Adapting C 2 to the 21 st Century Applying a Generic Security Risk Model to the Information Operations Planning Process
نویسنده
چکیده
This paper describes work done in response to a commission from the Ministry of Defence DEC ISTAR office, on behalf of the MoD Directorate of Targeting and Information Operations. The overall requirement was to provide guidance to Information Operations staff both in the UK and in theatre. The objectives of the particular work package discussed in this paper were: to assess the suitability of a generic security risk assessment model for reengineering into an information operations planning tool; if found suitable, to express that re-engineered model as help-file texts for use in theatre by Information Operations staff. This paper describes the results of that work package. A causal risk chain of the form threat→vulnerability→impact was re-engineered into a set of operational planning procedures, expressed in terms of effects-based operations. These procedures were expressed as help-file texts in a prototype tool which MoD is now evaluating for use by Information Operations planners. The paper explains the reasoning behind this re-engineering, and the paper’s appendix consists of relevant extracts from the tool’s help-file texts.
منابع مشابه
Mapping of McGraw Cycle to RUP Methodology for Secure Software Developing
Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...
متن کاملInsurer Optimal Asset Allocation in a Small and Closed Economy: The Case of Iran’s Social Security Organization
We seek to determine the optimal amount of the insurer’s investment in all types of assets for a small and closed economy. The goal is to detect the implications and contributions the risk seeker and risk aversion insurer commonly make and the effectiveness in the investment decision. Also, finding the optimum portfolio for each is the main goal of the present study. To this end, we adopted the...
متن کاملبهبود رتبه بندی مخاطرات امنیت اطلاعات با استفاده از مدل های تصمیم گیری چند شاخصه
One of the most important capabilities of information security management systems, which must be implemented in all organizations according to their requirements, is information security risk management. The application of information security risk management is so important that it can be named as the heart of information security management systems. Information security risk rating is conside...
متن کاملنظریۀ شایستگیهای کانونی: الگویی برای برنامهریزی آموزش علم اطلاعات و دانششناسی
Purpose: The aim of this study was to evaluate competency-based training concepts, introduce core competencies and to apply these concepts as a conceptual model for knowledge and information science education in Iran. Methodology: This research conducted with the documentary-analytical method. The literature review on the competencies of the required specialties in knowledge and information ...
متن کاملCAMAC: a context-aware mandatory access control model
Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007