Title :
Computing the impact of cyber attacks on complex missions
Author :
Musman, Scott ; Tanner, Mike ; Temin, Aaron ; Elsaesser, Evan ; Loren, Lewis
Author_Institution :
MITRE Corp., McLean, VA, USA
Abstract :
This paper describes how to evaluate the impact of a cyber attack on a mission. We accomplish this by computing impact as the changes to mission measures of effectiveness, based on the reported effects of a known or suspected attack on one or more parts of the information technology (IT) supporting the mission. Our previous papers have described our goals for computing mission impact and the choices of the techniques we use for modeling missions, IT, and cyber attacks. This paper focuses on how we compute the impact of cyber attacks on IT processes and information. These computations will improve decision-making when under cyber attack by providing accurate and detailed assessments of the impact of those attacks. Although the focus of our work has been on the calculation of cyber mission impacts during mission execution, we have also demonstrated how our representations and computations can be used for performing cyber risk analysis and crown jewels analysis.
Keywords :
risk analysis; security of data; IT processes; complex missions; crown jewels analysis; cyber attacks impact; cyber mission impacts; cyber risk analysis; decision-making; information technology; suspected attack; Atmospheric modeling; Business; Computational modeling; Degradation; Fabrication; Generators; Software; business process modeling; cyber effects; impact assessment; mission assurance; mission impact; simulation;
Conference_Titel :
Systems Conference (SysCon), 2011 IEEE International
Conference_Location :
Montreal, QC
Print_ISBN :
978-1-4244-9494-1
DOI :
10.1109/SYSCON.2011.5929055