Assessment of Mission Risk: Role of Protection of Information and Communication Technology Resources

Abstract

The ability to assess risk to missions resulting from cyber incident is of paramount importance for command decision making. In this paper, a five step methodology to assess the risk to a mission resulting from cyber security breaches is presented. The methodology is based on modeling the activities of the mission and the impact of breaches of communications and information technology on the activities. The outcome of the methodology provides the commanders with an enhanced understanding and estimation of the impact of cyber attacks on their missions. The methodology is demonstrated through its application to a typical ground movement of troops.


AUTHORS

Department of Information and Operations Management Texas A&M University, College Station, TX
USA

Joobin Choobineh’s (B.S., MBA, Ph.D. U. of Arizona) research areas include Management Information Systems and their security, Business Database Systems, and Systems Analysis and Design. He has authored or been a coauthor of more than fifty (50) articles that have appeared in journals and conference proceedings such as (in alphabetical order) Annals of Operations Research, Communications of the ACM, Communications of the AIS, Database Engineering, Computers & Security, Decision Support Systems, IEEE Transactions on Software Engineering, Information and Management, Information Strategy, Information Systems, Information Systems Management, INFORMS Journal on Computing, Intl. J. Of Operations & Production Management, J. of Database Management, J. of Management Information Systems, Omega, and The Database for Advances in Information Systems. He has served as the chair of 8 and committee member of 11 Ph.D. students. Dr. Choobineh is currently an Associate Editor of INFORMS Journal on Computing and serves on the editorial board of the International Journal of Business Information Systems.

Department of Information and Operations ManagementTexas A&M University, College Station, TX
USA

Evan Anderson, is a Professor of Management Information Systems. He joined Texas A&M University in 1998 as the E.D. Brockett Professor of Information and Operations Management and is a co-founder of the Texas A&M Center for Information Assurance and Security. Prior to joining Texas A&M, he was GMU Foundation Professor and Director of Technology Management in the Graduate Business Institute at George Mason University. He received a Ph.D. (1970) from Cornell University, England. His research has appeared in journals such as: Accounting Review, Decision Sciences, Operations Research, Naval Research Logistics, Management Science, Mathematical Methods of Operations Research, University of Chicago’s Journal of Business, IIE Transaction, Journal of Management Information Systems, MIS Quarterly, Computers and Security, and IEEE Transactions: Engineering Management. His research has have been funded by grants from organizations such as: Bell Atlantic-Nynex, CISCO Systems, EDS, Hughes Electronics, IBM, Perot Systems, the National Security Agency and Teradata (NCR).

LTC, FA/FA53 Plans Division Chief, 106th Signal BDE Fort Sam Houston, TX
USA

Michael Fazen (MS/MIS, Texas A&M University) is a Lieutenant Colonel, US Army. He is a Strategic Planner at 106th Signal Brigade, 7th Signal Command (T), 9th Signal Command (A).

Department of Systems and Engineering Management, Air Force Institute of Technology& Wright-Patterson AFB, OH,
USA

Michael R. Grimaila, CISM, CISSP is an Assistant Professor of Information Resource Management in the Department of Systems and Engineering Management, Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio. He received a Bachelor of Science in Electrical Engineering (1993), a Master of Science in Electrical Engineering (1995), and a Ph.D. in Computer Engineering (1999) from Texas A&M University. He is a member of the ACM, Eta Kappa Nu, ISACA, (ISC) 2, ISSA, ISSEA, Tau Beta Pi, and Senior Member of IEEE. His research interests include information assurance, IA metrics, cyber damage and mission impact assessment, information warfare, and information operations.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

C

C2
C2S
CDX
CIA
CIP
CPS

I

IA
ICS

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    114 Ballard Street
    Yorktown, VA
    23690
  • 757.871.3949
  • jiw@gbpts.com