• Aucun résultat trouvé

Approaches to Quantify Cyber Risk and Resilience

N/A
N/A
Protected

Academic year: 2022

Partager "Approaches to Quantify Cyber Risk and Resilience"

Copied!
2
0
0

Texte intégral

(1)

IST-153 Workshop on Cyber Resilience

Approaches to Quantify Cyber Risk and Resilience

Igor Linkov, Alexander Ganin, Benjamin D. Trump, Kelsey Poinsatte-Jones

1 US Army Corps of Engineers, Engineering Research and Development Center, Virginia Road, Concord, MA 01742. Phone: (617) 233-9869

Email: Igor.Linkov@usace.army.mil; aag2k@virginia.edu;

benjamin.d.trump@usace.army.mil; Kelsey.M.Poinsatte-Jones@usace.army.mil

Cybersecurity is an increasingly popular term used to define the actions taken by individuals, businesses, and governments to protect their digital infrastructure from deliberate external attacks. In such events, nefarious computer hackers seek to exploit one or several computing vulnerabilities in order to steal private and secured information, disrupt existing processes handled by software, or to usurp control of a system from a remote location. Experts are required to keep up with the constant cybersecurity innovations in order to best prepare for potential cyber-attacks. Where government and industry installations may receive hundreds to thousands of hostile cyber-attacks each day, resilience thinking is crucial.

Traditionally, cyber threats are approached from the position of risk analysis. For the context of cybersecurity, risk analysis is focused on the evaluation of threats (e.g., deliberate cyber- attacks) that exploit system vulnerabilities that result in economic or political consequences.

Risk is the product of various hazards, vulnerabilities, and consequences, whereby risk analysts seek to gain a measure of the damage that could be incurred by a given threat alongside its relative likelihood of occurrence. These efforts are well described in literature for routine and well characterized threats, yet generally rely upon robust sources of quantitative data to populate an assessment. Unfortunately, cybersecurity threats exploit increasingly complex information systems and technology networks in a manner that is rarely predictable and is difficult to quantify. As such, traditional risk assessment may not be able to address cybersecurity concerns in the near term.

Resilience analysis can serve as a complementary approach to explore threats that are

inherently complex in nature, and are difficult to predict or characterize. Resilience practitioners adopt a systems-view of threat, where emphasis is placed upon reviewing a system’s dynamical properties, such as robustness, recoverability, and adaptability, for a wide range of potential threats. Where resilience would allow users to review system absorption and recovery for cyber threats, we use two methods to operationalize resilience in various contexts. This includes (i) resilience matrices, and (ii) network science. For the former, a resilience matrix utilizes a decision analytical approach to integrate disparate sources of qualitative and semi-quantitative information to assess system performance across multiple domains, including physical,

information, and social. For the latter, network science quantitatively assess a system’s topology and interdependencies, where a failure could trigger cascading failures in other connected components of the system. Such approaches can help identify, in real time, the best available options to mitigate damage from cyber threats, as well as identify those alternatives available to reduce the time, money, and manpower needed to recover from such threats.

Thus, resilience analysis can be used to not only identify and reduce vulnerabilities of individual components but also to return systems back to original functionality and adaptation following an

(2)

adverse event. While risk assessment is a useful tool to identify and characterize known, quantifiable system threats, resilience analysis is useful for the preparation, absorption,

recovery, and adaptation of infrastructural, social, and informational systems against unknown, uncharacterized, low-probability events. Given the complementary nature of these two

approaches and complexity of cyber threats, resilience analysis and risk assessment must be adopted as dual forms to support management of cyber threats.

Références

Documents relatifs

The dependence of operational risks in the electric power company on information security risks was identified, taking into account direct and indirect losses from the

As we are going to prove that the occurrence of safety related events, security related events or both together can lead to the same undesirable accident, the idea then is to

This approach combines Bow-Tie Anal­ ysis (BTA), commonly used for safety analysis and the Attack Tree Analysis (ATA), recently introduced for security analysis of computer

This article presents the use of model-based diagnosis and data-based techniques for detection and isolation of cyber- attacks and faults on a two-tank system.. A set of 12

The functions of this do- main, which are mandatory to ensure safe train movement and carrying the payload, are : main control, train radio, air conditioning, propulsion,

The midstream oil terminal testbed can be used to simulate network-borne attacks that target programmable logic controllers or the human-machine in- terface, physical attacks

We tested the suitability of GOReM for modeling the context of business conti- nuity in of a Bank and the requirements related to handling of the cyber systemic risk as regulated by

In particular, ScadaBR: (i) provides the monitoring and control functions of a master terminal unit; (ii) displays and saves information about traffic conditions and traffic light