Missions
Using current methods, it is virtually impossible to determine the impact of a cyber attack on the attainment of mission objectives. Do we know which mission elements are affected? Can we continue to operate and fulfill the mission? Should we wait for recovery? Can we salvage part of the mission? Since it is currently so difficult for humans to comprehend the mission impact of a cyber incident,...
متن کاملTowards Actionable Mission Impact Assessment in the Context of Cloud Computing
Today’s cyber-attacks towards enterprise networks often un dermine and even fail the mission assurance of victim net works. Mission cyber resilience (or active cyber defense) is critical to prevent or minimize negative consequences to wards missions. Without effective mission impact assess ment, mission cyber resilience cannot be really achieved. However, there is an overlooked gap between ...
متن کاملImproving the Relevance of Cyber Incident Notification for Mission Assurance Thesis
ed representation. In the example, an index labeled "DNS" would be a better choice because it is suitable for any IP address. As a result, this means there must be a separate storage location linking the specific IP address to the DNS. Due to the complex operating environment, there are upstream and downstream dependencies between organizations. To make this concept concrete, an organization ca...
متن کاملOperational Exercise Integration Recommendations for DoD Cyber Ranges
Permission has been given to destroy this document when it is no longer needed. Cyber-enabled and cyber-physical systems connect and engage virtually every mission-critical military capability today. And as more warfighting technologies become integrated and connected, both the risks and opportunities from a cyberwarfare continue to grow—motivating sweeping requirements and investments in cyber...
متن کامل