Abstract
Cyber networks are used extensively by not only a nation’s military to protect sensitive information and execute missions, but also the primary infrastructure that provides services that enable modern conveniences such as education, potable water, electricity, natural gas, and financial transactions. Disruption of any of these services could have widespread impacts not only to citizens’ well-being. As such, these critical services may be targeted by malicious hackers during cyber warfare. Due to the increasing dependence on computers for military and infrastructure purposes, it is imperative to not only protect them and mitigate any immediate or potential threats, but to also understand the current or potential impacts beyond the cyber networks or the organization. This increased dependence means that a cyber attack may not only affect the cyber network, but also other tasks or missions that are dependent upon the network for execution and completion. It is therefore necessary to try to understand the current and potential impacts of cyber effects on the overall mission of a nation’s military, infrastructure, and other critical services. The understanding of the impact is primarily controlled by two processes: state estimation and impact assessment. State estimation is the process of determining the current state of the assets while impact assessment is the process of calculating impact based on the current asset states.
Cleared for public release on 23 Apr 14, #88ABW-2014-1911
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Endsley, Mica R.: Toward a theory of situation awareness in dynamic systems. Hum. Factors J. 37(1), 32–64 (1995)
Salerno, J.: Measuring situation assessment performance through the activities of interest score. In: Proceedings of the 11th International Conference on Information Fusion (2008)
Grimaila, M., Fortson, L.: Towards an information asset-based defensive cyber damage assessment process. In: Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications, (2007)
Muccio, S., Kropa, B.: Cyber Mission Assurance”, http://www.wpafb.af.mil/shared/media/document/AFD-110516-046.pdf
Ben-Bassat, M., Freedy, A.: Knowledge requirements and management in expert decision support systems for (Military) situation assessment. IEEE Trans. Syst. Man Cybern 12(4): 479–490 (1982)
Musman, S., Temin, A., Tanner, M., Fox, D., Pridemore, B.: Evaluating the impact of cyber attacks on missions. Mitre Corp. http://www.mitre.org/work/tech_papers/2010/09_4577/09_4577.pdf
D’Amico, A., Buchanan, L., Goodall, J.: Mission impact of cyber events: scenarios and ontology to express the relationships between cyber assets, missions, and users. In: Proceedings of 5th International Conference on Information Warfare and Security, Wright-Patterson Air Force Base, OH (2010)
Jakobsen, G.: Mission cyber security situation assessment using impact dependency graphs. In: Proceedings of the 14th International Conference on Information Fusion, (2011)
Yang, S.J., Stotz, A., Holsopple, J., Sudit, M., Kuhl, M.: High level information fusion for tracking and projection of multistage cyber attacks. Elsevier Int J Infor Fusion, Spec Issue High-level Inf Fusion Situation Awareness 10(1), 107–121 (2009)
Shafer, G.: A Mathematical Theory of Evidence. Princeton University Press, Princeton (1976)
Holsopple, J., Yang, S.J.: FuSIA: future situation and impact awareness. In: Proceedings of the 11th ISIF/IEEE International Conference on Information Fusion, Cologne, Germany, (2008)
Yager, R.R.: Generalized OWA aggregation operators. Fuzzy Optim. Decis. Making 2, 93–107 (2004)
Snort\(\textregistered \), http://www.snort.org
HP\(\textregistered \) Network Management Center, http://www.hpenterprisesecurity.com/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Holsopple, J., Yang, S.J., Sudit, M. (2015). Mission Impact Assessment for Cyber Warfare. In: Yager, R., Reformat, M., Alajlan, N. (eds) Intelligent Methods for Cyber Warfare. Studies in Computational Intelligence, vol 563. Springer, Cham. https://doi.org/10.1007/978-3-319-08624-8_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-08624-8_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-08623-1
Online ISBN: 978-3-319-08624-8
eBook Packages: EngineeringEngineering (R0)