1.1
1
xml
info:srw/schema/1/dc-v1.1
Cross impact security analysis using the HACKING Game
Arthur H. Hendela
Murray Turoff
Starr Roxanne Hiltz
S. French, B.T., C. Zobel
Security of network assets is a high priority with little traditional return on investment. Increasingly, cyber attacks are being used by both terrorist and unfriendly government organizations. The HACKING Game, a Cross Impact Analysis planning tool, can be used to plan security resource allocation in computer networks. Cross Impact Analysis provides a mathematical basis to determine the interrelationships of one event with a set of other events. Output from the HACKING Game's Cross Impact Analysis model can be used to help justify security expenditures, with an added benefit of being a training tool for employees learning to protect networks. This paper presents details of the Hacking Game's design and its capabilities. Cross impact modeling can be used to develop games for any situation characterized by a set of offense and defense events to produce an individual or collaborative model for such things as natural and man-made disasters.
openurl:?ctx_ver=Z39.88-2004&rfr_id=info%3Asid%2Fidl.iscram.org%2F&genre=proceeding&title=Cross%20impact%20security%20analysis%20using%20the%20HACKING%20Game&stitle=ISCRAM%202010&issn=2411-3387&date=2010&aulast=Arthur%20H.%20Hendela&au=Murray%20Turoff&au=Starr%20Roxanne%20Hiltz&pub=Information%20Systems%20for%20Crisis%20Response%20and%20Management%2C%20ISCRAM&place=Seattle%2C%20WA&sid=refbase%3AISCRAM
url:http://idl.iscram.org/show.php?record=569
citekey:ArthurH.Hendela_etal2010
citation:Arthur H. Hendela, Murray Turoff, & Starr Roxanne Hiltz. (2010). Cross impact security analysis using the HACKING Game. In C. Zobel B. T. S. French (Ed.), ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings. Seattle, WA: Information Systems for Crisis Response and Management, ISCRAM.
2010
ConferencePaper
text
Crime
Information systems
Models
Personnel training
Collaborative model
Cross-impact analysis
Gaming
Government organizations
Mathematical basis
Natural and man-made disasters
Planning tools
Security expenditures
Personal computing
file:http://idl.iscram.org/files/hendela/2010/569_Hendela_etal2010.pdf
Information Systems for Crisis Response and Management, ISCRAM
English
2411-3387
ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings
2010
1