Visualization as an aid for assessing the mission impact of information security breaches

被引:0
|
作者
D'Amico, A
Salas, S
机构
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
One of the objectives of the DARPA Phase 2 SBIR project entitled "Visual Representation of Cyber Defense Situational Awareness" was to prototype 3-D visual representations of mission impact of information security events. Secure Decisions, a Division of Applied Visions Inc., prototyped several mission impact visual displays, and incorporated the most promising ones into a visualization software architecture called SecureScope(TM) that can be deployed in an operational setting. The mission impact visualization system can interface to any common relational database that links IA events to the cyber assets (e.g. workstations, data files) on which those events occur, and includes relationships about the organization's mission-critical tasks that depend on those assets. It visually represents "bottom-up" mission impact analyses showing the mission effect of a specific breach on a, specific asset, as well as, "top down" analyses showing which cyber assets must be secured for supporting the achievement of certain mission-critical tasks.
引用
收藏
页码:190 / 195
页数:6
相关论文
共 50 条
  • [21] Modeling and Assessing the Impact of Security Attacks on Enterprise Information Systems
    Djemaiel, Yacine
    Boudriga, Noureddine
    BUSINESS INFORMATION SYSTEMS WORKSHOPS (BIS 2014), 2014, 183 : 281 - 292
  • [22] Military Aid and Human Rights: Assessing the Impact of US Security Assistance Programs
    Omelicheva, Mariya
    Carter, Brittnee
    Campbell, Luke B.
    POLITICAL SCIENCE QUARTERLY, 2017, 132 (01) : 119 - 144
  • [23] Impact of reporting information security breaches, accounting quality, and the opportunistic disclosure of good news and bad news
    Garg, Mukesh
    Wang, Tawei
    Wilkin, Carla L.
    INTERNATIONAL JOURNAL OF ACCOUNTING INFORMATION SYSTEMS, 2025, 56
  • [24] The Economic Impact of Privacy Violations and Security Breaches A Laboratory Experiment
    Nofer, Michael
    Hinz, Oliver
    Muntermann, Jan
    Rossnagel, Heiko
    BUSINESS & INFORMATION SYSTEMS ENGINEERING, 2014, 6 (06): : 339 - 348
  • [25] Cheating in OSCEs: The Impact of Simulated Security Breaches on OSCE Performance
    Gotzmann, Andrea
    De Champlain, Andre
    Homayra, Fahmida
    Fotheringham, Alexa
    de Vries, Ingrid
    Forgie, Melissa
    Pugh, Debra
    TEACHING AND LEARNING IN MEDICINE, 2017, 29 (01) : 52 - 58
  • [26] Blame Distribution Following Information Security Breaches Emergent Research Forum
    Miller, Andrew S.
    Marett, Kent
    AMCIS 2018 PROCEEDINGS, 2018,
  • [27] Analytical Techniques for Decision Making on Information Security for Big Data Breaches
    Albeshri, Aiiad
    Thayananthan, Vijey
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY & DECISION MAKING, 2018, 17 (02) : 527 - 545
  • [28] The Association between Top Management Involvement and Compensation and Information Security Breaches
    Kwon, Juhee
    Ulmer, Jackie Rees
    Wang, Tawei
    JOURNAL OF INFORMATION SYSTEMS, 2013, 27 (01) : 219 - 236
  • [29] Visualization of information security management processes
    Miloslavskaya N.G.
    Tolstoy A.I.
    1600, National Research Nuclear University (09): : 117 - 136
  • [30] The Economic Impact of Security Breaches on Publicly Traded Corporations: An Empirical Investigation
    Cardenas, Jesus
    Coronado, Adolfo S.
    Nicholas-Donald, Aurelia
    Parra, Fernando
    Mahmood, M. Adam
    AMCIS 2012 PROCEEDINGS, 2012,