2017
DOI: 10.48550/arxiv.1712.01448
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

MISSION AWARE: Evidence-Based, Mission-Centric Cybersecurity Analysis

Georgios Bakirtzis,
Bryan T. Carter,
Cody H. Fleming
et al.

Abstract: Currently, perimeter-based approaches are the mainstay of cybersecurity. While this paradigm is necessary, there is mounting evidence of its insufficiency with respect to sophisticated and coordinated attacks. In contrast to perimeterbased security, mission-centric cybersecurity provides awareness of how attacks can influence mission success and therefore focuses resources for mitigating vulnerabilities and protecting critical assets. This is strategic as opposed to tactical perimeter-based cybersecurity. We p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…al. 2016), automotive (Placke Duo 2015), port security (Williams 2015), and cyber security (Bakirtzis, et. al.…”
Section: Discussionmentioning
confidence: 99%
“…al. 2016), automotive (Placke Duo 2015), port security (Williams 2015), and cyber security (Bakirtzis, et. al.…”
Section: Discussionmentioning
confidence: 99%
“…Design assurance of safety and security carry to the runtime domain, creating a shared responsibility for reducing the risk during deployment. These emerging methods include dynamic safety management [23], DepDevOps (dependable development operations continuum) [3], systematic safety and security assessment processes such as STPA (system theoretic process analysis) and STAMP (systems-theoretic accident model and processes), and MissionAware [2].…”
Section: Introductionmentioning
confidence: 99%
“…(1) what to monitor, (2) where to monitor, and (3) context of the monitoring. Our work addresses the gap between safety analysis and runtime monitor formulation.…”
Section: Introductionmentioning
confidence: 99%