Visualization as an aid for assessing the mission impact of information security breaches

被引:0
|
作者
D'Amico, A
Salas, S
机构
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
One of the objectives of the DARPA Phase 2 SBIR project entitled "Visual Representation of Cyber Defense Situational Awareness" was to prototype 3-D visual representations of mission impact of information security events. Secure Decisions, a Division of Applied Visions Inc., prototyped several mission impact visual displays, and incorporated the most promising ones into a visualization software architecture called SecureScope(TM) that can be deployed in an operational setting. The mission impact visualization system can interface to any common relational database that links IA events to the cyber assets (e.g. workstations, data files) on which those events occur, and includes relationships about the organization's mission-critical tasks that depend on those assets. It visually represents "bottom-up" mission impact analyses showing the mission effect of a specific breach on a, specific asset, as well as, "top down" analyses showing which cyber assets must be secured for supporting the achievement of certain mission-critical tasks.
引用
收藏
页码:190 / 195
页数:6
相关论文
共 50 条
  • [1] Visualization as an aid for assessing the mission impact of information security breaches
    D'Amico, A
    Salas, S
    DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL II, PROCEEDINGS, 2003, : 18 - 20
  • [2] Methods of visualizing temporal patterns in and mission impact of computer security breaches
    D'Amico, A
    Larkin, M
    DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS, 2001, : 343 - 351
  • [3] Assessing liability arising from information security breaches in data privacy
    Mitrakas, Andreas
    INTERNATIONAL DATA PRIVACY LAW, 2011, 1 (02) : 129 - 136
  • [4] The impact of information security breaches: Has there been a downward shift in costs?
    Gordon, Lawrence A.
    Loeb, Martin P.
    Zhou, Lei
    JOURNAL OF COMPUTER SECURITY, 2011, 19 (01) : 33 - 56
  • [5] ASSESSING THE CAUSAL IMPACT OF HUMANITARIAN AID ON FOOD SECURITY
    Cerda-Bautista, Jordi
    Maria Tarraga, Jose
    Sitokonstantinou, Vasileios
    Camps-Valls, Gustau
    IGARSS 2024-2024 IEEE INTERNATIONAL GEOSCIENCE AND REMOTE SENSING SYMPOSIUM, IGARSS 2024, 2024, : 1546 - 1552
  • [6] Information security breaches and IT security investments: Impacts on competitors
    Jeong, Christina Y.
    Lee, Sang-Yong Tom
    Lim, Jee-Hae
    INFORMATION & MANAGEMENT, 2019, 56 (05) : 681 - 695
  • [7] The impact of audit firms' characteristics on audit fees following information security breaches
    Yen, Ju-Chun
    Lim, Jee-Hae
    Wang, Tawei
    Hsu, Carol
    JOURNAL OF ACCOUNTING AND PUBLIC POLICY, 2018, 37 (06) : 489 - 507
  • [8] Quantifying the financial impact of IT security breaches
    Garg, Ashish
    Curtis, Jeffrey
    Halper, Hilary
    Information Management and Computer Security, 2003, 11 (2-3): : 74 - 83
  • [9] Peer governance effects of information security breaches
    Wang, Jiaxin
    Wu, Zhifeng
    Yuan, Xue
    Song, Zilong
    ENERGY ECONOMICS, 2024, 129
  • [10] Financial Impact of Information Security Breaches on Breached Firms and their Non-Breached Competitors
    Zafar, Humayun
    Ko, Myung S.
    Osei-Bryson, Kweku-Muata
    INFORMATION RESOURCES MANAGEMENT JOURNAL, 2012, 25 (01) : 21 - 37