Title: A deterministic risk analysis and measurement model for assessing availability and integrity in command and control systems

Authors: Madjid Tavana; Dawn A. Trevisani; Thomas A. Clark

Addresses: Business Systems and Analytics Department, Lindback Distinguished Chair of Information Systems and Decision Sciences, La Salle University, Philadelphia, PA 19141, USA; Business Information Systems Department, Faculty of Business Administration and Economics, University of Paderborn, D-33098 Paderborn, Germany ' Air Force Research Laboratory, AFRL/RISB, 525 Brooks Road, Rome, NY 13441, USA ' Air Force Research Laboratory, AFRL/RISB, 525 Brooks Road, Rome, NY 13441, USA

Abstract: Military command and control (C2) systems are increasingly challenged by a host of modern problems, namely, internal vulnerabilities and external threats. Several approaches have been suggested in the literature to measure availability and integrity in C2 systems. Despite the importance of developing and maintaining self-protecting and self-healing processes, the simultaneous consideration of availability and integrity has received little attention in the literature. We propose a deterministic quantitative risk analysis and measurement (Q-RAM) framework for C2 systems which is focused on the failure risk induced by internal vulnerabilities and external threats present in the C2 systems. The proposed system allows risk managers to get a comprehensive snapshot of the system availability and integrity, assess the failure risks with the assistance of a multi-factor risk metric, and manage those risks by searching for the best combination of countermeasures, allowing the user to determine the preferred tradeoff between the system's availability and integrity costs.

Keywords: mlitary command and control; risk assessment; C2 systems; system availability; system integrity; countermeasures; risk measurement; internal vulnerabilities; external threats; risk management; integrity costs.

DOI: 10.1504/IJDATS.2014.066605

International Journal of Data Analysis Techniques and Strategies, 2014 Vol.6 No.4, pp.327 - 347

Published online: 14 Jan 2015 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article