Cyber Mission Assurance Engineering: A Risk-Based, Threat-Informed Approach to Address Advanced Adversaries
ثبت نشده
چکیده
2 Advanced cyber threats present a challenge to established engineering and strategic analysis processes: established processes, to facilitate cost-effective risk management.
منابع مشابه
Harmonizing and Uniting the Key Technical Disciplines for Risk Management of Cyber Security
This paper addresses the need to bridge the cultural, educational, and technical divides that are impeding professionals and organizations engaged in system and software development and associated security problems. In particular, harmonizing and uniting several key technical disciplines (software engineering, computer science, systems engineering) are critical for a sustainable risk management...
متن کاملCyber Resiliency Engineering Overview of the Architectural Assessment Process
With the growing capability, expertise and intent of advanced cyber adversaries, it is no longer realistic to assume that one can successfully keep all adversaries out of a system infrastructure. Therefore, architecture and systems engineering must be based on the assumption that systems or components have been or can be compromised, and that missions and business functions must continue to ope...
متن کاملNetwork Mission Assurance
The doctrine of Network Mission Assurance (NMA) evaluates the value of information assurance and the risk of computer threats based upon their impact on the organizational functions supported by the network. The NMA framework is comprised of four technical functions: Asset Identification, Infrastructure Model and Control, Threat Analysis and Prediction, and Response Coordination. Our research i...
متن کامل19th ICCRTS: C2 Agility: Lessons Learned from Research and Operations Paper 081: Using causal models to manage the cyber threat to C2 agility: working with the benefit of hindsight
The effectiveness and agility of an operation can be compromised through impact of adversary cyber activity on performance of key assets. The agility of adversary activity demands focused and effective investment in cyber security: there is a need for strong awareness of the military impact of threat vectors within the mission landscape, such that cyber security can be managed through a balance...
متن کاملAnalyzing Mission Impacts of Cyber Actions (AMICA)
This paper describes AMICA (Analyzing Mission Impacts of Cyber Actions), an integrated approach for understanding mission impacts of cyber attacks. AMICA combines process modeling, discrete-event simulation, graph-based dependency modeling, and dynamic visualizations. This is a novel convergence of two lines of research: process modeling/simulation and attack graphs. AMICA captures process flow...
متن کامل