Cyber Mission Assurance – Defining a Framework

800 Words2 Pages

Statement of Purpose
The topic of this study is mission-cyber dependency mapping for Cyber Mission Assurance (MA). The purpose of the research effort is to develop an Air Force standardized mission-cyber dependency mapping framework at the operational-level to provide detailed guidance for Air Force identified critical missions based on a meta-analysis of dependency mapping research. This will be done by defining a cyber MA framework to be used by cyber defenders and mission owners to make informed decisions in the defense of their cyberspace environment and meet mission objectives.
Statement of the Problem
The general problem stimulating addressed in this research effort is the shortfalls of Information Assurance (IA) as related to ensuring successful mission execution. There is recognition across the military community of the operational shortfalls of IA. Within the military environment, the focus is on successful execution of the mission with the minimum causalities and loss of life, as opposed to the commercial environment where the financial bottom line can at times be the primary focus.
The scope of IA has grown past just security concerns of traditional information systems. IA is information operations that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and nonrepudiation (CNSSI 4009, 2010). IA basic tenets of availability, integrity, authentication, confidentiality, and non-repudiation focus on the information not necessarily the mission. Protecting the information in information system can conflict with the successful completion of the mission. The operational necessity of assuring successful mission execution has generated a shi...

... middle of paper ...

...agement-team members: An exploratory study. (Order No. 3369003, Capella University). ProQuest Dissertations and Theses, 175-n/a. Retrieved from http://search.proquest.com/docview/305160127?accountid=44888.
Rechard, R. P. (1999). Historical relationship between performance assessment for radioactive waste disposal and other types of risk assessment. Risk Analysis, 19(5), 763-807. doi:10.1023/A:1007058325258
White House (2000). Defending america’s cyberspace: National plan for information systems protection: Version 1.0: An invitation to dialogue. The White House, Washington, DC: author. Retrieved from https://www.fas.org/irp/offdocs/pdd/CIP-plan.pdf
Winter, M. W. (1995). Software fault tree analysis of an automated control system device written in ada. (Master’s thesis, Naval Postgraduate School, Monterey, CA). Retrieved from http://handle.dtic.mil/100.2/ADA303377

More about Cyber Mission Assurance – Defining a Framework

Open Document