Adaptive Knowledge Encoding for Agile Cybersecurity Operations

被引:0
|
作者
Willett, Keith D. [1 ]
Dove, Rick [1 ]
Blackburn, Mark [1 ]
机构
[1] Stevens Institute of Technology, Castle Point on Hudson, Hoboken,NJ,07030, United States
关键词
Cybersecurity;
D O I
10.1002/j.2334-5837.2015.00096.x
中图分类号
学科分类号
摘要
An agile cybersecurity operation is the dynamic adaptability of security services and mechanisms including people, process, technology, and environment to ensure organizational efficacy. Two key roles in agile security operations are cybersecurity operators and cybersecurity analysts. Both are overwhelmed with data and information, but underwhelmed in knowledge and understanding. Adaptive knowledge encoding introduces cybersecurity decision patterns (CDPs) and a cybersecurity decision pattern language (CDPL) as formal knowledge representation and a formal knowledge repository to capture, codify, and share knowledge that supports cybersecurity operators and analysts ability to perform timely agile cybersecurity operations. The Knowledge Engineer applies CDPs and the CDPL to provide a cybersecurity cognitive schema that dynamically adapts by assimilating new CDPs in the CDPL structure and acclimating the CDPL structure to new knowledge. CDPs and the CDPL together with applied fundamentals of agile systems engineering help facilitate the design and sustainment of agile cybersecurity operations. Copyright © 2015 by Keith D. Willett, Rick Dove, and Mark Blackburn. Published and used by INCOSE with permission.
引用
收藏
页码:770 / 792
相关论文
共 50 条
  • [1] An Empirical Investigation of Agile Information Systems Development for Cybersecurity
    Ardo, Abdulhamid A.
    Bass, Julian M.
    Gaber, Tarek
    INFORMATION SYSTEMS (EMCIS 2021), 2022, 437 : 567 - 581
  • [2] Agile Approaches for Cybersecurity Systems, IoT and Intelligent Transportation
    Tashtoush, Yahya M.
    Darweesh, Dirar A.
    Husari, Ghaith
    Darwish, Omar A.
    Darwish, Yousef
    Issa, Luai Bani
    Ashqar, Huthaifa, I
    IEEE ACCESS, 2022, 10 : 1360 - 1375
  • [3] Cybersecurity challenges in the knowledge economy
    Ursache, Vlad-Mihai
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON BUSINESS EXCELLENCE, 2022, 16 (01): : 121 - 129
  • [4] Cybersecurity in process control, operations, and supply chain
    Parker, Sandra
    Wu, Zhe
    Christofides, Panagiotis D.
    COMPUTERS & CHEMICAL ENGINEERING, 2023, 171
  • [5] Cybersecurity Knowledge Extraction Using XAI
    Sarcevic, Ana
    Pintar, Damir
    Vranic, Mihaela
    Krajna, Agneza
    APPLIED SCIENCES-BASEL, 2022, 12 (17):
  • [6] Scientometric Analysis and Knowledge Mapping of Cybersecurity
    Alqurashi, Fahad
    Ahmad, Istiak
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (03) : 1177 - 1184
  • [7] Building a Cybersecurity Knowledge Graph with CyberGraph
    Falcarin, Paolo
    Dainese, Fabio
    PROCEEDINGS 2024 IEEE/ACM 4TH INTERNATIONAL WORKSHOP ON ENGINEERING AND CYBERSECURITY OF CRITICAL SYSTEMS AND 2024 IEEE/ACM SECOND INTERNATIONAL WORKSHOP ON SOFTWARE VULNERABILITY, ENCYCRIS/SVM 2024, 2024, : 29 - 36
  • [8] Knowledge in the grey zone: AI and cybersecurity
    Tim Stevens
    Digital War, 2020, 1 (1-3): : 164 - 170
  • [9] Adapting Level of Detail in User Interfaces for Cybersecurity Operations
    Inibhunu, Catherine
    Langevin, Scott
    Ralph, Scott
    Kronefeld, Nathan
    Soh, Harold
    Jamieson, Greg A.
    Sanner, Scott
    Kortschot, Sean W.
    Carrasco, Chelsea
    White, Madeleine
    2016 RESILIENCE WEEK (RWS), 2016, : 13 - 16
  • [10] Distributed Cybersecurity Strategy, applying the Intelligence Operations Theory
    Gallardo Urbini, Ignacio Martin
    Venosa, Paula
    Bazan, Patricia
    Del Rio, Nicolas
    2022 17TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2022,