skip to main content
10.1145/3230833.3233281acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

Mission-Centric Risk Assessment to Improve Cyber Situational Awareness

Published: 27 August 2018 Publication History

Abstract

Cyber situational awareness has become increasingly important for proactive risk management to help detect and mitigate cyber attacks. Being aware of the importance of individual information system assets to the goal or mission of the organisation is critical to help minimise enterprise risk. However current risk assessment methodologies do not give explicit support to assess mission related asset criticality. This paper describes ongoing efforts within the H2020 PROTECTIVE project to define a practical mission-centric risk assessment methodology for use across diverse organisation types.

References

[1]
Christopher J. Alberts, Audrey J. Dorofee, James F. Stevens, and Carol Woody. 2001. Introduction to the OCTAVE Approach. Retrieved may 20, 2018 from https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=51546
[2]
Richard A Caralli, James F Stevens, Lisa R Young, and William R Wilson. 2007. Introducing OCTAVE Allegro: Improving the Information Security Risk Assessment Process.
[3]
Protective Consortium. 2018. PROTECTIVE: Proactive Risk Management through Improved Cyber Situational Awareness. Retrieved May 20, 2018 from https://protective-h2020.eu
[4]
J. Dai, X. Sun, P. Liu, and N. Giacobe. 2012. Gaining Big Picture Awareness through an Interconnected Cross-layer Situation Knowledge Reference Model. In IEEE International Conference on Cyber Security ICCS 2012.
[5]
A. K. A. de Medeiros, W. M. P. van der Aalst, and A.J. M. M. Weijters. 2003. Workflow mining: Current status and future directions. On The Move to Meaningful Internet Systems. In Proceedings of CoopIS, DOA, and ODBASE. Rhodes, Greece.
[6]
A. DeAmico, L. Buchanan, J. Goodall, and P. Walczak. 2010. Mission Impact of Cyber Events: Scenarios and Ontology to Express the Relationships between Cyber Assets, Mission and Users. In Fifth International Conference on Information Warfare and Security. Ohio.
[7]
Gerry Dickinson. 2001. Enterprise Risk Management: Its Origins and Conceptual Foundation. Geneva Papers on Risk and Insurance - Issues and Practice 26, 3 (jul 2001), 360--366.
[8]
S. Noel et al. 2011. Analyzing Mission Impacts of Cyber Actions (AMICA). In Proceedings of the Workshop: Assessing Mission Impact of Cyberattacks (NATO IST-128). NATO, Istanbul, Turkey, 80--86.
[9]
X. Chen et al. 2008. Automating network application dependency discovery: Experiences, limitations, and new solutions. In Proceedings of the 8th USENIX conference on Operating systems design and implementation. 117--130.
[10]
M.R. Grimalia and L. W. Fortso. 2007. Towards an Information Asset-Based Defensive Cyber Damage Assessment Process. In IEEE Symposium on Computational Intelligence in Security and Defence Applications. Honolulu.
[11]
J. Guion and M. Reith. 2017. Cyber Terrain Mission Mapping Tools and Methodologies. In Proceedings of the 2017 International Conference on Cyber Conflict (CyCon U.S.). Denver, 21--26.
[12]
W. Heinbockel, S. Noel, and J. Curbo. 2016. Mission Dependency Modeling for Cyber Situational Awareness. In Proceedings of the Cyber Defence Situation Awareness (STO-MP-IST-148). NATO, Sofia, Bulgaria.
[13]
igrafx.com. {n. d.}. iGrafx process modelling tool. Retrieved June 7, 2018 from www.igrafx.com
[14]
ISO. 2011. Information Technology-Security techniques-Information security risk management,.
[15]
G. Jakobson. 2011. Mission Cyber Security Situation Assessment Using Impact Dependency Graphs. In 4th International Conference on Information Fusion. Chicago.
[16]
A. Kott, C. Wang, and R. F. Erbacher. 2014. Cyber Defense and Situational Awareness (1st. ed.). Springer, Switzerland.
[17]
Donald L. Buckshaw, Gregory Parnell, Willard L. Unkenholz, Donald L. Parks, James M. Wallner, and O Saydjari. 2005. Mission Oriented Risk and Design Analysis of Critical Information Systems. 10 (March 2005).
[18]
S. Musman, M. Tanner, A. Temin, M. Elsaesser, and L. Loren. 2011. Computing the Impact of Cyber Attacks on Complex Missions. In Proc. Intl. Systems Conference (SysCon). Montreal.
[19]
NIST. 2011. Managing Information Security Risk. NIST SP 800-39 (March 2011).
[20]
NIST. 2012. Guide for Conducting Risk Assessments - Information Security.
[21]
X. Sun, A. Singhal, and P. Liu. 2015. Who Touched My Mission: Towards probabilistic Mission Impact Assessment. In Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense. Denver, 21--26.
[22]
US-CERT. {n. d.}. Asset Management. https://www.us-cert.gov/sites/default/files/c3vp/crr_resources_guides/CRR_Resource_Guide-AM.pdf
[23]
J. Watters, S. Morrisey, D. Bodeau, and S.C. Powers. 2009. The Risk-to-Mission Assessment Process (RiskMAP): A Sensitivity Analysis and an Extension to Treat Confidentiality Issues. Mitre Corp. Technical Report 09-2994 (2009).

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ARES '18: Proceedings of the 13th International Conference on Availability, Reliability and Security
August 2018
603 pages
ISBN:9781450364485
DOI:10.1145/3230833
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

In-Cooperation

  • Universität Hamburg: Universität Hamburg

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 27 August 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Asset Criticality
  2. Cyber Situational Awareness
  3. Mission Dependency Model
  4. Risk Assessment

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

Conference

ARES 2018

Acceptance Rates

ARES '18 Paper Acceptance Rate 128 of 260 submissions, 49%;
Overall Acceptance Rate 228 of 451 submissions, 51%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)26
  • Downloads (Last 6 weeks)6
Reflects downloads up to 03 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media