Toward a framework for assessing the cyber-worthiness of complex mission critical systems

Stuart Fowler, Elena Sitnikova

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Citations (Scopus)

Abstract

Complex military systems are typically cyber-physical systems which are the targets of high level threat actors, and must be able to operate within a highly contested cyber environment. There is an emerging need to provide a strong level of assurance against these threat actors, but the process by which this assurance can be tested and evaluated is not so clear. This paper outlines an initial framework developed through research for evaluating the cyber-worthiness of complex mission critical systems using threat models developed in SysML. The framework provides a visual model of the process by which a threat actor could attack the system. It builds on existing concepts from system safety engineering and expands on how to present the risks and mitigations in an understandable manner.

Original languageEnglish
Title of host publication2019 Military Communications and Information Systems Conference, MilCIS 2019 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Number of pages6
ISBN (Electronic)9781728108957
DOIs
Publication statusPublished - Nov 2019
Externally publishedYes
Event2019 Military Communications and Information Systems Conference, MilCIS 2019 - Canberra, Australia
Duration: 12 Nov 201914 Nov 2019

Publication series

Name2019 Military Communications and Information Systems Conference, MilCIS 2019 - Proceedings

Conference

Conference2019 Military Communications and Information Systems Conference, MilCIS 2019
Country/TerritoryAustralia
CityCanberra
Period12/11/1914/11/19

Keywords

  • assurance
  • cyber
  • cyber-worthiness
  • resilience
  • security
  • SysML
  • threat modelling

Fingerprint

Dive into the research topics of 'Toward a framework for assessing the cyber-worthiness of complex mission critical systems'. Together they form a unique fingerprint.

Cite this