Design Considerations for a Cyber Incident Mission Impact Assessment (CIMIA) Process

نویسندگان

  • Michael R. Grimaila
  • Larry Fortson
  • Janet Sutton
چکیده

Virtually all modern organizations have embedded information systems and networking technologies into their core business processes as a means to increase operational efficiency, improve decision making quality, reduce delays, and/or maximize profit. Unfortunately, this dependence can place the organization’s mission at risk when the loss or degradation of the confidentiality, integrity, availability, nonrepudiation, or authenticity of a critical information resource or flow occurs. In this paper, we motivate design considerations for an information asset-based, Cyber Incident Mission Impact Assessment (CIMIA) process whose goal is to provide decision makers with timely notification and relevant impact assessment, in terms of mission objectives, from the time an information incident is declared, until the incident is fully remediated. Keywordssituational awareness; cyber damage assessment; mission impact assessment

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Measuring the Utility of a Cyber Incident Mission Impact Assessment (CIMIA) Notification Process

Information is a critical asset on which all modern organizations depend to meet their mission objectives. Military organizations, in particular, have embedded Information and Communications Technologies (ICT) into their core mission processes as a means to increase their operational efficiency, exploit automation, improve decision quality, and enable real-time situational awareness. However, a...

متن کامل

Evaluating the Impact of Cyber Attacks on Missions

Using current methods, it is virtually impossible to determine the impact of a cyber attack on the attainment of mission objectives. Do we know which mission elements are affected? Can we continue to operate and fulfill the mission? Should we wait for recovery? Can we salvage part of the mission? Since it is currently so difficult for humans to comprehend the mission impact of a cyber incident,...

متن کامل

Operational Exercise Integration Recommendations for DoD Cyber Ranges

Permission has been given to destroy this document when it is no longer needed. Cyber-enabled and cyber-physical systems connect and engage virtually every mission-critical military capability today. And as more warfighting technologies become integrated and connected, both the risks and opportunities from a cyberwarfare continue to grow—motivating sweeping requirements and investments in cyber...

متن کامل

Towards Actionable Mission Impact Assessment in the Context of Cloud Computing

Today’s cyber-attacks towards enterprise networks often un­ dermine and even fail the mission assurance of victim net­ works. Mission cyber resilience (or active cyber defense) is critical to prevent or minimize negative consequences to­ wards missions. Without effective mission impact assess­ ment, mission cyber resilience cannot be really achieved. However, there is an overlooked gap between ...

متن کامل

Analyzing Mission Impacts of Cyber Actions (AMICA)

This paper describes AMICA (Analyzing Mission Impacts of Cyber Actions), an integrated approach for understanding mission impacts of cyber attacks. AMICA combines process modeling, discrete-event simulation, graph-based dependency modeling, and dynamic visualizations. This is a novel convergence of two lines of research: process modeling/simulation and attack graphs. AMICA captures process flow...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009