Reference Hub2
Mission Assurance Challenges within the Military Environment

Mission Assurance Challenges within the Military Environment

Scott Musman, Michael R. Grimaila
Copyright: © 2013 |Volume: 5 |Issue: 2 |Pages: 15
ISSN: 1941-8663|EISSN: 1941-8671|EISBN13: 9781466632660|DOI: 10.4018/jitn.2013040105
Cite Article Cite Article

MLA

Musman, Scott, and Michael R. Grimaila. "Mission Assurance Challenges within the Military Environment." IJITN vol.5, no.2 2013: pp.51-65. http://doi.org/10.4018/jitn.2013040105

APA

Musman, S. & Grimaila, M. R. (2013). Mission Assurance Challenges within the Military Environment. International Journal of Interdisciplinary Telecommunications and Networking (IJITN), 5(2), 51-65. http://doi.org/10.4018/jitn.2013040105

Chicago

Musman, Scott, and Michael R. Grimaila. "Mission Assurance Challenges within the Military Environment," International Journal of Interdisciplinary Telecommunications and Networking (IJITN) 5, no.2: 51-65. http://doi.org/10.4018/jitn.2013040105

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Virtually all modern organizations have embedded information and communication technologies into their core processes as a means to increase operational efficiency, improve decision quality, and reduce operational costs. However, this dependence can place the organizational mission at risk when an incident occurs that compromises a cyber resource critical to the success of the organizational mission. In this paper, the authors examine the challenges of developing and maintaining a mission-wide understanding of organizational mission risk within military environments. Specifically, they examine the concept of mission assurance, discuss various factors which must be taken into account when describing military missions, analyze the four primary types of representations used to capture mission-to-cyber relationships, and highlight the complexities of documenting cyber dependencies for the purpose of achieving mission assurance.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.