2017
DOI: 10.1177/1548512917707077
|View full text |Cite
|
Sign up to set email alerts
|

Prioritizing investment in military cyber capability using risk analysis

Abstract: Defense capability planning traditionally uses scenario-based war-gaming to support force design decision making and to prioritize investment. Some aspects of cyber warfare are problematic for war-gaming, such as poor characterization of cyber effects and difficulty estimating the true capability of own and opposing forces. In addition, strategic-level assessments typically draw on the expert judgment of senior officers, whose tactical experience likely precedes cyber warfare, and this will limit their intuiti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…Despite their argument that scenario-based modeling may be inadequate for cyber warfare applications, Rowe et al [99] employed Monte Carlo sampling to estimate the proportion of different types of attacks that were expected to be successful.…”
Section: A Uncertaintymentioning
confidence: 99%
See 1 more Smart Citation
“…Despite their argument that scenario-based modeling may be inadequate for cyber warfare applications, Rowe et al [99] employed Monte Carlo sampling to estimate the proportion of different types of attacks that were expected to be successful.…”
Section: A Uncertaintymentioning
confidence: 99%
“…Filinkov and Dortmans [101] stated that scenario-based analyses tend to focus on generic conflicts that may arise, but would likely be better focused on identifying and mitigating the conditions that give rise to these conflicts. Rowe et al [99] argued that scenario-based modeling isn't well suited to address cyber warfare problems and proposed risk-based analysis as a suitable alternative. Despite these criticisms, scenario-based approaches are by far the most common approach to address uncertainty.…”
Section: A Uncertaintymentioning
confidence: 99%
“…Decision makers must decide, based on their particular organisation's threat profile, where it should invest including, of course, other considerations such as capital, training and ongoing maintenance costs etc. Refer to [44] for more details of this step.…”
Section: Security-in-depth For Managing Insider Threatsmentioning
confidence: 99%
“…In the remainder of the paper, we address these issues through the use of a risk-based framework called Security-in-Depth (SiD) [40]. SiD was originally developed to support investment decisions in the physical security domain [41], [42], but was then extended and applied to address all national security threat types [43] and more recently to explore Defence's needs in building cyber security capability [44].…”
Section: Introductionmentioning
confidence: 99%
“…In the remainder of the paper, we address these issues using a risk-based framework which we have called Security-in-Depth (SiD) [46]. SiD was originally developed to support investment decisions in the physical security domain [47,48], but was then extended and applied to address all national security threat types [32] and to explore Defence's needs in building cyber security capabilities [49]. We begin by providing a brief introduction to the SiD approach, and then apply it to a case study example where we take the role of the security manager of a hypothetical organisation tasked with improving the security against insider threats with a limited budget.…”
Section: Introductionmentioning
confidence: 99%