Network Mission Assurance

نویسندگان

  • Michael F. Junod
  • Patrick A. Muckelbauer
  • James E. Denny
چکیده

The doctrine of Network Mission Assurance (NMA) evaluates the value of information assurance and the risk of computer threats based upon their impact on the organizational functions supported by the network. The NMA framework is comprised of four technical functions: Asset Identification, Infrastructure Model and Control, Threat Analysis and Prediction, and Response Coordination. Our research in support of the NMA investigates technical solutions for trust-based resource control, reflective and reconfigurable network services, autonomic network defense, and cyber-attack representation. We contend that NMA unifies the purpose and function of separate information assurance programs into a holistic, network-centric solution.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mission Assurance as a Function of Scale

Since all Department of Defense (DoD) missions depend on cyber assets and capabilities, a dynamic and accurate cyber dependency analysis is a critical component of mission assurance. Mission analysis aims to identify hosts and applications that are “mission critical” so they can be monitored, and resources preferentially allocated to mitigate risks. For missions limited in duration and scale (t...

متن کامل

4 Th Iccrts: C2 and Agility " Mission Assurance in a Distributed Environment " Topic 7: C2 Assessment Tools and Metrics Mission Assurance in a Distributed Environment

The increased use of machine assistance has opened new doors for adversaries to thwart coalition planning processes and systems using the next generation of sophisticated cyber exploits. These new attack vectors, aimed directly at our core mission-essential systems, will not close during normal operations and will require Command and Control (C2) planners to operate in contested environments re...

متن کامل

Data and Applications Security Workshop Report Dates : February 19 and 20 , 2009 Prepared by The University of Texas at Dallas Sponsor : The National Science Foundation Under Grant : IIS - 0748433

The Office of the Deputy Assistant Secretary of Defense (Information and Identity Assurance) has stated that “the Department of Defense's (DoD) policy, planning, and war fighting capabilities are heavily dependent on the information technology foundation provided by the Global Information Grid (GIG). However, the GIG was built for business efficiency instead of mission assurance against sophist...

متن کامل

Mission Assurance Challenges within the Military Environment

Virtually all modern organizations have embedded information and communication technologies into their core processes as a means to increase operational efficiency, improve decision quality, and reduce operational costs. However, this dependence can place the organizational mission at risk when an incident occurs that compromises a cyber resource critical to the success of the organizational mi...

متن کامل

Resilient Cyber Ecosystems Cyber Mission Resilience Mission Assurance in the Cyber Ecosystem

Cyber Mission Resilience (CMR) is a significant step in the evolution of IT security. Not only does it reduce the complexity and cost of securing today’s IT systems, it helps prioritize security-related activities. The focus on mission resilience extends the scope of past security practices while simultaneously honing in on mission-critical systems, networks, and processes. This article explore...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003