• DocumentCode
    377002
  • Title

    Defense-in-depth revisited: qualitative risk analysis methodology for complex network-centric operations

  • Author

    Bass, Tim ; Robichaux, Roger

  • Volume
    1
  • fYear
    2001
  • fDate
    2001
  • Firstpage
    64
  • Abstract
    Defense-in-depth (2000) concepts for global information operations are physical boundary-centric. However, network-centric operations are multidimensional, layered and often virtual. The interconnection of defensive operational elements, including the fixed and deployed base, runways, fighter planes, bombers, bombs, tankers, tents and individuals are logically and virtually connected. For this reason, traditional physical boundaries are minimally effective and often constraining. This paper extends the defense-in-depth boundary protection construct to a uniform qualitative risk management perspective that is tightly coupled with network implementation, resources, mission criticality, security policies and network-centric mission operations. The suggested risk management framework is applied to an operational example.
  • Keywords
    Internet; military communication; risk management; telecommunication security; boundary protection; defense-in-depth concepts; global information operations; mission criticality; network-centric mission operations; security policies; uniform qualitative risk management; Computer architecture; Computer networks; Control systems; Costs; Information security; Military computing; Mission critical systems; Protection; Risk analysis; Risk management;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Military Communications Conference, 2001. MILCOM 2001. Communications for Network-Centric Operations: Creating the Information Force. IEEE
  • Print_ISBN
    0-7803-7225-5
  • Type

    conf

  • DOI
    10.1109/MILCOM.2001.985765
  • Filename
    985765