By Topic

Use of Bayesian belief networks in the analysis of information system network risk

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
R. J. Staker ; Inf. Technol. Div., Defence Sci. & Technol. Organ., Salisbury, SA, Australia

Information system networks are becoming increasingly pervasive in military applications, and thereby increasingly important to the conduct of modern warfare. They are also, consequently, increasingly becoming a target in themselves for attack. These considerations lead to the concept of command and control warfare, and, more generally, information warfare which focus on the decision making elements of an adversary force. Complementary to the offensive aspect of information warfare is the problem of determining the risks associated with a commander's own assets, and the devising of appropriate defensive measures, which is a similarly complex task. This paper describes a simple tool, based upon the use of Bayesian networks and a straightforward application of the graph theory, which is intended to assist commanders in determining the level of risk associated with their information system network assets, as well as the selection of countermeasures to reduce that risk level

Published in:

Information, Decision and Control, 1999. IDC 99. Proceedings. 1999

Date of Conference: