1.1
1
xml
info:srw/schema/1/mods-v3.2
Cross impact security analysis using the HACKING Game
Arthur H. Hendela
author
Murray Turoff
author
Starr Roxanne Hiltz
author
2010
Information Systems for Crisis Response and Management, ISCRAM
Seattle, WA
English
Security of network assets is a high priority with little traditional return on investment. Increasingly, cyber attacks are being used by both terrorist and unfriendly government organizations. The HACKING Game, a Cross Impact Analysis planning tool, can be used to plan security resource allocation in computer networks. Cross Impact Analysis provides a mathematical basis to determine the interrelationships of one event with a set of other events. Output from the HACKING Game's Cross Impact Analysis model can be used to help justify security expenditures, with an added benefit of being a training tool for employees learning to protect networks. This paper presents details of the Hacking Game's design and its capabilities. Cross impact modeling can be used to develop games for any situation characterized by a set of offense and defense events to produce an individual or collaborative model for such things as natural and man-made disasters.
Crime
Information systems
Models
Personnel training
Collaborative model
Cross-impact analysis
Gaming
Government organizations
Mathematical basis
Natural and man-made disasters
Planning tools
Security expenditures
Personal computing
exported from refbase (http://idl.iscram.org/show.php?record=569), last updated on Sat, 08 Aug 2015 12:12:15 +0200
text
http://idl.iscram.org/files/hendela/2010/569_Hendela_etal2010.pdf
ArthurH.Hendela_etal2010
ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings
ISCRAM 2010
S. French
B
Tomaszewski
editor
7th International ISCRAM Conference on Information Systems for Crisis Response and Management
2010
Information Systems for Crisis Response and Management, ISCRAM
Seattle, WA
conference publication
2411-3387
1