
- English
- ePUB (mobile friendly)
- Available on iOS & Android
An Introduction to Cyber Modeling and Simulation
About this book
Introduces readers to the field of cyber modeling and simulation and examines current developments in the US and internationally
This book provides an overview of cyber modeling and simulation (M&S) developments. Using scenarios, courses of action (COAs), and current M&S and simulation environments, the author presents the overall information assurance process, incorporating the people, policies, processes, and technologies currently available in the field. The author ties up the various threads that currently compose cyber M&S into a coherent view of what is measurable, simulative, and usable in order to evaluate systems for assured operation.
An Introduction to Cyber Modeling and Simulation provides the reader with examples of tools and technologies currently available for performing cyber modeling and simulation. It examines how decision-making processes may benefit from M&S in cyber defense. It also examines example emulators, simulators and their potential combination. The book also takes a look at corresponding verification and validation (V&V) processes, which provide the operational community with confidence in knowing that cyber models represent the real world. This book:
- Explores the role of cyber M&S in decision making
- Provides a method for contextualizing and understanding cyber risk
- Shows how concepts such the Risk Management Framework (RMF) leverage multiple processes and policies into a coherent whole
- Evaluates standards for pure IT operations, "cyber for cyber, " and operational/mission cyber evaluationsā"cyber for others"
- Develops a method for estimating both the vulnerability of the system (i.e., time to exploit) and provides an approach for mitigating risk via policy, training, and technology alternatives
- Uses a model-based approach
An Introduction to Cyber Modeling and Simulation is a must read for all technical professionals and students wishing to expand their knowledge of cyber M&S for future professional work.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
1
Brief Review of Cyber Incidents
When it comes to national security, I think this [i.e., cyber warfare] represents the battleground for the future. Iāve often said that I think the potential for the next Pearl Harbor could very well be a cyberāattack. If you have a cyberāattack that brings down our power grid system, brings down our financial systems, brings down our government systems, you could paralyze this country.1Leon Panetta
| Year | Cyberattack | Objective | Effects |
| 1988 | Morris Worm | Understand the number of hosts connected to the Internet | Removed thousands of computers from operation |
| 2003 | Slammer Worm | Denial of service | Disabled Ohio's DavisāBesse nuclear power plant safety monitoring system for nearly 5 h |
| 2008 | Conficker | Implant malware on target machines | Control target machines |
| 2010 | STUXNET | Take control of Siemens industrial control systems (ICSā) | Destroyed centrifuges used for Iranian nuclear program |
| 2012 | Saudi Aramco (oil provider) business systems (aka Al Shamoon) | Wipe disks on Microsoft Windowsābased systems | Destroyed ARAMCO business systems to cause financial losses due to their inability to bill customers for oil shipments |
| 2013 | South Korean Banks | āDarkSeoulā virus used to deny service and destroy data | Destroyed hard drives of selected business systems |
| US Banks | Distributed Denial of Service (DDoS) | Caused financial losses through banksā inability to serve customers | |
| Rye Dam (NY) | Access control gates for opening and closing at will | Controlled dam gate system | |
| 2014 | Sony Pictures | Data breach | Downloaded a large amount of data and posted it on the Internet; 3 wk before the release of a satirical film about North Korea |
| 2015 | Office of Personnel Management (OPM) breach | Gain access to information on US Government Personnel | Downloaded over 21 million US Government and contractor personnel files |
| 2017 | Equifax breach | Gain access to consumer credit information | Downloaded credit history and private information on over 143 million consumers |
- Recognizing that the autonomy and efficiencies that information systems provide are too valuable to forego, even if the underlying technologies provide a potential threat to business operations.
- Understanding that cyber āsecurityā (i.e. the ability to provide an effective deterrent to cyberattacks) is not achievable for most organizations in the short term, so resilience is one way to develop organizational policies and processes around
- mitigation scenarios for general cyberattacks
- comparing tacitly accepted cyber risk to business risks that we already transfer (e.g. hurricanes, earthquakes, natural disasters, etc.) to other organizations (e.g. insurance companies).
- Coordinating the challenges associated with an organizationās people being a key source of cyber vulnerability.
1.1 Cyberās Emergence as an Issue
Table of contents
- Cover
- Table of Contents
- 1 Brief Review of Cyber Incidents
- 2 Cyber Security ā An Introduction to Assessment and Maturity Frameworks
- 3 Introduction to Cyber Modeling and Simulation (M&S)
- 4 Technical and Operational Scenarios
- 5 Cyber Standards for Modeling and Simulation
- 6 Cyber Course of Action (COA) Strategies
- 7 Cyber ComputerāAssisted Exercise (CAX) and Situational Awareness (SA) via Cyber M&S
- 8 Cyber ModelāBased Evaluation Background
- 9 Cyber Modeling and Simulation and System Risk Analysis
- 10 Cyber Modeling & Simulation (M&S) for Test and Evaluation (T&E)
- 11 Developing ModelāBased Cyber Modeling and Simulation Frameworks
- 12 Appendix: Cyber M&S Supporting Data, Tools, and Techniques
- Bibliography
- Index
- End User License Agreement