ORPP logo
Image from Google Jackets

An Introduction to Cyber Modeling and Simulation.

By: Material type: TextTextSeries: Wiley Series in Modeling and Simulation SeriesPublisher: Newark : John Wiley & Sons, Incorporated, 2018Copyright date: ©2019Edition: 1st edDescription: 1 online resource (190 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781119420811
Subject(s): Genre/Form: Additional physical formats: Print version:: An Introduction to Cyber Modeling and SimulationLOC classification:
  • QA76.9.C65 .C687 2018
Online resources:
Contents:
Intro -- Title Page -- Copyright Page -- Contents -- Chapter 1 Brief Review of Cyber Incidents -- 1.1 Cyber's Emergence as an Issue -- 1.2 Estonia and Georgia - Militarization of Cyber -- 1.3 Conclusions -- Chapter 2 Cyber Security - An Introduction to Assessment and Maturity Frameworks -- 2.1 Assessment Frameworks -- 2.2 NIST 800 Risk Framework -- 2.2.1 Maturity Models -- 2.2.2 Use Cases/Scenarios -- 2.3 Cyber Insurance Approaches -- 2.3.1 An Introduction to Loss Estimate and Rate Evaluation for Cyber -- 2.4 Conclusions -- 2.5 Future Work -- 2.6 Questions -- Chapter 3 Introduction to Cyber Modeling and Simulation (M&amp -- &amp -- S) -- 3.1 One Approach to the Science of Cyber Security -- 3.2 Cyber Mission System Development Framework -- 3.3 Cyber Risk Bow‐Tie: Likelihood to Consequence Model -- 3.4 Semantic Network Model of Cyberattack -- 3.5 Taxonomy of Cyber M&amp -- &amp -- S -- 3.6 Cyber Security as a Linear System - Model Example -- 3.7 Conclusions -- 3.8 Questions -- Chapter 4 Technical and Operational Scenarios -- 4.1 Scenario Development -- 4.1.1 Technical Scenarios and Critical Security Controls (CSCs) -- 4.1.2 ARMOUR Operational Scenarios (Canada) -- 4.2 Cyber System Description for M&amp -- &amp -- S -- 4.2.1 State Diagram Models/Scenarios of Cyberattacks -- 4.2.2 McCumber Model -- 4.2.3 Military Activity and Cyber Effects (MACE) Taxonomy -- 4.2.4 Cyber Operational Architecture Training System (COATS) Scenarios -- 4.3 Modeling and Simulation Hierarchy - Strategic Decision Making and Procurement Risk Evaluation -- 4.4 Conclusions -- 4.5 Questions -- Chapter 5 Cyber Standards for Modeling and Simulation -- 5.1 Cyber Modeling and Simulation Standards Background -- 5.2 An Introduction to Cyber Standards for Modeling and Simulation -- 5.2.1 MITRE's (MITRE) Cyber Threat Information Standards.
5.2.2 Cyber Operational Architecture Training System -- 5.2.3 Levels of Conceptual Interoperability -- 5.3 Standards Overview - Cyber vs. Simulation -- 5.3.1 Simulation Interoperability Standards Organization (SISO) Standards -- 5.3.2 Cyber Standards -- 5.4 Conclusions -- 5.5 Questions -- Chapter 6 Cyber Course of Action (COA) Strategies -- 6.1 Cyber Course of Action (COA) Background -- 6.1.1 Effects‐Based Cyber‐COA Optimization Technology and Experiments (EBCOTE) Project -- 6.1.2 Crown Jewels Analysis -- 6.1.3 Cyber Mission Impact Assessment (CMIA) Tool -- 6.1.4 Analyzing Mission Impacts of Cyber Actions -- 6.2 Cyber Defense Measurables - Decision Support System (DSS) Evaluation Criteria -- 6.2.1 Visual Analytics -- 6.2.2 Managing Cyber Events -- 6.2.3 DSS COA and VV&amp -- &amp -- A -- 6.3 Cyber Situational Awareness (SA) -- 6.3.1 Active and Passive Situational Awareness for Cyber -- 6.3.2 Cyber System Monitoring and Example Approaches -- 6.4 Cyber COAs and Decision Types -- 6.5 Conclusions -- 6.6 Further Considerations -- 6.7 Questions -- Chapter 7 Cyber Computer‐Assisted Exercise (CAX) and Situational Awareness (SA) via Cyber M&amp -- &amp -- S -- 7.1 Training Type and Current Cyber Capabilities -- 7.2 Situational Awareness (SA) Background and Measures -- 7.3 Operational Cyber Domain and Training Considerations -- 7.4 Cyber Combined Arms Exercise (CAX) Environment Architecture -- 7.4.1 CAX Environment Architecture with Cyber Layer -- 7.4.2 Cyber Injections into Traditional CAX - Leveraging Constructive Simulation -- 7.4.3 Cyber CAX - Individual and Group Training -- 7.5 Conclusions -- 7.6 Future Work -- 7.7 Questions -- Chapter 8 Cyber Model‐Based Evaluation Background -- 8.1 Emulators, Simulators, and Verification/Validation for Cyber System Description -- 8.2 Modeling Background -- 8.2.1 Cyber Simulators -- 8.2.2 Cyber Emulators.
8.2.3 Emulator/Simulator Combinations for Cyber Systems -- 8.2.4 Verification, Validation, and Accreditation (VV&amp -- &amp -- A) -- 8.3 Conclusions -- 8.4 Questions -- Chapter 9 Cyber Modeling and Simulation and System Risk Analysis -- 9.1 Background on Cyber System Risk Analysis -- 9.2 Introduction to using Modeling and Simulation for System Risk Analysis with Cyber Effects -- 9.3 General Business Enterprise Description Model -- 9.3.1 Translate Data to Knowledge -- 9.3.2 Understand the Enterprise -- 9.3.3 Sampling and Cyber Attack Rate Estimation -- 9.3.4 Finding Unknown Knowns - Success in Finding Improvised Explosive Device Example -- 9.4 Cyber Exploit Estimation -- 9.4.1 Enterprise Failure Estimation due to Cyber Effects -- 9.5 Countermeasures and Work Package Construction -- 9.6 Conclusions and Future Work -- 9.7 Questions -- Chapter 10 Cyber Modeling &amp -- &amp -- Simulation (M&amp -- &amp -- S) for Test and Evaluation (T&amp -- &amp -- E) -- 10.1 Background -- 10.2 Cyber Range Interoperability Standards (CRIS) -- 10.3 Cyber Range Event Process and Logical Range -- 10.4 Live, Virtual, and Constructive (LVC) for Cyber -- 10.4.1 Role of LVC in Capability Development -- 10.4.2 Use of LVC Simulations in Cyber Range Events -- 10.5 Applying the Logical Range Construct to System Under Test (SUT) Interaction -- 10.6 Conclusions -- 10.7 Questions -- Chapter 11 Developing Model‐Based Cyber Modeling and Simulation Frameworks -- 11.1 Background -- 11.2 Model‐Based Systems Engineering (MBSE) and System of Systems Description (Data Centric) -- 11.3 Knowledge‐Based Systems Engineering (KBSE) for Cyber Simulation -- 11.3.1 DHS and SysML Modeling for Buildings (CEPHEID VARIABLE) -- 11.3.2 The Cyber Security Modeling Language (CySeMoL) -- 11.3.3 Cyber Attack Modeling and Impact Assessment Component (CAMIAC).
11.4 Architecture‐Based Cyber System Optimization Framework -- 11.5 Conclusions -- 11.6 Questions -- Chapter 12 Appendix: Cyber M&amp -- &amp -- S Supporting Data, Tools, and Techniques -- 12.1 Cyber Modeling Considerations -- 12.1.1 Factors to Consider for Cyber Modeling -- 12.1.2 Lessons Learned from Physical Security -- 12.1.3 Cyber Threat Data Providers -- 12.1.4 Critical Security Controls (CSCs) -- 12.1.5 Situational Awareness Measures -- 12.2 Cyber Training Systems -- 12.2.1 Scalable Network Defense Trainer (NDT) -- 12.2.2 SELEX ES NetComm Simulation Environment (NCSE) -- 12.2.3 Example Cyber Tool Companies -- 12.3 Cyber‐Related Patents and Applications -- 12.4 Conclusions -- Bibliography -- Index -- EULA.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Intro -- Title Page -- Copyright Page -- Contents -- Chapter 1 Brief Review of Cyber Incidents -- 1.1 Cyber's Emergence as an Issue -- 1.2 Estonia and Georgia - Militarization of Cyber -- 1.3 Conclusions -- Chapter 2 Cyber Security - An Introduction to Assessment and Maturity Frameworks -- 2.1 Assessment Frameworks -- 2.2 NIST 800 Risk Framework -- 2.2.1 Maturity Models -- 2.2.2 Use Cases/Scenarios -- 2.3 Cyber Insurance Approaches -- 2.3.1 An Introduction to Loss Estimate and Rate Evaluation for Cyber -- 2.4 Conclusions -- 2.5 Future Work -- 2.6 Questions -- Chapter 3 Introduction to Cyber Modeling and Simulation (M&amp -- &amp -- S) -- 3.1 One Approach to the Science of Cyber Security -- 3.2 Cyber Mission System Development Framework -- 3.3 Cyber Risk Bow‐Tie: Likelihood to Consequence Model -- 3.4 Semantic Network Model of Cyberattack -- 3.5 Taxonomy of Cyber M&amp -- &amp -- S -- 3.6 Cyber Security as a Linear System - Model Example -- 3.7 Conclusions -- 3.8 Questions -- Chapter 4 Technical and Operational Scenarios -- 4.1 Scenario Development -- 4.1.1 Technical Scenarios and Critical Security Controls (CSCs) -- 4.1.2 ARMOUR Operational Scenarios (Canada) -- 4.2 Cyber System Description for M&amp -- &amp -- S -- 4.2.1 State Diagram Models/Scenarios of Cyberattacks -- 4.2.2 McCumber Model -- 4.2.3 Military Activity and Cyber Effects (MACE) Taxonomy -- 4.2.4 Cyber Operational Architecture Training System (COATS) Scenarios -- 4.3 Modeling and Simulation Hierarchy - Strategic Decision Making and Procurement Risk Evaluation -- 4.4 Conclusions -- 4.5 Questions -- Chapter 5 Cyber Standards for Modeling and Simulation -- 5.1 Cyber Modeling and Simulation Standards Background -- 5.2 An Introduction to Cyber Standards for Modeling and Simulation -- 5.2.1 MITRE's (MITRE) Cyber Threat Information Standards.

5.2.2 Cyber Operational Architecture Training System -- 5.2.3 Levels of Conceptual Interoperability -- 5.3 Standards Overview - Cyber vs. Simulation -- 5.3.1 Simulation Interoperability Standards Organization (SISO) Standards -- 5.3.2 Cyber Standards -- 5.4 Conclusions -- 5.5 Questions -- Chapter 6 Cyber Course of Action (COA) Strategies -- 6.1 Cyber Course of Action (COA) Background -- 6.1.1 Effects‐Based Cyber‐COA Optimization Technology and Experiments (EBCOTE) Project -- 6.1.2 Crown Jewels Analysis -- 6.1.3 Cyber Mission Impact Assessment (CMIA) Tool -- 6.1.4 Analyzing Mission Impacts of Cyber Actions -- 6.2 Cyber Defense Measurables - Decision Support System (DSS) Evaluation Criteria -- 6.2.1 Visual Analytics -- 6.2.2 Managing Cyber Events -- 6.2.3 DSS COA and VV&amp -- &amp -- A -- 6.3 Cyber Situational Awareness (SA) -- 6.3.1 Active and Passive Situational Awareness for Cyber -- 6.3.2 Cyber System Monitoring and Example Approaches -- 6.4 Cyber COAs and Decision Types -- 6.5 Conclusions -- 6.6 Further Considerations -- 6.7 Questions -- Chapter 7 Cyber Computer‐Assisted Exercise (CAX) and Situational Awareness (SA) via Cyber M&amp -- &amp -- S -- 7.1 Training Type and Current Cyber Capabilities -- 7.2 Situational Awareness (SA) Background and Measures -- 7.3 Operational Cyber Domain and Training Considerations -- 7.4 Cyber Combined Arms Exercise (CAX) Environment Architecture -- 7.4.1 CAX Environment Architecture with Cyber Layer -- 7.4.2 Cyber Injections into Traditional CAX - Leveraging Constructive Simulation -- 7.4.3 Cyber CAX - Individual and Group Training -- 7.5 Conclusions -- 7.6 Future Work -- 7.7 Questions -- Chapter 8 Cyber Model‐Based Evaluation Background -- 8.1 Emulators, Simulators, and Verification/Validation for Cyber System Description -- 8.2 Modeling Background -- 8.2.1 Cyber Simulators -- 8.2.2 Cyber Emulators.

8.2.3 Emulator/Simulator Combinations for Cyber Systems -- 8.2.4 Verification, Validation, and Accreditation (VV&amp -- &amp -- A) -- 8.3 Conclusions -- 8.4 Questions -- Chapter 9 Cyber Modeling and Simulation and System Risk Analysis -- 9.1 Background on Cyber System Risk Analysis -- 9.2 Introduction to using Modeling and Simulation for System Risk Analysis with Cyber Effects -- 9.3 General Business Enterprise Description Model -- 9.3.1 Translate Data to Knowledge -- 9.3.2 Understand the Enterprise -- 9.3.3 Sampling and Cyber Attack Rate Estimation -- 9.3.4 Finding Unknown Knowns - Success in Finding Improvised Explosive Device Example -- 9.4 Cyber Exploit Estimation -- 9.4.1 Enterprise Failure Estimation due to Cyber Effects -- 9.5 Countermeasures and Work Package Construction -- 9.6 Conclusions and Future Work -- 9.7 Questions -- Chapter 10 Cyber Modeling &amp -- &amp -- Simulation (M&amp -- &amp -- S) for Test and Evaluation (T&amp -- &amp -- E) -- 10.1 Background -- 10.2 Cyber Range Interoperability Standards (CRIS) -- 10.3 Cyber Range Event Process and Logical Range -- 10.4 Live, Virtual, and Constructive (LVC) for Cyber -- 10.4.1 Role of LVC in Capability Development -- 10.4.2 Use of LVC Simulations in Cyber Range Events -- 10.5 Applying the Logical Range Construct to System Under Test (SUT) Interaction -- 10.6 Conclusions -- 10.7 Questions -- Chapter 11 Developing Model‐Based Cyber Modeling and Simulation Frameworks -- 11.1 Background -- 11.2 Model‐Based Systems Engineering (MBSE) and System of Systems Description (Data Centric) -- 11.3 Knowledge‐Based Systems Engineering (KBSE) for Cyber Simulation -- 11.3.1 DHS and SysML Modeling for Buildings (CEPHEID VARIABLE) -- 11.3.2 The Cyber Security Modeling Language (CySeMoL) -- 11.3.3 Cyber Attack Modeling and Impact Assessment Component (CAMIAC).

11.4 Architecture‐Based Cyber System Optimization Framework -- 11.5 Conclusions -- 11.6 Questions -- Chapter 12 Appendix: Cyber M&amp -- &amp -- S Supporting Data, Tools, and Techniques -- 12.1 Cyber Modeling Considerations -- 12.1.1 Factors to Consider for Cyber Modeling -- 12.1.2 Lessons Learned from Physical Security -- 12.1.3 Cyber Threat Data Providers -- 12.1.4 Critical Security Controls (CSCs) -- 12.1.5 Situational Awareness Measures -- 12.2 Cyber Training Systems -- 12.2.1 Scalable Network Defense Trainer (NDT) -- 12.2.2 SELEX ES NetComm Simulation Environment (NCSE) -- 12.2.3 Example Cyber Tool Companies -- 12.3 Cyber‐Related Patents and Applications -- 12.4 Conclusions -- Bibliography -- Index -- EULA.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.

© 2024 Resource Centre. All rights reserved.