Adaptive Knowledge Encoding for Agile Cybersecurity Operations

被引:0
|
作者
Willett, Keith D. [1 ]
Dove, Rick [1 ]
Blackburn, Mark [1 ]
机构
[1] Stevens Institute of Technology, Castle Point on Hudson, Hoboken,NJ,07030, United States
关键词
Cybersecurity;
D O I
10.1002/j.2334-5837.2015.00096.x
中图分类号
学科分类号
摘要
An agile cybersecurity operation is the dynamic adaptability of security services and mechanisms including people, process, technology, and environment to ensure organizational efficacy. Two key roles in agile security operations are cybersecurity operators and cybersecurity analysts. Both are overwhelmed with data and information, but underwhelmed in knowledge and understanding. Adaptive knowledge encoding introduces cybersecurity decision patterns (CDPs) and a cybersecurity decision pattern language (CDPL) as formal knowledge representation and a formal knowledge repository to capture, codify, and share knowledge that supports cybersecurity operators and analysts ability to perform timely agile cybersecurity operations. The Knowledge Engineer applies CDPs and the CDPL to provide a cybersecurity cognitive schema that dynamically adapts by assimilating new CDPs in the CDPL structure and acclimating the CDPL structure to new knowledge. CDPs and the CDPL together with applied fundamentals of agile systems engineering help facilitate the design and sustainment of agile cybersecurity operations. Copyright © 2015 by Keith D. Willett, Rick Dove, and Mark Blackburn. Published and used by INCOSE with permission.
引用
收藏
页码:770 / 792
相关论文
共 50 条
  • [11] Developing an Agile Cybersecurity Framework With Organizational Culture Approach Using Q Methodology
    Handri, Eko Yon
    Sensuse, Dana Indra
    Tarigan, Avinanta
    IEEE ACCESS, 2024, 12 : 108835 - 108850
  • [12] Performance Evaluation of Different Feature Encoding Schemes on Cybersecurity Logs
    Jackson, Eric
    Agrawal, Rajeev
    2019 IEEE SOUTHEASTCON, 2019,
  • [13] The SEPSES Knowledge Graph: An Integrated Resource for Cybersecurity
    Kiesling, Elmar
    Ekelhart, Andreas
    Kurniawan, Kabul
    Ekaputra, Fajar
    SEMANTIC WEB - ISWC 2019, PT II, 2019, 11779 : 198 - 214
  • [14] A typology of cybersecurity behavior among knowledge workers
    Baltuttis, Dennik
    Teubner, Timm
    Adam, Marc T. P.
    COMPUTERS & SECURITY, 2024, 140
  • [15] Cybersecurity knowledge graphs construction and quality assessment
    Hongyi Li
    Ze Shi
    Chengwei Pan
    Di Zhao
    Nan Sun
    Complex & Intelligent Systems, 2024, 10 : 1201 - 1217
  • [16] Meta-control for Adaptive Cybersecurity in FUZZBUSTER
    Musliner, David J.
    Friedman, Scott E.
    Rye, Jeffrey M.
    Marble, Tom
    2013 IEEE 7TH INTERNATIONAL CONFERENCE ON SELF-ADAPTIVE AND SELF-ORGANIZING SYSTEMS (SASO), 2013, : 219 - 226
  • [17] The Impact of Cybersecurity Attacks on Human Trust in Autonomous Vehicle Operations
    Lim, Cherin
    Prendez, David
    Boyle, Linda Ng
    Rajivan, Prashanth
    HUMAN FACTORS, 2025, 67 (05) : 485 - 502
  • [18] Cybersecurity Management: a Knowledge-Based Perspective
    Voracek, Jan
    Pribyl, Antonin
    Schroeder, Johanna
    15TH INTERNATIONAL FORUM ON KNOWLEDGE ASSET DYNAMICS (IFKAD 2020): KNOWLEDGE IN DIGITAL AGE, 2020, : 219 - 234
  • [19] A Practical Approach to Constructing a Knowledge Graph for Cybersecurity
    Jia, Yan
    Qi, Yulu
    Shang, Huaijun
    Jiang, Rong
    Li, Aiping
    ENGINEERING, 2018, 4 (01) : 53 - 60
  • [20] Methods of Current Knowledge Teaching on the Cybersecurity Example
    Nyemkova, Elena
    Justice, Connie
    Liaskovska, Solomiia
    Lakh, Yuriy
    EDUCATION SCIENCES, 2022, 12 (11):