=Paper= {{Paper |id=Vol-2057/Paper5 |storemode=property |title=None |pdfUrl=https://ceur-ws.org/Vol-2057/Paper5.pdf |volume=Vol-2057 }} ==None== https://ceur-ws.org/Vol-2057/Paper5.pdf
      IST-153 Workshop on Intelligent Autonomous Agents for Cyber Defence and Resilience


                              Cyber security: Risk versus Resilience
                                           Position Paper
             Igor Linkov, Alexander Ganin, Benjamin D. Trump, Kelsey Poinsatte-Jones


       US Army Corps of Engineers, Engineering Research and Development Center, Virginia
       Road, Concord, MA 01742. Phone: (617) 233-9869
       Email: Igor.Linkov@usace.army.mil; aag2k@virginia.edu;
       benjamin.d.trump@usace.army.mil; Kelsey.M.Poinsatte-Jones@usace.army.mil


Representation of world model, missions, objectives and rules of engagement is of crucial
importance in agent-based modelling. There is a great deal of confusion in the field of
cybersecurity on whether reduction or risk or enhancing resilience constitute the ultimate
mission with risk and resilience being used interchangeably. We argue that risk and resilience
are fundamentally different but should be used complimentary in dealing with cyber threats.
While risk assessment is a useful tool to identify and characterize known, quantifiable system
threats, resilience analysis is useful for the preparation, absorption, recovery, and adaptation of
infrastructural, social, and informational systems against unknown, uncharacterized, low-
probability events. The resilience analysis can be used to not only identify and reduce
vulnerabilities of individual components but also to return systems back to original functionality
and adaptation following an adverse event. Given the complementary nature of these two
approaches and complexity of cyber threats, resilience analysis and risk assessment must be
considered as a dual mission in agent based modeling.

Traditionally, cyber threats are approached from the position of risk analysis. For the context of
cybersecurity, risk analysis is focused on the evaluation of threats (e.g., deliberate cyber-
attacks) that exploit system vulnerabilities that result in economic or political consequences.
Risk is the product of various hazards, vulnerabilities, and consequences, whereby risk analysts
seek to gain a measure of the damage that could be incurred by a given threat alongside its
relative likelihood of occurrence. These efforts are well described in literature for routine and
well characterized threats, yet generally rely upon robust sources of quantitative data to
populate an assessment. Unfortunately, cybersecurity threats exploit increasingly complex
information systems and technology networks in a manner that is rarely predictable and is
difficult to quantify. As such, traditional risk assessment may not be able to address
cybersecurity concerns in the near term.

Resilience analysis can serve as a complementary approach to explore threats that are
inherently complex in nature, and are difficult to predict or characterize. Resilience practitioners
adopt a systems-view of threat, where emphasis is placed upon reviewing a system’s dynamical
properties, such as robustness, recoverability, and adaptability, for a wide range of potential
threats. Where resilience would allow users to review system absorption and recovery for cyber
threats, we use two methods to operationalize resilience in various contexts. This includes (i)
resilience matrices, and (ii) network science. For the former, a resilience matrix utilizes a
decision analytical approach to integrate disparate sources of qualitative and semi-quantitative
information to assess system performance across multiple domains, including physical,
information, and social. For the latter, network science quantitatively assess a system’s topology
and interdependencies, where a failure could trigger cascading failures in other connected
components of the system. Such approaches can help identify, in real time, the best available
options to mitigate damage from cyber threats, as well as identify those alternatives available to
reduce the time, money, and manpower needed to recover from such threats.