Complex Systems engineering in a federal IT environment: Lessons learned from traditional enterprise-scale system design and change

Author(s):  
Michael D. Norman
1999 ◽  
Vol 18 (3) ◽  
pp. 156-160 ◽  
Author(s):  
Paul Gruhn

2017 ◽  
Vol 139 (03) ◽  
pp. S9-S12
Author(s):  
Brian Connett ◽  
Bryan O’Halloran

This article presents a combination of known models and system design techniques that result in an architectural framework that is predictive. The article also provides a methodical recommendation that develops the way defense of a cyber critical infrastructure can be most effective. Firstly, historical background has been provided to motivate the current political theme, followed by modeling theory that has been published. Classical systems engineering foundations are reviewed to adapt modeling environment to the current cyber conflict problem in a way that allows a systems owner to posture most effectively against anomalies across the network of communication nodes. The implication of the model presented in the article is that a protection posture can be estimated, and can quickly turn into a balanced engagement between the attacker and defender. When optimized within decision algorithms, data will exist to illuminate what process can be implemented in defense. Using classical systems engineering fundamentals, modeling simulation, and proven mathematical approaches, this research seeks to support such implementation.


2021 ◽  
Author(s):  
Stuart Fowler ◽  
Keith Joiner ◽  
Elena Sitnikova

<div>Cyber-worthiness as it is termed in Australian Defence, or cyber-maturity more broadly, is a necessary feature of modern complex systems which are required to operate in a hostile cyber environment. To evaluate the cyber-worthiness of complex systems, an assessment methodology is required to examine a complex system’s or system-of-system’s vulnerability to and risk of cyber-attacks that can compromise such systems. This assessment methodology should address the cyber-attack surface and threat kill chains, including supply chains and supporting infrastructure. A cyber-worthiness capability assessment methodology has been developed based on model-based systems engineering concepts to analyse the cyber-worthiness of complex systems and present a risk assessment of various cyber threats to the complex system. This methodology incorporates modelling and simulation methods that provide organisations greater visibility and consistency across diverse systems, especially to drive cybersecurity controls, investment and operational decisions involving aggregated systems. In this paper, the developed methodology will be presented in detail and hypothesised outcomes will be discussed.</div>


Sign in / Sign up

Export Citation Format

Share Document