Mission Impact: Role of Protection of Information Systems

被引:31
作者
Anderson, Evan [1 ]
Choobineh, Joobin [1 ]
Fazen, Michael [1 ]
Grimaila, Michael [2 ]
机构
[1] Texas A&M Univ, College Stn, TX 77843 USA
[2] US Air Force, Inst Technol, Wright Patterson AFB, OH 45433 USA
来源
PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY | 2010年
关键词
Information security management; mission modeling; security models; BPMN;
D O I
10.1145/1822348.1822349
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Use of information technology (IT) hardware and software has become an integral component in the execution of modern combat operations. However, the use of this technology in support of military operations is constantly subject to adversarial threats. Confidentiality, Integrity, Availability, and Other (CIAO) breaches of information can adversely affect the outcome of military operations. In order to enable the quantification of the effect of these breaches, we model military operations using Business Process Modeling Notation (BPMN). Operations are represented as process models as a set of interconnected activities. Each of the activities of a mission is analyzed to identify dependencies on the underlying information technology (IT) resources. IT resources are in turn protected by protector resources. The dependencies are represented using two dependency matrices. One matrix represents the dependency of military activities on information resources. The other matrix represents the dependency of information resources on their protecting resources. Based on one of the author's actual combat experience, we present a hypothetical, but realistic, military operation. For this operation we develop the following: 1) a BPMN representation of the operation from the Receipt of Operations Order (military term for the start of the mission) to the Change of Mission (military term for the end of the operation), 2) the list of information resources that are needed to support the activities of the operation, 3) the list of the protectors for these information resources, 4) the dependency matrix between the components of the activities of the BPMN and the information resources, and 5) the dependency matrix between the information resources and their protectors. We will discuss the impact of CIAO breaches by tracing the chain of affects on the information resources, the activities, and eventually the outcome of the operation itself.
引用
收藏
页码:1 / 15
页数:15
相关论文
共 14 条
[1]  
*AFDD, 2005, 25 AFDD
[2]  
ANDERSON E, 2005, P 38 ANN HAW INT C H, P186
[3]  
[Anonymous], 2008, BUS PROC MOD NOT
[4]  
Fenz S, 2009, LECT NOTES COMPUT SC, V5701, P113, DOI 10.1007/978-3-642-03848-8_9
[5]  
FORTSON LW, 2007, P 2007 INT C INF WAR
[6]  
GRIMAILA MR, 2008, P 2008 INT COMM CONT, P17
[7]  
NEILSONT NT, 2008, MICROGUIDE PROCESS M
[8]  
Pavlovski C.J., 2008, Proceedings of the fifth Asia-Pacific conference on Conceptual Modelling-, V79, P103
[9]  
*US JOINT FORC COM, 2006, JOINT PUBL US JOINT, V50
[10]  
*US JOINT FORC COM, 2008, JOINT PUBL US JOINT, V30