VisTrails: visualization meets data management
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Taverna: lessons in creating a workflow environment for the life sciences: Research Articles
Concurrency and Computation: Practice & Experience - Workflow in Grid Systems
Fortification of IT Security by Automatic Security Advisory Processing
AINA '08 Proceedings of the 22nd International Conference on Advanced Information Networking and Applications
Improving the cyber incident mission impact assessment (CIMIA) process
Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead
Business Process-Based Resource Importance Determination
BPM '09 Proceedings of the 7th International Conference on Business Process Management
CAMUS: automatically mapping cyber assets to missions and users
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Hi-index | 0.00 |
Virtually all modern organizations have embedded information and communication technologies into their core processes as a means to increase operational efficiency, improve decision quality, and reduce operational costs. However, this dependence can place the organizational mission at risk when an incident occurs that compromises a cyber resource critical to the success of the organizational mission. In this paper, the authors examine the challenges of developing and maintaining a mission-wide understanding of organizational mission risk within military environments. Specifically, they examine the concept of mission assurance, discuss various factors which must be taken into account when describing military missions, analyze the four primary types of representations used to capture mission-to-cyber relationships, and highlight the complexities of documenting cyber dependencies for the purpose of achieving mission assurance.