Visible to the public Cyber Terrain Mission Mapping: Tools and Methodologies

TitleCyber Terrain Mission Mapping: Tools and Methodologies
Publication TypeConference Paper
Year of Publication2017
AuthorsGuion, J., Reith, M.
Conference Name2017 International Conference on Cyber Conflict (CyCon U.S.)
Date Publishednov
PublisherIEEE
ISBN Number978-1-5386-2379-4
Keywordscomposability, Computational modeling, computer security, cyber assets, Cyber Dependencies, cyber dependency impact analysis, cyber mission mapping, cyber situational awareness, cyber terrain mission mapping, Cyberspace, key terrain cyber, Metrics, military computing, Mission Assurance, mission execution, mission relevant cyber terrain, mission-centric cybersecurity, Organizations, pubcrawl, Resiliency, security of data, Sensors, situational awareness, Tools
Abstract

The Air Force is shifting its cybersecurity paradigm from an information technology (IT)-centric toward a mission oriented approach. Instead of focusing on how to defend its IT infrastructure, it seeks to provide mission assurance by defending mission relevant cyber terrain enabling mission execution in a contested environment. In order to actively defend a mission in cyberspace, efforts must be taken to understand and document that mission's dependence on cyberspace and cyber assets. This is known as cyber terrain mission mapping. This paper seeks to define mission mapping and overview methodologies. We also analyze current tools seeking to provide cyber situational awareness through mission mapping or cyber dependency impact analysis and identify existing shortfalls.

URLhttp://ieeexplore.ieee.org/document/8167504/
DOI10.1109/CYCONUS.2017.8167504
Citation Keyguion_cyber_2017