31
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      MISSION AWARE: Evidence-Based, Mission-Centric Cybersecurity Analysis

      Preprint
      , , ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Currently, perimeter-based approaches are the mainstay of cybersecurity. While this paradigm is necessary, there is mounting evidence of its insufficiency with respect to sophisticated and coordinated attacks. In contrast to perimeter-based security, mission-centric cybersecurity provides awareness of how attacks can influence mission success and therefore focuses resources for mitigating vulnerabilities and protecting critical assets. This is strategic as opposed to tactical perimeter-based cybersecurity. We propose MISSION AWARE, which assists in the identification of parts of a system that destabilize the overall mission of the system if compromised. MSSION AWARE starts with a structured elicitation process that leads to hazards analysis. It employs hierarchical modeling methods to capture mission requirements, admissible functional behaviors, and system architectures. It then generates evidence---attacks applicable to elements that directly correlate with mission success. Finally, MISSION AWARE traces evidence back to mission requirements to determine the evidence with the highest impact relative to mission objectives.

          Related collections

          Most cited references6

          • Record: found
          • Abstract: not found
          • Article: not found

          A survey on the usability and practical applications of Graphical Security Models

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            A System-Aware Cyber Security architecture

              Bookmark
              • Record: found
              • Abstract: not found
              • Conference Proceedings: not found

              Model-Based Cybersecurity Assessment with NESCOR Smart Grid Failure Scenarios

                Bookmark

                Author and article information

                Journal
                04 December 2017
                Article
                1712.01448
                f4b1e1ab-9f64-4385-966a-bdbc85a205a0

                http://arxiv.org/licenses/nonexclusive-distrib/1.0/

                History
                Custom metadata
                cs.CR

                Comments

                Comment on this article