Defensive Cyber Battle Damage Assessment Through Attack Methodology Modeling
📄 Viewing lite version
Full site ›
Book Details
Author(s)Captain, USAF, Ryan T. Ostler
ISBN / ASIN1481990764
ISBN-139781481990769
AvailabilityUsually ships in 24 hours
Sales Rank2,761,455
CategoryPolitical Science
MarketplaceUnited States 🇺🇸
Description ▲
Due to the growing sophisticated capabilities of advanced persistent cyber threats, it is necessary to understand and accurately assess cyber attack damage to digital assets. This thesis proposes a Defensive Cyber Battle Damage Assessment (DCBDA) process which utilizes the comprehensive understanding of all possible cyber attack methodologies captured in a Cyber Attack Methodology Exhaustive List (CAMEL). This research proposes CAMEL to provide detailed knowledge of cyber attack actions, methods, capabilities, forensic evidence and evidence collection methods. This product is modeled as an attack tree called the Cyber Attack Methodology Attack Tree (CAMAT). The proposed DCBDA process uses CAMAT to analyze potential attack scenarios used by an attacker. These scenarios are utilized to identify the associated digital forensic methods in CAMEL to correctly collect and analyze the damage from a cyber attack. The results from the experimentation of the proposed DCBDA process show the process can be successfully applied to cyber attack scenarios to correctly assess the extent, method and damage caused by a cyber attack.
More Books in Political Science
Politics and Money: The New Road to Corruption
View
Criminal Justice Planning
View
Campaign journal: The political events of 1983-1984
View
Third World War: The Untold Story
View
Uniforms of the American Revolution in Color
View
Inside Soviet Military Intelligence
View
The Complete Idiot's Guide To American Government
View
Women at Ground Zero: Stories of Courage and Compassion
View
The REAL ANITA HILL
View