Cross impact security analysis using the HACKING Game

Arthur H. Hendela, Murray Turoff, Starr Roxanne Hiltz

Research output: Contribution to conferencePaperpeer-review

2 Scopus citations

Abstract

Security of network assets is a high priority with little traditional return on investment. Increasingly, cyber attacks are being used by both terrorist and unfriendly government organizations. The HACKING Game, a Cross Impact Analysis planning tool, can be used to plan security resource allocation in computer networks. Cross Impact Analysis provides a mathematical basis to determine the interrelationships of one event with a set of other events. Output from the HACKING Game's Cross Impact Analysis model can be used to help justify security expenditures, with an added benefit of being a training tool for employees learning to protect networks. This paper presents details of the Hacking Game's design and its capabilities. Cross impact modeling can be used to develop games for any situation characterized by a set of offense and defense events to produce an individual or collaborative model for such things as natural and man-made disasters.

Original languageEnglish (US)
StatePublished - Jan 1 2010
Event7th International Conference on Information Systems for Crisis Response and Management, ISCRAM 2010 - Seattle, WA, United States
Duration: May 2 2010May 5 2010

Other

Other7th International Conference on Information Systems for Crisis Response and Management, ISCRAM 2010
CountryUnited States
CitySeattle, WA
Period5/2/105/5/10

All Science Journal Classification (ASJC) codes

  • Information Systems

Keywords

  • Cross Impact Analysis
  • Gaming
  • Modeling
  • Planning tools

Fingerprint Dive into the research topics of 'Cross impact security analysis using the HACKING Game'. Together they form a unique fingerprint.

Cite this