Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Quantitative analysis of the mission impact for host-level cyber defensive mitigations
Wagner N., Şahin C., Hanson D., Pena J., Vuksani E., Tello B.  ANSS 2016 (Proceedings of the 49th Annual Simulation Symposium, Pasadena, CA, Apr 3-6, 2016)1-8.2016.Type:Proceedings
Date Reviewed: Oct 26 2016

Discussion and qualitative analysis on mitigation issues of cyber security from the host’s perspective are provided in this paper. The contribution seems to add some knowledge within the wider principles of host protection. The discussion in the paper is limited to two methods/proposed mitigation strategies, without justification of why the two mitigation strategies are selected or their significance. Otherwise, it is a good paper that is well written and makes an adequate contribution to the knowledge base.

Readers should consider other related works or materials as well [1,2,3]. These would provide more in-depth coverage of the problem domain within the paper and provide a better justification of its relevancy and contribution.

Overall, the paper is a worthy starting point to gain insight into host-level cyber defense mechanisms.

Reviewer:  Abdullahi Arabo Review #: CR144868 (1701-0051)
1) Kott, A.; et al. Assessing mission impact of cyberattacks. Report of the NATO IST-128 Workshop. Report number: ARL-TR-7566, 2016.
2) Mawhinney, R. Update on cloud cyber defense CONOPS. Defense Information Systems Agency, 2016. http://www.disa.mil/~/media/Files/DISA/News/Conference/2016/AFCEA-Symposium/6-Mawhinney_Update_Cloud_Cyber.pdf.
3) Jakobson, G. Mission-centricity in cyber security: architecting cyber attack resilient missions. In Proc. of the 5th International Conference on Cyber Conflict NATO CCD COE Publications, Tallinn, Estonia, 2013, 1–18.
Bookmark and Share
 
Security and Protection (C.2.0 ... )
 
 
Applications (I.6.3 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Introduction to data security and controls (2nd ed.)
Edward R. I., QED Information Sciences, Inc., Wellesley, MA, 1991. Type: Book (9780894353864)
Aug 1 1992
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer
Davies D., Price W., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471900634)
Oct 1 1985
The development and proof of a formal specification for a multilevel secure system
Glasgow J., Macewen G. ACM Transactions on Computer Systems 5(2): 151-184, 1987. Type: Article
Oct 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy