Understanding and Assessment of Mission-Centric Key Cyber Terrains for joint Military Operations

11/13/2021
by   Álvaro Luis Martínez, et al.
0

Since the cyberspace consolidated as fifth warfare dimension, the different actors of the defense sector began an arms race toward achieving cyber superiority, on which research, academic and industrial stakeholders contribute from a dual vision, mostly linked to a large and heterogeneous heritage of developments and adoption of civilian cybersecurity capabilities. In this context, augmenting the conscious of the context and warfare environment, risks and impacts of cyber threats on kinetic actuations became a critical rule-changer that military decision-makers are considering. A major challenge on acquiring mission-centric Cyber Situational Awareness (CSA) is the dynamic inference and assessment of the vertical propagations from situations that occurred at the mission supportive Information and Communications Technologies (ICT), up to their relevance at military tactical, operational and strategical views. In order to contribute on acquiring CSA, this paper addresses a major gap in the cyber defence state-of-the-art: the dynamic identification of Key Cyber Terrains (KCT) on a mission-centric context. Accordingly, the proposed KCT identification approach explores the dependency degrees among tasks and assets defined by commanders as part of the assessment criteria. These are correlated with the discoveries on the operational network and the asset vulnerabilities identified thorough the supported mission development. The proposal is presented as a reference model that reveals key aspects for mission-centric KCT analysis and supports its enforcement and further enforcement by including an illustrative application case.

READ FULL TEXT

page 11

page 16

research
11/02/2017

A Systems Approach for Eliciting Mission-Centric Security Requirements

The security of cyber-physical systems is first and foremost a safety pr...
research
12/05/2017

MISSION AWARE: Evidence-Based, Mission-Centric Cybersecurity Analysis

Currently, perimeter-based approaches are the mainstay of cybersecurity....
research
11/29/2020

Cyber-Physical Security Through Resiliency: A Systems-centric Approach

Cyber-physical systems (CPS) are often defended in the same manner as in...
research
12/08/2021

Smart Support for Mission Success

Today's battlefield environment is complex, dynamic and uncertain, and r...
research
02/18/2021

NATOs Mission-Critical Space Capabilities under Threat: Cybersecurity Gaps in the Military Space Asset Supply Chain

The North Atlantic Treaty Organizations (NATO) public-private Space Asse...
research
06/19/2023

Cyber Key Terrain Identification Using Adjusted PageRank Centrality

The cyber terrain contains devices, network services, cyber personas, an...
research
01/21/2021

Conceptualization and cases of study on cyber operations against the sustainability of the tactical edge

The last decade consolidated the cyberspace as fifth domain of operation...

Please sign up or login with your details

Forgot password? Click here to reset