william de angelis | Solvay Brussels School Of Economics And Management (original) (raw)

william de angelis

Related Authors

Brian Ulicny

Gregory Parnell

Computer Science & Information Technology (CS & IT) Computer Science Conference Proceedings (CSCP)

Fabrizio Baiardi

bla bla

bla bla

Università degli studi di Camerino UNICAM

Uploads

Papers by william de angelis

Research paper thumbnail of Threat Assessment & Remediation Analysis (TARA) Methodology Description Version 1.0 Sponsor: OSD (NII

Mission Assurance Engineering (MAE) is the sub discipline of Enterprise Systems Engineering (ESE)... more Mission Assurance Engineering (MAE) is the sub discipline of Enterprise Systems Engineering (ESE) intended to provide mission assurance against the advanced persistent threat (APT). The APT uses an evolving set of tactics, techniques, and procedures (TTPs) to establish and maintain a foothold in the enterprise's information infrastructure, and to exploit that foothold to ex-filtrate large volumes of sensitive information, to corrupt mission-critical information, and/or to deny or degrade mission capabilities. This report describes the Threat Assessment & Remediation Analysis (TARA) methodology, which applies MAE to systems and acquisitions. TARA is a methodology to identify and assess cyber threats and select countermeasures effective at mitigating those threats. When applied in conjunction with a Crown Jewels Analysis (CJA) or other means for assessing mission impact, CJA and TARA together provide for the identification, assessment, and security enhancement of mission critical assets, which is the cornerstone of mission assurance. iv

Research paper thumbnail of Threat Assessment & Remediation Analysis (TARA) Methodology Description Version 1.0 Sponsor: OSD (NII

Mission Assurance Engineering (MAE) is the sub discipline of Enterprise Systems Engineering (ESE)... more Mission Assurance Engineering (MAE) is the sub discipline of Enterprise Systems Engineering (ESE) intended to provide mission assurance against the advanced persistent threat (APT). The APT uses an evolving set of tactics, techniques, and procedures (TTPs) to establish and maintain a foothold in the enterprise's information infrastructure, and to exploit that foothold to ex-filtrate large volumes of sensitive information, to corrupt mission-critical information, and/or to deny or degrade mission capabilities. This report describes the Threat Assessment & Remediation Analysis (TARA) methodology, which applies MAE to systems and acquisitions. TARA is a methodology to identify and assess cyber threats and select countermeasures effective at mitigating those threats. When applied in conjunction with a Crown Jewels Analysis (CJA) or other means for assessing mission impact, CJA and TARA together provide for the identification, assessment, and security enhancement of mission critical assets, which is the cornerstone of mission assurance. iv

Log In