Home Social Sciences The Role of Modeling in the Resilience of Cyberinfrastructure Systems and Preparedness for Cyber Intrusions
Article
Licensed
Unlicensed Requires Authentication

The Role of Modeling in the Resilience of Cyberinfrastructure Systems and Preparedness for Cyber Intrusions

  • Clyde G Chittister and Yacov Y. Haimes
Published/Copyright: January 23, 2011

The personal computer, and cyber technology in general, opens the doors to the world. Unless an organization can cultivate the flexibility to adapt its processes to the demands of this new technology, it could diminish its capability to execute effective protective and responsive countermeasures against malevolent or unwanted cyber intrusion. In this paper, we define and use the term cyberinfrastructure system to connote a generalized complex, large-scale cyberinfrastructure network that includes hardware, software, organizational policies and procedures, and that is connected to the Internet (e.g., by means of telephone lines, wireless devices, and high-speed technology). Following a malevolent cyber attack, the original cyberinfrastructure security model could have been (unbeknownst to the system’s operators) perturbed and changed, not by its designers, but by adversaries. In other words, the road-map design of the cyberinfrastructure system, which connotes the policies, procedures, methods, connections, and other human and organizational activities that define the functionality of the cyberinfrastructure system, could have been changed following a malevolent cyber attack. Resilience of a cyberinfrastructure system, which is central to its security, is defined as the ability of the system to withstand a major disruption within acceptable degradation parameters and to recover within an acceptable composite cost and time. The central role of systems integration in cyber security is highlighted because it not only connotes the integration of components, but also involves an understanding of the functionality that emerges from that integration. Systems modeling is indispensable in developing awareness when a cyberinfrastructure is intruded and is being violated. Cyberinfrastructure security is essentially multidimensional and of multi-scale compositions—from molecular to macro dimensions—and its wholeness is characterized by multiple and varied paths of interdependence. Thus, this paper advocates a holistic approach as requisite to understanding not only its myriad parts and functionality but also the forced changes imposed upon it both from within and without its domains. Furthermore, models can play a central role in intrusion detection, thus enabling information managers to develop protective and remedial courses of action. They can also be used to answer a wide range of questions, including how to deceive would-be intruders and lead them to believe they are inflicting damage on the real intended system. Through logically organized and systemically executed models, the Phantom System Models (PSM) laboratory, introduced in Section I, is aimed at providing a reasoned experimental modeling framework with which to explore and thus understand the intricate relationships that characterize the nature of multi-scale emergent systems.

Published Online: 2011-1-23

©2011 Walter de Gruyter GmbH & Co. KG, Berlin/Boston

Articles in the same Issue

  1. Research Article
  2. Detection of Dangerous Materials and Illicit Objects in Cargoes and Baggage: Current Tools, Existing Problems and Possible Solutions
  3. Trust in Public Safety Answering Points: A Swedish National Survey in the Late Modern Network Society
  4. Crossing Paths: Trend Analysis and Policy Review of Highway-Rail Grade Crossing Safety
  5. Accidental Releases of Hazardous Materials and Relevance to Terrorist Threats at Industrial Facilities
  6. Importance of Uniformity in Local Emergency Management Agency Web Sites
  7. Centralization and Decentralization of Policy: The National Interest of Homeland Security
  8. Text Analysis of After Action Reports to Support Improved Emergency Response Planning
  9. A Social Vulnerability Index for Disaster Management
  10. The Role of Modeling in the Resilience of Cyberinfrastructure Systems and Preparedness for Cyber Intrusions
  11. From the McDonald Report to the Kelly Committees: The Government Research and Policy Making Process Connected to Oppositional Political Terrorism in Canada
  12. The Private Sector and the Role of Risk and Responsibility in Securing the Nation's Infrastructure
  13. Volunteer Fire Department Perceptions of ICS and NIMS
  14. Optimal Blends of History and Intelligence for Robust Antiterrorism Policy
  15. Is Better Nuclear Weapon Detection Capability Justified?
  16. Request and Response Processes for Department of Defense Support during Domestic Disasters
  17. Coping through a Disaster: Lessons from Hurricane Katrina
  18. The Current NIMS Implementation Behavior of United States Counties
  19. Public Support for the Department of Homeland Security
  20. Experimenting with GIS in Doing Damage Assessments: A Trial Run at Disaster City
  21. Delayed-Bang Approach Towards More Sustainable Critical Infrastructure Risk Management
  22. Mobilizing for International Disaster Relief: Comparing U.S. and EU Approaches to the 2010 Haiti Earthquake
  23. Committed to Protection? Partnerships in Critical Infrastructure Protection
  24. Mitigating Terror and Avoidance Behavior through the Risk Perception Matrix to Augment Resilience
  25. Cost-Benefit Analysis of Advanced Imaging Technology Full Body Scanners for Airline Passenger Security Screening
  26. Using Systemigrams in Problem Definition: A Case Study in Maritime Resilience for Homeland Security
  27. Understanding User Needs for Map Symbol Standards in Emergency Management
  28. Decisions in Disaster Recovery Operations: A Game Theoretic Perspective on Organization Cooperation
  29. Terrorism Preparedness and Exposure Reduction since 9/11: The Status of Public Readiness in the United States
  30. Social Media Analytics for Radical Opinion Mining in Hate Group Web Forums
  31. Bioterrorism and U.S. Domestic Preparedness: Bureaucratic Fragmentation and American Vulnerability
  32. Improved Situational Awareness in Emergency Management through Automated Data Analysis and Modeling
  33. Active Shooter on Campus: Evaluating Text and E-mail Warning Message Effectiveness
  34. Engineering the Incident Command and Multiagency Coordination Systems
  35. Developing and Testing an Emergency Notification System for a County Emergency Management Agency
  36. Use of an Emergency Notification System in a Multi-Agency Functional Emergency Exercise: Feedback from Participants
  37. Minimizing Safety and Health Impacts at Disaster Sites: the Need for Comprehensive Worker Safety and Health Training Based on an Analysis of National Disasters in the U.S.
  38. Book Review
  39. Review of The Feeling of Risk: New Perspectives on Risk Perception
  40. Review of Changing Climate, Changing Economy
  41. Review of Comparative Emergency Management: Examining Global and Regional Responses to Disasters
  42. Review of Science and Technology of Terrorism and Counterterrorism
  43. Review of The Shock of the News: Media Coverage and the Making of 9/11
  44. Review of Enhancing Disaster and Emergency Preparedness, Response, and Recovery through Evaluation
  45. Review of Establishing a Healthcare Emergency Response Coalition
  46. Review of Designing Resilience: Preparing for Extreme Events
  47. Review of Disaster Law
  48. Review of The World in 2050: Four Forces Shaping Civilization's Northern Future
  49. Review of Homeland Security: Best Practices for Local Government
  50. Review of Security and Emergency Planning for Water and Wastewater Utilities
  51. Review of Implementing the Incident Command System at the Institutional Level: A Handbook for Libraries, Archives, Museums, and Other Cultural Institutions
  52. Communication/News
  53. BioWatch and the Brown Cap
  54. A Continuity of Operations Planning Template: Translating Public Policy into an Effective Plan
  55. Shelter-in-Place and Evacuation Training for a Large Midwestern County
  56. New Report on Resilience
  57. Role of Pastors in Disasters Curriculum Development Project: Preparing Faith-Based Leaders to be Agents of Safety
  58. Opinion
  59. Interdiction Models and Homeland Security Risks
  60. Ethical Questions Surrounding Health Care Resource Allocations for the Strategic National Stockpile
  61. Food for Thought Approaching the 10th Anniversary of 9/11: A Conversation with John Odermatt
Downloaded on 6.2.2026 from https://www.degruyterbrill.com/document/doi/10.2202/1547-7355.1577/pdf
Scroll to top button