DocumentCode :
2716973
Title :
Towards an Information Asset-Based Defensive Cyber Damage Assessment Process
Author :
Grimaila, Michael R. ; Fortson, Larry W.
Author_Institution :
Center for Inf. Security Educ. & Res., Air Force Inst. of Technol.
fYear :
2007
fDate :
1-5 April 2007
Firstpage :
206
Lastpage :
212
Abstract :
The use of computers and communication technologies to enhance command and control (C2) processes has yielded enormous benefits in military operations. Commanders are able to make higher quality decisions by accessing a greater number of information resources, obtaining more frequent updates from their information resources, and by correlation between, and across, multiple information resources to reduce uncertainty in the battlespace. However, these benefits do not come without a cost. The reliance on technology results in significant operational risk that is often overlooked and is frequently underestimated. In this research-in-progress paper, we discuss our initial findings in our efforts to improve the defensive cyber battle damage assessment process within US Air Force networks. We have found that the lack of a rigorous, well-documented, information asset-based risk management process results in significant uncertainty and delay when assessing the impact of an information incident.
Keywords :
command and control systems; information resources; risk management; US Air Force networks; battlespace; command and control processes; cyber battle damage assessment process; defensive cyber damage assessment process; information asset evaluation; information asset-based risk management process; information dependency; information resources; military operations; operational risk; situational awareness; Command and control systems; Computational intelligence; Decision making; Degradation; Delay; Information resources; Information security; Military computing; Risk management; Uncertainty; command and control; information asset valuation; information dependency; situational awareness;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computational Intelligence in Security and Defense Applications, 2007. CISDA 2007. IEEE Symposium on
Conference_Location :
Honolulu, HI
Print_ISBN :
1-4244-0700-1
Type :
conf
DOI :
10.1109/CISDA.2007.368155
Filename :
4219102
Link To Document :
بازگشت