Low cost mac repairs London |Low cost mac liquid damage repairs | Low cost Mac Screen Replacement
Cascading Attack Damage. What is the real cost of a cyber-attack? The cost of the service attacked...
-
date post
20-Dec-2015 -
Category
Documents
-
view
216 -
download
0
Transcript of Cascading Attack Damage. What is the real cost of a cyber-attack? The cost of the service attacked...
What is the real cost of a cyber-attack?
The cost of the service attacked may not reflect the real amount of damage.
Many other services may rely on the attacked service, causing a cascade.
How can we determine the real cost associated with the cascade?
Values A Value defines an object in JAC. The Value is used to calculate the value of
damage to an object.
Dependencies A dependency is defined between two
objects with defined Values. The dependency of A
on B is defined as the percentage of A that requires B.
Damage You attack an object by assigning it
Damage. Damage is defined as the percentage
of the object that is damaged.
System Architecture
Remote Java Beans (planned)
GUI “Thick” Clients
WebServlet
Jess RuleEngine
EconomicDamage
Coefficient Model
Local Java Beans (planned)
RMI
Rete EngineQueries
Parsing / RuleGenerator
Web “Thin” Clients (planned)
Adding Dependancies You can provide a weight to the
dependency. This weight is the percentage of the affect on the affected object.
Removing Values, Affects, & Damage
You can remove any value, dependency, or damage by selecting it and clicking the appropriate remove button.
Cascading Damage Once you have defined Values,
Dependencies, and Added damage for at least one object in the domain, you can cascade the attack.