Cyber Risk to Mission Analysis�
Methodology for Assessing and Communicating Mission Risk from Cyber Threats and Hazards
prepared for the
30th International C2 Research and Technology Symposium
Dr. David S. Alberts
Senior Fellow
Institute for Defense Analyses
Dr. Jimmie G. McEver, Ph.D., M.P.P.
Principal Scientist
JHU Applied Physics Laboratory
10-1-25
Précis
2
8 November 2025
Power and Vulnerability of a Co-evolved Cyber-Enabled Force
1
2
Impact of Cyber Degradation�Degrades effectiveness and erodes synergies
1
2
Cyber capabilities revolutionize military operations, enabling speed, precision, and agility
But they introduce new risks: disruption, degradation, or denial can reverse advantage
3
Real-World Degradation to DoD Global Logistics Mission/Commercial Airlines: �Notice to Air Missions (NOTAMs)
4
Commercial Critical Infrastructure
DIB, FAA NOTAMs system, communications, transportation sector
Priority DoD Missions (NIST Tier 2)
Global Logistics
DoD Critical Infrastructure
Military airport, DoD installations
DoD Networks (NIST Tier 3)
Defense Internet NOTAM Service (DINS)
Civil Reserve Air Fleet, Supply Chain Risk Management, Commercial NOTAM Management Tool
DoD Weapons Systems / Platforms
USTRANSCOM AOC
DoD Organizations (NIST Tier 1)
USTRANSCOM, USAF
Incident 1
Nov 2022
1
Cyber-attack degrades data integrity for commercial NOTAM management tool; company takes tool offline in response
2
CRAF carrier does not possess trusted NOTAMs data
3
CRAF carrier delays, cancels flights while NOTAMs tool offline
4
PAXs delayed
USTRANSCOM
Global Logistics
FAA NOTAM System
Omni Air
Jeppesen NOTAM Management Tool
1
2
3
4
1
2
Incident 2
Jan 2023
1
Poor database management allowed an inadvertent input error to degrade FAA NOTAM System data integrity; FAA issues ground stop until it can ensure data integrity
2
DoD airlift unaffected as DoD possesses its own NOTAMs system: DINS
System offline for ~14 hours, ~1,100 PAX delayed
First ground stop since September 11, 2001
~1,300 flights cancelled,
~10,000 flights delayed
CRM is a real and present Mission Risk
Cyberspace is a Contested Operational Domain
5
Tier | Adversary Offensive Cyber Capability |
IV | Advanced – Have the capacity to conduct complex, long term cyber attack operations that combine multiple intelligence disciplines to obtain access to high-value networks |
III | Moderate – Able to use customized malware with OPSEC practices to conduct wider-range intelligence collection operations, gain access to more isolated networks, and create short duration effects against critical infrastructure networks. |
II | Limited – Able to identify and target for espionage or attack easily accessible unencrypted networks running common operating systems using publicly available tools. |
I | Nascent – Little to no organized cyber capabilities, with no knowledge of a networks underlying systems or industry beyond publicly connected open-source information. |
Existential
Nuisance
Managing Cyber Risk to Mission is Necessary to Operating �in a Contested Cyber Environment
Tier
IV
― $Bs ―
Tier
III
― $Ms ―
Tiers
I - II
― $10s ―
Cyber Attacks Create Mission Effects in Different Ways
6
Attack Type | Definition | Example | Potential Mission Impact |
Availability | Prevents access to information or systems needed to perform a mission function. | A distributed denial-of-service (DDoS) attack disables a command and control (C2) node during force deployment. | Delays force coordination, reducing tempo and synchronization of operations, potentially risking mission failure. |
Integrity | Alters or corrupts information, causing users to act on false or misleading data. | A logistics database is tampered with to show incorrect fuel depot locations. | Forces misallocation of resources or unit movements, degrading mission effectiveness and increasing vulnerability. |
Confidentiality | Exposes sensitive information to unauthorized parties, enabling adversary insight. | Adversary exfiltrates operational plans from an unencrypted email server. | Adversary anticipates friendly actions, allowing them to preempt or neutralize mission objectives. |
*National Institute of Standards and Technology. (2017). An Introduction to Information Security (NIST Special Publication 800-12 Rev. 1). Gaithersburg, MD: U.S. Department of Commerce.
Defining Cyber Risk to Mission
7
CRM Assessment Elements
Define Mission Context and Scope
Characterize the Cyber Threat Environment
Characterize Cyber Defense and Response Capabilities
Identify Plan-related
Mission Critical Cyber Terrain
Translate Cyber Damage
into Mission Impacts
Communicate Findings
Determine Mission Risk
8
Design Primary and Contingency Plans
Project Cyber Damage
8
CRM Analysis Methodology
“Mission Critical Cyber Capabilities Damaged and not Restored in a Timely Manner” provides the link between cyber-enabled and mission effectiveness.
9
Potential Threats and Hazards
Events
Damage to Critical Cyber Enabled Capability
Cyber Damage Not Restored �in a Timely Manner
Potential Impact on Mission
Impact Mitigation/ Adaptation
Impact on Mission
Cyber
Risk
To
Mission
Deterrence & Prevention Strategy
Damage Assessment & Response
Restoration & Recovery
Risk�Judgement
Risk Management
Cyber Risk Assessment�Determining Extent/Duration of Damage to Cyber-Enabled Capabilities
Mission Risk Assessment�Determining Mission Impact of Degraded Capabilities
+
Identifying Mission-Critical Cyber Terrain
8 November 2025
10
Supported Mission
Supporting Mission
Supporting Mission
Mission Critical Cyber Terrain
All cyber-enabled assets
Cyber-enabled assets needed for different missions
Overlap: Assets needed for multiple missions
Importance of C2 Approach
11
The Impact of Perceptions
12
Cyber Terrain
Cyber Terrain: Defender Perception
Allocation of Defenders to Assets
Cyber Terrain: Attacker Perception
Allocation of Attackers to Targets
Damage to Cyber Terrain
Blue Perception of Cyber Damage
Allocation of Recovery/ Restoration Resources
Cyber Terrain Mission Availability
Decisions
Perception
Ground�Truth
Perception
Decisions
Mission�Risk
Assessment
Contingency Plans Enable Agility
*PACE Plans (Primary, Alternate, Contingency, Emergency)
13
Cyber Terrain May Vary for Different Mission Options
8 November 2025
14
Alternative�Plan
Primary�Plan
Contingency�Plan
Mission Critical Cyber Terrain (shaded)
All cyber-enabled assets
Shaded: Cyber-enabled assets needed for different mission plans
Overlap: Assets needed for multiple plans
Emergency�Plan
Need for Timely Switching between Contingency Plan Options
Projected
Mission
Outcome �(e.g., % Objectives Achieved)
20
80
60
40
0
% Primary-Plan Mission Critical Cyber Assets Damaged and �Not Restored in a Timely Manner
0
40
60
80
100
20
Alternative
Continency
Primary
100
Best Contingency Plan Option as a Function of Unrestored Damage
Primary -> Alternate Plan Decision Point
Primary Plan Response Curve to Cyber Asset Damage
Alternative Plan Response Curve
Alternate -> Contingency Plan Decision Point
20
15
Risk Matrix
HIGH RISK:
Maximum level of expected impact on the thing of value
SIGNIFICANT RISK:
Severe level of expected impact on the thing of value
MODERATE RISK:
Medium level of expected impact on the thing of value
LOW RISK:
Little to no expected impact on the thing of value
Risk Levels*
* CJCSM 3105.01B
extreme
major
modest
minor
very�unlikely�<20%
unlikely��21-50%
likely��51-80%
very�likely�>80%
Probability
Consequence
16
Notional Mission Impact Scorecard for the Global Logistics Mission�
17
Sources of Insight for CRM Analysis Can Be Varied
| Source of Evidence | Description | Advantages | Disadvantages |
Qualitative | Expert Judgment | SMEs assess based on knowledge, experience, and structured discussion. | Quick, intuitive, accessible to leadership. | Can be biased or inconsistent; limited traceability. |
Wargaming / Tabletop Exercises | Structured scenarios with participants role-playing decisions and adversary actions. | Encourages interdisciplinary and cross-domain insights; simulates adversary dynamics. | Less quantitative; facilitator-dependent. | |
Quantitative- Informed Qualitative | Model-Driven Wargaming TTX | Structured scenarios with participants provided with model-driven situation displays that are used to inform their decision-making | Adds transparency to wargames/TTXs and makes them more repeatable | Can be personnel and data intensive to execute Can be difficult to sync kinetic and cyber elements of the event |
Quantitative | Parametric Models | Simplified quantitative models estimating CRM using parameters and assumptions. | Supports transparent, �repeatable analysis across �many cases. | May oversimplify complex, �dynamic effects. |
High-Fidelity M&S | Detailed simulations modeling cyber effects, system behavior, and campaign dynamics. | High resolution, rigorous, �captures cascading effects. | Data- and resource-intensive; slower to execute; often lacks means for representing information and cognitive effects |
18
Using CRM Analysis Results to Inform Risk Decisions�
19
Backup
8 November 2025
20
Mission Stack for a Generalized Mission
21
The Impact of Perceptions
22
Cyber Terrain
Cyber Terrain: Defender Perception
Allocation of Defenders to Assets
Cyber Terrain: Attacker Perception
Allocation of Attackers to Targets
Damage to Cyber Terrain
Blue Perception of Cyber Damage
Allocation of Recovery/ Restoration Resources
Cyber Terrain Mission Availability
Decisions
Perception
Ground�Truth
Perception
Decisions
Mission�Risk
Assessment
1
3
5
6
9
7
2
4
8
Information/Inputs Needed for CRM Analysis
23
Global Logistics Mission Thread and Mission Stack
Non-DoD Transportation Dependencies
24
Mission Stack for the “Fort-to-Port” Portion of the Global Logistics Mission.�
25
Observed Attacks and ‘Blue on Blue’ Cyber Events
26