Filters








3,123 Hits in 6.3 sec

Quantifiable Comparable Evaluations of Cyber Defensive Capabilities: A Survey Novel, Unified Approach [article]

Michael D. Iannacone, Robert A. Bridges
2019 arXiv   pre-print
In this paper we provide two primary contributions to the security evaluation literature - a representative survey, and a novel framework for evaluating security that is flexible, applicable to all three  ...  , evaluation of cyber exercises, e.g.  ...  Special thanks to Kerry Long for his insights and guidance during our authorship of this paper, to Miki Verma, Dave Richardson, Brian Jewell, and Jason Laska for helpful discussions, and to the many SOC  ... 
arXiv:1902.00053v3 fatcat:wjtkadjct5gljgk32kjsricze4

A Methodology to Evaluate Standards and Platforms within Cyber Threat Intelligence

Alessandra de Melo e Silva, João Costa Gondim, Robson de Oliveira de Oliveira Albuquerque, Luis Javier García Villalba
2020 Future Internet  
Thus, organizations were encouraged to change their traditional defense models and to use and to develop new systems with a proactive approach.  ...  This work aims to provide a comprehensive evaluation methodology of threat intelligence standards and cyber threat intelligence platforms.  ...  Based on the exposed, the four main entities used to delineate a holistic representation of the cyber threat intelligence scenario are threat, incident, threat actor and defense.  ... 
doi:10.3390/fi12060108 fatcat:ucbb5kjjgjdhpjs6cjpv77txrq

Trust as a Human Factor in Holistic Cyber Security Risk Assessment

D. Henshel, M.G. Cains, B. Hoffman, T. Kelley
2015 Procedia Manufacturing  
As part of an on-going effort to develop a holistic, predictive cyber security risk assessment model, the characterization of human factors, which includes human behavior, is needed to understand how the  ...  Holistic assessment of cyber security risks is a complex multi-component and multi-level problem involving hardware, software, environmental, and human factors.  ...  Acknowledgements Research was sponsored by the Army Research Laboratory and was accomplished under Cooperative Agreement Number W911NF-13-2-0045 (ARL Cyber Security CRA).  ... 
doi:10.1016/j.promfg.2015.07.186 fatcat:x7hvgwvsunggno2uvaqhxf7dtm

Inefficiencies in Cyber-Security Exercises Life-Cycle: A Position Paper

Muhammad Mudassar Yamin, Basel Katt
2018 AAAI Fall Symposia  
To tackle the increasing amount of cyberattacks, cyber-security professionals are required in a high number. However, the required number of cybersecurity professionals is not present.  ...  Despite the fact that academia and industry are trying to increase the number of cyber-security professionals, however, the tools and techniques used for cyber-security professional development are ineffective  ...  The scoring mechanism in KYPO cyber range is a very good approach for automatic evaluation of a participants performances in a cyber security-exercsie by monitoring the event logs created by the participants  ... 
dblp:conf/aaaifs/YaminK18 fatcat:qilbzu34y5drpmcj2a3k7yq47a

Supply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions

Theresa Sobb, Benjamin Turnbull, Nour Moustafa
2020 Electronics  
This is examined from a holistic standpoint and through technology-specific lenses to determine current states and implications for future research directions.  ...  Supply chain 4.0 has a lack of semantic standards, poor interoperability, and a dearth of security in the operation of its manufacturing and Information Technology processes.  ...  Consideration of risk is a critical component of assessing the impact of technology to defense supply chains 4.0 but should be considered within a larger, holistic approach.  ... 
doi:10.3390/electronics9111864 fatcat:h54irum3krb77gsj4x76w2mabm

Towards a Human Factors Ontology for Cyber Security

Alessandro Oltramari, Diane S. Henshel, Mariana Cains, Blaine Hoffman
2015 Semantic Technologies for Intelligence, Defense, and Security  
As part of an on-going effort to develop a holistic, predictive cyber security risk assessment model, the characterization of human factors, which includes human behavior, is needed to understand how the  ...  Trust has been found to be a crucial element affecting an individual's role within a cyber system.  ...  ACKNOWLEDGMENTS This research was sponsored by the Army Research Laboratory and was accomplished under Cooperative Agreement Number W911NF-13-2-0045 (ARL Cyber Security CRA).  ... 
dblp:conf/stids/OltramariHCH15 fatcat:h2cwfistwzf4bfnsj7johlc4m4

A cyber-security framework for development, defense and innovation at NATO

Marios Panagiotis Efthymiopoulos
2019 Journal of Innovation and Entrepreneurship  
The article enables us to comprehend better the Alliance' global and regional needs the framework of current and future defense, requesting at the same time for a holistic approach to innovation and entrepreneurship  ...  The aim, design, and setting of this article explicitly and methodologically evaluates NATO's security and cyber-security options to come for the near future.  ...  Currently, an Associate Professor of International Security and Strategy, the author is authoring on cyber-security, strategy, and issues related with innovation and entrepreneurship at defense and security  ... 
doi:10.1186/s13731-019-0105-z fatcat:ec3heks2q5f6rdtsql4stbpyzq

Seeking Foundations for the Science of Cyber Security

Shouhuai Xu, Moti Yung, Jingguo Wang
2021 Information Systems Frontiers  
He pioneered the Cybersecurity Dynamics approach as foundation for the emerging science of cyber security, including: first-principle cybersecurity modeling and analysis (the x-axis); cybersecurity data  ...  Acknowledgements We sincerely thank the authors who submitted their papers to SciSec'2019 and to this special issue, the Program Committee of SciSec'2019 for selecting papers for its Proceedings, the Organization  ...  Deceptive cyber defense is an important approach to cyber security which is little understood.  ... 
doi:10.1007/s10796-021-10134-8 fatcat:ljnbztx3cnferew5kcluy6nelm

Cybersecurity Dynamics: A Foundation for the Science of Cybersecurity [article]

Shouhuai Xu
2020 arXiv   pre-print
Cybersecurity Dynamics is new concept that aims to achieve the modeling, analysis, quantification, and management of cybersecurity from a holistic perspective, rather than from a building-blocks perspective  ...  It is centered at modeling and analyzing the attack-defense interactions in cyberspace, which cause a "natural" phenomenon -- the evolution of the global cybersecurity state.  ...  We hope that we have clearly and successfully conveyed the following message: This is an exciting, but challenging, research endeavor that deserves a community effort to explore.  ... 
arXiv:2010.05683v1 fatcat:65nk5djjsbdqbi4eud2run667y

CS Measures for Nuclear Power Plant Protection: A Systematic Literature Review

Nabin Chowdhury
2021 Signals  
To ensure the CS protection of these infrastructures, a holistic defense-in-depth approach is suggested in order to avoid excessive granularity and lack of compatibility between different layers of protection  ...  Continued efforts have been made to develop a variety of measures for the cyber defense of these infrastructures, which often consist in adapting security measures previously developed for other critical  ...  Based on the findings of this work, the main challenge in current NPP CS is providing a holistic security approach based on a layered Defense-in-Depth (DiD) model.  ... 
doi:10.3390/signals2040046 fatcat:7nd3jijtvrck3a27fddjnykh6m

Analysis Report on Attacks and Defence Modeling Approach to Cyber Security

Bechoo Lal, Chandrahauns R Chavan
2019 International Journal of Scientific Research in Science and Technology  
These all are the defense parameters which are stated to modeling approach in cyber security.  ...  The researcher stated that critical analysis on attacks and defense modeling approach to cyber security which is one of the significant research issues in the computing environment.  ...  attack and defense modeling approach in cyber security.  ... 
doi:10.32628/ijsrst196215 fatcat:njgdb4xagzevler4lt7rgfbrs4

Game theory for cyber security

Sajjan Shiva, Sankardas Roy, Dipankar Dasgupta
2010 Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research - CSIIRW '10  
To this end, we propose a holistic security approach in this paper. We find that game theory provides huge potential to place such an approach on a solid analytical setting.  ...  In particular, we propose a game theory inspired defense architecture in which a game model acts as the brain.  ...  A Holistic Security Approach: Despite the past considerable effort to protect the cyber space as summarized above, hacking endeavors still grow in numbers and sophistication, which strongly indicates that  ... 
doi:10.1145/1852666.1852704 dblp:conf/csiirw/ShivaRD10 fatcat:actm76risvap3akyrzcac3ftq4

Assessing the Maturity of National Cybersecurity and Resilience

George Sharkov
2020 Connections The Quarterly Journal  
A maturity-based approach for the Bulgarian cyber resilience roadmap is also described within the context of the evolving cyber-empowered hybrid threats and the need for an institutionalized collaborative  ...  Cyber readiness indexes are also outlined in view of their use to indicate possible improvements.  ...  and assess the nations' cyber defense capabilities development according to the ongoing Cyber Defense Pledge. 35 Conclusion To assess the cybersecurity and cyber resilience of a sector, community, country  ... 
doi:10.11610/connections.19.4.01 fatcat:czsbetcnqrewda5g427egkqrhi

Cyber Security and Resilience of Modern Societies: A Research Management Architecture

Todor Tagarev, George Sharkov, Nikolai Stoianov
2017 Information & Security An International Journal  
Policies for security and resilience of modern societies to threats and risks from the cyberspace account for foreseen cyber threats, their immediate impact on ICT infrastructure, consequent effects on  ...  Advanced information and communications technologies (ICT) facilitate the increase of effectiveness and efficiency of defence and security organizations, governmental services, the economy, and quality  ...  The different approaches for cyber security and cyber resiliency of such systems will be tested and evaluated.  ... 
doi:10.11610/isij.3807 fatcat:l637vr6khfcrrgsqyrgpxmbkxi

Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence [article]

Vasileios Mavroeidis, Siri Bromander
2021 arXiv   pre-print
This research evaluates existing cyber-threat-intelligence-relevant ontologies, sharing standards, and taxonomies for the purpose of measuring their high-level conceptual expressivity with regards to the  ...  Benefits of threat intelligence include increased situational awareness, efficiency in security operation centers, and improved prevention, detection, and response capabilities.  ...  DISCUSSION Intelligence-driven defense augments organizations' detecting and responding capabilities and introduces a more informed preventive approach to the overall cybersecurity operations.  ... 
arXiv:2103.03530v1 fatcat:2w7dyolppvhexjykmjti6yewly
« Previous Showing results 1 — 15 out of 3,123 results