Adaptive Knowledge Encoding for Agile Cybersecurity Operations

被引:0
作者
Willett, Keith D. [1 ]
Dove, Rick [1 ]
Blackburn, Mark [1 ]
机构
[1] Stevens Institute of Technology, Castle Point on Hudson, Hoboken,NJ,07030, United States
关键词
Cybersecurity;
D O I
10.1002/j.2334-5837.2015.00096.x
中图分类号
学科分类号
摘要
An agile cybersecurity operation is the dynamic adaptability of security services and mechanisms including people, process, technology, and environment to ensure organizational efficacy. Two key roles in agile security operations are cybersecurity operators and cybersecurity analysts. Both are overwhelmed with data and information, but underwhelmed in knowledge and understanding. Adaptive knowledge encoding introduces cybersecurity decision patterns (CDPs) and a cybersecurity decision pattern language (CDPL) as formal knowledge representation and a formal knowledge repository to capture, codify, and share knowledge that supports cybersecurity operators and analysts ability to perform timely agile cybersecurity operations. The Knowledge Engineer applies CDPs and the CDPL to provide a cybersecurity cognitive schema that dynamically adapts by assimilating new CDPs in the CDPL structure and acclimating the CDPL structure to new knowledge. CDPs and the CDPL together with applied fundamentals of agile systems engineering help facilitate the design and sustainment of agile cybersecurity operations. Copyright © 2015 by Keith D. Willett, Rick Dove, and Mark Blackburn. Published and used by INCOSE with permission.
引用
收藏
页码:770 / 792
相关论文
共 50 条
  • [21] A Collaborative Adaptive Cybersecurity Algorithm for Cognitive Cities
    Abonamah, Abdullah
    Sibai, Fadi N.
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2025,
  • [22] Exploring user behavioral data for adaptive cybersecurity
    Joyce H. Addae
    Xu Sun
    Dave Towey
    Milena Radenkovic
    User Modeling and User-Adapted Interaction, 2019, 29 : 701 - 750
  • [23] Exploring user behavioral data for adaptive cybersecurity
    Addae, Joyce H.
    Sun, Xu
    Towey, Dave
    Radenkovic, Milena
    USER MODELING AND USER-ADAPTED INTERACTION, 2019, 29 (03) : 701 - 750
  • [24] Designing Adaptive Cybersecurity Hands-on Training
    Seda, Pavel
    Vykopal, Jan
    Celeda, Pavel
    Ignac, Igor
    2022 IEEE FRONTIERS IN EDUCATION CONFERENCE, FIE, 2022,
  • [25] Adaptive Blockchain Technology for a Cybersecurity Framework in IIoT
    LLanten Lucio, Yeison Isaac
    Marceles Villalba, Katerine
    Amador Donado, Siler
    IEEE REVISTA IBEROAMERICANA DE TECNOLOGIAS DEL APRENDIZAJE-IEEE RITA, 2022, 17 (02): : 178 - 184
  • [26] Cybersecurity knowledge graphs construction and quality assessment
    Li, Hongyi
    Shi, Ze
    Pan, Chengwei
    Zhao, Di
    Sun, Nan
    COMPLEX & INTELLIGENT SYSTEMS, 2024, 10 (01) : 1201 - 1217
  • [27] Assessing cybersecurity today to improve tomorrow's manufacturing operations
    Peixoto, Alexandre
    Gorskie, Rick
    Control Engineering, 2020, 67 (09) : 24 - 26
  • [28] Comparing the influence of cybersecurity knowledge on attack detection: insights from experts and novice cybersecurity professionals
    Saeed, Mozamel M.
    OPEN COMPUTER SCIENCE, 2024, 14 (01):
  • [29] Cybersecurity Knowledge Graph Improvement with Graph Neural Networks
    Dasgupta, Soham
    Piplai, Aritran
    Ranade, Priyanka
    Joshi, Anupam
    2021 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2021, : 3290 - 3297
  • [30] Extending the Frontiers of Electronic Commerce Knowledge through Cybersecurity
    Vuta, Daniela Roxana
    Nichifor, Eliza
    Tierean, Ovidiu Mircea
    Zamfirache, Alexandra
    Chitu, Ioana Bianca
    Foris, Tiberiu
    Bratucu, Gabriel
    ELECTRONICS, 2022, 11 (14)