2013
DOI: 10.1007/978-3-642-45330-4_14
|View full text |Cite
|
Sign up to set email alerts
|

Mission-Based Analysis for Assessing Cyber Risk in Critical Infrastructure Systems

Abstract: Adversaries with the appropriate expertise and access can potentially exploit the large attack surface provided by the cyber component of critical infrastructure assets to target operations across the various sectors and significantly impact society. This paper describes a family of cyber risk methodologies known as "mission-based analysis" (MBA) that assist system designers in identifying the threats that pose the highest risk to mission execution and in prioritizing mitigation actions against the threats. Th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
3
2

Relationship

3
6

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 7 publications
0
6
0
Order By: Relevance
“…In CyMRisk, after an initial SME preparatory step, the rest of the steps occur in an automated fashion. We briefly summarize the approach here; see [2], [3] for details. To seed the process, SMEs consider the different types of cyber nodes in a target architecture.…”
Section: Loe Scoring Approachmentioning
confidence: 99%
See 1 more Smart Citation
“…In CyMRisk, after an initial SME preparatory step, the rest of the steps occur in an automated fashion. We briefly summarize the approach here; see [2], [3] for details. To seed the process, SMEs consider the different types of cyber nodes in a target architecture.…”
Section: Loe Scoring Approachmentioning
confidence: 99%
“…To motivate the rationale for CyMRisk, we begin by introducing an example of a mission-cyber risk analysis methodology that could leverage CyMRisk called Mission Information Risk Analysis (MIRA) [2], [3]. One can regard MIRA as an instance of the risk framework developed by the National Standards of Standards and Technology (NIST) [4].…”
Section: Introductionmentioning
confidence: 99%
“…We therefore suggest caution in interpreting results from such assessments because the number of unknown vulnerabilities in large-scale software tends to exceed known vulnerabilities, and we furthermore suggest risk assessment methodologies should consider both known and unknown vulnerabilities, something not commonly done today, though there are exceptions. For example, as part of the risk analysis process, MIRA [30] hypothesizes the existence of latent vulnerabilities and analyzes their potential effects. The findings also support the concept that mission resilience to cyber attack should be nurtured and explored, as preventioncentric mitigation strategies are inherently disadvantaged given that latent vulnerabilities lie in wait for adversaries.…”
Section: A Conclusionmentioning
confidence: 99%
“…Wheat and rice alone account for almost half of the world's serial production. The third example relates to technical infrastructure (Kröger, 2008;Llanso, 2013) 13 . Human activities have become more and more interconnected and mutually dependent.…”
Section: Type 1: System Breakdown Risks (Including Cyber-risks)mentioning
confidence: 99%