Serveur d'exploration Cyberinfrastructure

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

The Role of Modeling in the Resilience of Cyberinfrastructure Systems and Preparedness for Cyber Intrusions

Identifieur interne : 000156 ( Istex/Checkpoint ); précédent : 000155; suivant : 000157

The Role of Modeling in the Resilience of Cyberinfrastructure Systems and Preparedness for Cyber Intrusions

Auteurs : Clyde G. Chittister [États-Unis] ; Yacov Y. Haimes

Source :

RBID : ISTEX:729DCF601F71C52CC0CD39130AE1B7C048B1A344

Abstract

The personal computer, and cyber technology in general, opens the doors to the world. Unless an organization can cultivate the flexibility to adapt its processes to the demands of this new technology, it could diminish its capability to execute effective protective and responsive countermeasures against malevolent or unwanted cyber intrusion. In this paper, we define and use the term cyberinfrastructure system to connote a generalized complex, large-scale cyberinfrastructure network that includes hardware, software, organizational policies and procedures, and that is connected to the Internet (e.g., by means of telephone lines, wireless devices, and high-speed technology). Following a malevolent cyber attack, the original cyberinfrastructure security model could have been (unbeknownst to the system’s operators) perturbed and changed, not by its designers, but by adversaries. In other words, the road-map design of the cyberinfrastructure system, which connotes the policies, procedures, methods, connections, and other human and organizational activities that define the functionality of the cyberinfrastructure system, could have been changed following a malevolent cyber attack. Resilience of a cyberinfrastructure system, which is central to its security, is defined as the ability of the system to withstand a major disruption within acceptable degradation parameters and to recover within an acceptable composite cost and time. The central role of systems integration in cyber security is highlighted because it not only connotes the integration of components, but also involves an understanding of the functionality that emerges from that integration. Systems modeling is indispensable in developing awareness when a cyberinfrastructure is intruded and is being violated. Cyberinfrastructure security is essentially multidimensional and of multi-scale compositions—from molecular to macro dimensions—and its wholeness is characterized by multiple and varied paths of interdependence. Thus, this paper advocates a holistic approach as requisite to understanding not only its myriad parts and functionality but also the forced changes imposed upon it both from within and without its domains. Furthermore, models can play a central role in intrusion detection, thus enabling information managers to develop protective and remedial courses of action. They can also be used to answer a wide range of questions, including how to deceive would-be intruders and lead them to believe they are inflicting damage on the real intended system. Through logically organized and systemically executed models, the Phantom System Models (PSM) laboratory, introduced in Section I, is aimed at providing a reasoned experimental modeling framework with which to explore and thus understand the intricate relationships that characterize the nature of multi-scale emergent systems.

Url:
DOI: 10.2202/1547-7355.1577


Affiliations:


Links toward previous steps (curation, corpus...)


Links to Exploration step

ISTEX:729DCF601F71C52CC0CD39130AE1B7C048B1A344

Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">The Role of Modeling in the Resilience of Cyberinfrastructure Systems and Preparedness for Cyber Intrusions</title>
<author>
<name sortKey="Chittister, Clyde G" sort="Chittister, Clyde G" uniqKey="Chittister C" first="Clyde G" last="Chittister">Clyde G. Chittister</name>
</author>
<author>
<name sortKey="Haimes, Yacov Y" sort="Haimes, Yacov Y" uniqKey="Haimes Y" first="Yacov Y." last="Haimes">Yacov Y. Haimes</name>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:729DCF601F71C52CC0CD39130AE1B7C048B1A344</idno>
<date when="2011" year="2011">2011</date>
<idno type="doi">10.2202/1547-7355.1577</idno>
<idno type="url">https://api.istex.fr/document/729DCF601F71C52CC0CD39130AE1B7C048B1A344/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">000000</idno>
<idno type="wicri:Area/Istex/Curation">000000</idno>
<idno type="wicri:Area/Istex/Checkpoint">000156</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">The Role of Modeling in the Resilience of Cyberinfrastructure Systems and Preparedness for Cyber Intrusions</title>
<author>
<name sortKey="Chittister, Clyde G" sort="Chittister, Clyde G" uniqKey="Chittister C" first="Clyde G" last="Chittister">Clyde G. Chittister</name>
<affiliation wicri:level="4">
<country>États-Unis</country>
<placeName>
<settlement type="city">Pittsburgh</settlement>
<region type="state">Pennsylvanie</region>
</placeName>
<orgName type="university">Université Carnegie-Mellon</orgName>
</affiliation>
</author>
<author>
<name sortKey="Haimes, Yacov Y" sort="Haimes, Yacov Y" uniqKey="Haimes Y" first="Yacov Y." last="Haimes">Yacov Y. Haimes</name>
<affiliation>
<wicri:noCountry code="no comma">University of Virginia</wicri:noCountry>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="j">Journal of Homeland Security and Emergency Management</title>
<idno type="eISSN">1547-7355</idno>
<imprint>
<publisher>De Gruyter</publisher>
<date type="published" when="2011-01-23">2011-01-23</date>
<biblScope unit="volume">8</biblScope>
<biblScope unit="issue">1</biblScope>
</imprint>
</series>
<idno type="istex">729DCF601F71C52CC0CD39130AE1B7C048B1A344</idno>
<idno type="DOI">10.2202/1547-7355.1577</idno>
<idno type="ArticleID">1547-7355.1577</idno>
<idno type="Related-article-Href">jhsem.2011.8.1.1577.pdf</idno>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc>
<textClass></textClass>
<langUsage>
<language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">The personal computer, and cyber technology in general, opens the doors to the world. Unless an organization can cultivate the flexibility to adapt its processes to the demands of this new technology, it could diminish its capability to execute effective protective and responsive countermeasures against malevolent or unwanted cyber intrusion. In this paper, we define and use the term cyberinfrastructure system to connote a generalized complex, large-scale cyberinfrastructure network that includes hardware, software, organizational policies and procedures, and that is connected to the Internet (e.g., by means of telephone lines, wireless devices, and high-speed technology). Following a malevolent cyber attack, the original cyberinfrastructure security model could have been (unbeknownst to the system’s operators) perturbed and changed, not by its designers, but by adversaries. In other words, the road-map design of the cyberinfrastructure system, which connotes the policies, procedures, methods, connections, and other human and organizational activities that define the functionality of the cyberinfrastructure system, could have been changed following a malevolent cyber attack. Resilience of a cyberinfrastructure system, which is central to its security, is defined as the ability of the system to withstand a major disruption within acceptable degradation parameters and to recover within an acceptable composite cost and time. The central role of systems integration in cyber security is highlighted because it not only connotes the integration of components, but also involves an understanding of the functionality that emerges from that integration. Systems modeling is indispensable in developing awareness when a cyberinfrastructure is intruded and is being violated. Cyberinfrastructure security is essentially multidimensional and of multi-scale compositions—from molecular to macro dimensions—and its wholeness is characterized by multiple and varied paths of interdependence. Thus, this paper advocates a holistic approach as requisite to understanding not only its myriad parts and functionality but also the forced changes imposed upon it both from within and without its domains. Furthermore, models can play a central role in intrusion detection, thus enabling information managers to develop protective and remedial courses of action. They can also be used to answer a wide range of questions, including how to deceive would-be intruders and lead them to believe they are inflicting damage on the real intended system. Through logically organized and systemically executed models, the Phantom System Models (PSM) laboratory, introduced in Section I, is aimed at providing a reasoned experimental modeling framework with which to explore and thus understand the intricate relationships that characterize the nature of multi-scale emergent systems.</div>
</front>
</TEI>
<affiliations>
<list>
<country>
<li>États-Unis</li>
</country>
<region>
<li>Pennsylvanie</li>
</region>
<settlement>
<li>Pittsburgh</li>
</settlement>
<orgName>
<li>Université Carnegie-Mellon</li>
</orgName>
</list>
<tree>
<noCountry>
<name sortKey="Haimes, Yacov Y" sort="Haimes, Yacov Y" uniqKey="Haimes Y" first="Yacov Y." last="Haimes">Yacov Y. Haimes</name>
</noCountry>
<country name="États-Unis">
<region name="Pennsylvanie">
<name sortKey="Chittister, Clyde G" sort="Chittister, Clyde G" uniqKey="Chittister C" first="Clyde G" last="Chittister">Clyde G. Chittister</name>
</region>
</country>
</tree>
</affiliations>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Ticri/CIDE/explor/CyberinfraV1/Data/Istex/Checkpoint
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000156 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Istex/Checkpoint/biblio.hfd -nk 000156 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Ticri/CIDE
   |area=    CyberinfraV1
   |flux=    Istex
   |étape=   Checkpoint
   |type=    RBID
   |clé=     ISTEX:729DCF601F71C52CC0CD39130AE1B7C048B1A344
   |texte=   The Role of Modeling in the Resilience of Cyberinfrastructure Systems and Preparedness for Cyber Intrusions
}}

Wicri

This area was generated with Dilib version V0.6.25.
Data generation: Thu Oct 27 09:30:58 2016. Site generation: Sun Mar 10 23:08:40 2024