G2TT
来源类型Report
规范类型报告
DOIhttps://doi.org/10.7249/RR3188.2
来源IDRR-3188/2-AF
Cyber Mission Thread Analysis: An Implementation Guide for Process Planning and Execution
Lauren A. Mayer; Don Snyder; Guy Weichenberg; Danielle C. Tarraf; Jonathan W. Welburn; Suzanne Genc; Myron Hura; Bernard Fox
发表日期2022-03-10
出版年2022
语种英语
结论

Planning is crucial

  • The number of stakeholders involved in a cyber mission thread analysis requires a substantial coordination effort.
  • Without proper planning, the timeline could be significantly extended and the results of the analysis could be inadequate.

The ultimate purpose of CMTA is triage

  • This goal is the guiding principle for all engagements with subject-matter experts and analysts.
  • Adherence to this goal keeps the CMTA process and results within scope and schedule.

Every CMTA exercise is a collaborative effort

  • Critical review of CMTA results by every stakeholder helps to ensure results are accurate.
  • Fostering stakeholder buy-in further instills credibility in the process.
摘要

Cyber mission thread analysis (CMTA), which identifies mission-critical systems in a cyber threat environment, requires a disciplined, well-planned process for its execution. This report provides a proposed planning and implementation guide (1) to perform CMTA expeditiously while still giving results good enough to make decisions about mission criticality, and (2) to analyze multiple missions concurrently.

,

The authors offer guidance on the roles and responsibilities of organizations and personnel involved in CMTA; the process for implementing the analysis and the types of preparations necessary for successful implementation; a rough timeline required to perform CMTA for one or more missions concurrently; and the possible constraints and issues that may be encountered. The authors draw on lessons learned from a pilot CMTA application, analogous Air Force efforts, and relevant social science methods for conducting interviews and focus groups. They highlight a number of key considerations, including two that are most critical: (1) Develop and execute a detailed plan. The number of stakeholders involved and desire for a swift timeline require a substantial coordination effort; and (2) Remember that the ultimate CMTA goal is triage. It is vital that any mission-critical system appear highly ranked; it is okay if some non-critical systems appear highly ranked. This goal ensures discussions do not become unnecessarily detailed and results remain within scope.

,

The analytical tasks to perform CMTA are covered in a separate, companion document — Cyber Mission Thread Analysis: A Prototype Framework for Assessing Impact to Missions from Cyber Attacks to Weapon Systems — that readers can consult.

目录
  • Chapter One

    Overview of the CMTA Implementation Guide

  • Chapter Two

    Phase One: Establishing CMTA Roles and Analysis Inputs

  • Chapter Three

    Phase Two: Planning the Analysis Process

  • Chapter Four

    Phase Three: Conducting the Analysis

  • Chapter Five

    Adopting CMTA Process Efficiencies

  • Chapter Six

    Final Thoughts and Next Steps

  • Appendix A

    Further Considerations for Conducting SME Elicitations

  • Appendix B

    CMTA Analyst Team Checklist

主题Cyber Warfare ; Military Information Technology Systems ; United States Air Force
URLhttps://www.rand.org/pubs/research_reports/RR3188z2.html
来源智库RAND Corporation (United States)
引用统计
资源类型智库出版物
条目标识符http://119.78.100.153/handle/2XGU8XDN/524737
推荐引用方式
GB/T 7714
Lauren A. Mayer,Don Snyder,Guy Weichenberg,et al. Cyber Mission Thread Analysis: An Implementation Guide for Process Planning and Execution. 2022.
条目包含的文件
文件名称/大小 资源类型 版本类型 开放类型 使用许可
RAND_RR3188z2.pdf(1807KB)智库出版物 限制开放CC BY-NC-SA浏览
1642098960448.jpg(7KB)智库出版物 限制开放CC BY-NC-SA缩略图
浏览
个性服务
推荐该条目
保存到收藏夹
导出为Endnote文件
谷歌学术
谷歌学术中相似的文章
[Lauren A. Mayer]的文章
[Don Snyder]的文章
[Guy Weichenberg]的文章
百度学术
百度学术中相似的文章
[Lauren A. Mayer]的文章
[Don Snyder]的文章
[Guy Weichenberg]的文章
必应学术
必应学术中相似的文章
[Lauren A. Mayer]的文章
[Don Snyder]的文章
[Guy Weichenberg]的文章
相关权益政策
暂无数据
收藏/分享
文件名: RAND_RR3188z2.pdf
格式: Adobe PDF
文件名: 1642098960448.jpg
格式: JPEG

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。