Computing Reviews

Quantitative analysis of the mission impact for host-level cyber defensive mitigations
Wagner N., Şahin C., Hanson D., Pena J., Vuksani E., Tello B.  ANSS 2016 (Proceedings of the 49th Annual Simulation Symposium, Pasadena, CA, Apr 3-6, 2016)1-8,2016.Type:Proceedings
Date Reviewed: 10/26/16

Discussion and qualitative analysis on mitigation issues of cyber security from the host’s perspective are provided in this paper. The contribution seems to add some knowledge within the wider principles of host protection. The discussion in the paper is limited to two methods/proposed mitigation strategies, without justification of why the two mitigation strategies are selected or their significance. Otherwise, it is a good paper that is well written and makes an adequate contribution to the knowledge base.

Readers should consider other related works or materials as well [1,2,3]. These would provide more in-depth coverage of the problem domain within the paper and provide a better justification of its relevancy and contribution.

Overall, the paper is a worthy starting point to gain insight into host-level cyber defense mechanisms.


1)

Kott, A.; et al. Assessing mission impact of cyberattacks. Report of the NATO IST-128 Workshop. Report number: ARL-TR-7566, 2016.


2)

Mawhinney, R. Update on cloud cyber defense CONOPS. Defense Information Systems Agency, 2016. http://www.disa.mil/~/media/Files/DISA/News/Conference/2016/AFCEA-Symposium/6-Mawhinney_Update_Cloud_Cyber.pdf.


3)

Jakobson, G. Mission-centricity in cyber security: architecting cyber attack resilient missions. In Proc. of the 5th International Conference on Cyber Conflict NATO CCD COE Publications, Tallinn, Estonia, 2013, 1–18.

Reviewer:  Abdullahi Arabo Review #: CR144868 (1701-0051)

Reproduction in whole or in part without permission is prohibited.   Copyright 2024 ComputingReviews.com™
Terms of Use
| Privacy Policy