Home Page Icon
Home Page
Table of Contents for
End User License Agreement
Close
End User License Agreement
by Jerry M. Couretas
An Introduction to Cyber Modeling and Simulation
Cover
1 Brief Review of Cyber Incidents
1.1 Cyber’s Emergence as an Issue
1.2 Estonia and Georgia – Militarization of Cyber
1.3 Conclusions
2 Cyber Security – An Introduction to Assessment and Maturity Frameworks
2.1 Assessment Frameworks
2.2 NIST 800 Risk Framework
2.3 Cyber Insurance Approaches
2.4 Conclusions
2.5 Future Work
2.6 Questions
3 Introduction to Cyber Modeling and Simulation (M&S)
3.1 One Approach to the Science of Cyber Security
3.2 Cyber Mission System Development Framework
3.3 Cyber Risk Bow‐Tie: Likelihood to Consequence Model
3.4 Semantic Network Model of Cyberattack
3.5 Taxonomy of Cyber M&S
3.6 Cyber Security as a Linear System – Model Example
3.7 Conclusions
3.8 Questions
4 Technical and Operational Scenarios
4.1 Scenario Development
4.2 Cyber System Description for M&S
4.3 Modeling and Simulation Hierarchy – Strategic Decision Making and Procurement Risk Evaluation
4.4 Conclusions
4.5 Questions
5 Cyber Standards for Modeling and Simulation
5.1 Cyber Modeling and Simulation Standards Background
5.2 An Introduction to Cyber Standards for Modeling and Simulation
5.3 Standards Overview – Cyber vs. Simulation
5.4 Conclusions
5.5 Questions
6 Cyber Course of Action (COA) Strategies
6.1 Cyber Course of Action (COA) Background
6.2 Cyber Defense Measurables – Decision Support System (DSS) Evaluation Criteria
6.3 Cyber Situational Awareness (SA)
6.4 Cyber COAs and Decision Types
6.5 Conclusions
6.6 Further Considerations
6.7 Questions
7 Cyber Computer‐Assisted Exercise (CAX) and Situational Awareness (SA) via Cyber M&S
7.1 Training Type and Current Cyber Capabilities
7.2 Situational Awareness (SA) Background and Measures
7.3 Operational Cyber Domain and Training Considerations
7.4 Cyber Combined Arms Exercise (CAX) Environment Architecture
7.5 Conclusions
7.6 Future Work
7.7 Questions
8 Cyber Model‐Based Evaluation Background
8.1 Emulators, Simulators, and Verification/Validation for Cyber System Description
8.2 Modeling Background
8.3 Conclusions
8.4 Questions
9 Cyber Modeling and Simulation and System Risk Analysis
9.1 Background on Cyber System Risk Analysis
9.2 Introduction to using Modeling and Simulation for System Risk Analysis with Cyber Effects
9.3 General Business Enterprise Description Model
9.4 Cyber Exploit Estimation
9.5 Countermeasures and Work Package Construction
9.6 Conclusions and Future Work
9.7 Questions
10 Cyber Modeling & Simulation (M&S) for Test and Evaluation (T&E)
10.1 Background
10.2 Cyber Range Interoperability Standards (CRIS)
10.3 Cyber Range Event Process and Logical Range
10.4 Live, Virtual, and Constructive (LVC) for Cyber
10.5 Applying the Logical Range Construct to System Under Test (SUT) Interaction
10.6 Conclusions
10.7 Questions
11 Developing Model‐Based Cyber Modeling and Simulation Frameworks
11.1 Background
11.2 Model‐Based Systems Engineering (MBSE) and System of Systems Description (Data Centric)
11.3 Knowledge‐Based Systems Engineering (KBSE) for Cyber Simulation
11.4 Architecture ‐Based Cyber System Optimization Framework
11.5 Conclusions
11.6 Questions
12 Appendix: Cyber M&S Supporting Data, Tools, and Techniques
12.1 Cyber Modeling Considerations
12.2 Cyber Training Systems
12.3 Cyber‐Related Patents and Applications
12.4 Conclusions
Bibliography
Index
End User License Agreement
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Index
WILEY END USER LICENSE AGREEMENT
Go to
www.wiley.com/go/eula
to access Wiley’s ebook EULA.
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset