DocumentCode
377002
Title
Defense-in-depth revisited: qualitative risk analysis methodology for complex network-centric operations
Author
Bass, Tim ; Robichaux, Roger
Volume
1
fYear
2001
fDate
2001
Firstpage
64
Abstract
Defense-in-depth (2000) concepts for global information operations are physical boundary-centric. However, network-centric operations are multidimensional, layered and often virtual. The interconnection of defensive operational elements, including the fixed and deployed base, runways, fighter planes, bombers, bombs, tankers, tents and individuals are logically and virtually connected. For this reason, traditional physical boundaries are minimally effective and often constraining. This paper extends the defense-in-depth boundary protection construct to a uniform qualitative risk management perspective that is tightly coupled with network implementation, resources, mission criticality, security policies and network-centric mission operations. The suggested risk management framework is applied to an operational example.
Keywords
Internet; military communication; risk management; telecommunication security; boundary protection; defense-in-depth concepts; global information operations; mission criticality; network-centric mission operations; security policies; uniform qualitative risk management; Computer architecture; Computer networks; Control systems; Costs; Information security; Military computing; Mission critical systems; Protection; Risk analysis; Risk management;
fLanguage
English
Publisher
ieee
Conference_Titel
Military Communications Conference, 2001. MILCOM 2001. Communications for Network-Centric Operations: Creating the Information Force. IEEE
Print_ISBN
0-7803-7225-5
Type
conf
DOI
10.1109/MILCOM.2001.985765
Filename
985765
Link To Document