G2TT
来源类型Report
规范类型报告
DOIhttps://doi.org/10.7249/RR2703
来源IDRR-2703-AF
Measuring Cybersecurity and Cyber Resiliency
Don Snyder; Lauren A. Mayer; Guy Weichenberg; Danielle C. Tarraf; Bernard Fox; Myron Hura; Suzanne Genc; Jonathan W. Welburn
发表日期2020-03-26
出版年2020
语种英语
结论
  • A fruitful approach is to define cyber metrics in the context of a two-player cyber game between Red (the attacking side) and Blue (the side trying to ensure a mission).
  • The framework helps, in part, to reveal where strengths in one area might partially offset weaknesses in another.

No single set of metrics is well suited to all decisionmakers

  • Technical decisions in development, production, and sustainment are in most need of detailed, quantifiable metrics that tend toward the measures-of-performance end of the spectrum.
  • Operational decisions require output-oriented performance metrics, typically at a higher level of aggregation than used by the technical community.
  • Strategic decisions often involve balancing the importance of the mission to service or national priorities with the perceived threat and available resources.
  • Institutional decisions require measures of the true state of the organization and its processes.

There is a certain level of uncertainty in cyber metrics

  • There are two kinds of uncertainty relevant to cyber metrics: uncertainty from random variations and uncertainty due to ignorance.
  • Short of an attack, the most accurate information comes from intelligence and developmental and operational testing.
  • Cybersecurity and cyber resiliency are exercises in risk management.

Measures are only as good as the measurers

  • Because cyber monitoring is so often qualitative rather than quantitative, personnel must communicate rather than just report.
  • Hiring, training, retaining, and keeping current a skilled workforce to execute those measures will be necessary.
摘要

This report presents a framework for the development of metrics—and a method for scoring them—that indicates how well a U.S. Air Force mission or system is expected to perform in a cyber-contested environment. These metrics are developed so as to be suitable for informing acquisition decisions during all stages of weapon systems' life cycles. There are two types of cyber metrics: working-level metrics to counter an adversary's cyber operations and institutional-level metrics to capture any cyber-related organizational deficiencies.

,

The cyber environment is dynamic and complex, the threat is ubiquitous (in peacetime and wartime, deployed and at home), and no set of underlying "laws of nature" govern the cyber realm. A fruitful approach is to define cyber metrics in the context of a two-player cyber game between Red (the attacking side) and Blue (the side trying to ensure a mission).

,

The framework helps, in part, to reveal where strengths in one area might partially offset weaknesses in another. Additional discussions focus on how those metrics can be scored in ways that are useful for supporting decisions. The metrics are aimed at supporting program offices and authorizing officials in risk management and in defining requirements, both operational requirements as well as the more detailed requirements for system design used in contracts, the latter often referred to as derived requirements.

目录
  • Chapter One

    Developing a Framework for Cyber Metrics

  • Chapter Two

    Monitoring at the Working Level

  • Chapter Three

    Monitoring at the Institutional Level

  • Chapter Four

    The Proper Use of Metrics

主题Cyber Warfare ; Military Information Technology Systems
URLhttps://www.rand.org/pubs/research_reports/RR2703.html
来源智库RAND Corporation (United States)
引用统计
资源类型智库出版物
条目标识符http://119.78.100.153/handle/2XGU8XDN/524040
推荐引用方式
GB/T 7714
Don Snyder,Lauren A. Mayer,Guy Weichenberg,et al. Measuring Cybersecurity and Cyber Resiliency. 2020.
条目包含的文件
文件名称/大小 资源类型 版本类型 开放类型 使用许可
RAND_RR2703.pdf(538KB)智库出版物 限制开放CC BY-NC-SA浏览
x1585226332984.jpg.p(1KB)智库出版物 限制开放CC BY-NC-SA浏览
个性服务
推荐该条目
保存到收藏夹
导出为Endnote文件
谷歌学术
谷歌学术中相似的文章
[Don Snyder]的文章
[Lauren A. Mayer]的文章
[Guy Weichenberg]的文章
百度学术
百度学术中相似的文章
[Don Snyder]的文章
[Lauren A. Mayer]的文章
[Guy Weichenberg]的文章
必应学术
必应学术中相似的文章
[Don Snyder]的文章
[Lauren A. Mayer]的文章
[Guy Weichenberg]的文章
相关权益政策
暂无数据
收藏/分享
文件名: RAND_RR2703.pdf
格式: Adobe PDF
文件名: x1585226332984.jpg.pagespeed.ic.96GTUH8tPV.jpg
格式: JPEG

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。