Adaptive Knowledge Encoding for Agile Cybersecurity Operations

被引:0
作者
Willett, Keith D. [1 ]
Dove, Rick [1 ]
Blackburn, Mark [1 ]
机构
[1] Stevens Institute of Technology, Castle Point on Hudson, Hoboken,NJ,07030, United States
关键词
Cybersecurity;
D O I
10.1002/j.2334-5837.2015.00096.x
中图分类号
学科分类号
摘要
An agile cybersecurity operation is the dynamic adaptability of security services and mechanisms including people, process, technology, and environment to ensure organizational efficacy. Two key roles in agile security operations are cybersecurity operators and cybersecurity analysts. Both are overwhelmed with data and information, but underwhelmed in knowledge and understanding. Adaptive knowledge encoding introduces cybersecurity decision patterns (CDPs) and a cybersecurity decision pattern language (CDPL) as formal knowledge representation and a formal knowledge repository to capture, codify, and share knowledge that supports cybersecurity operators and analysts ability to perform timely agile cybersecurity operations. The Knowledge Engineer applies CDPs and the CDPL to provide a cybersecurity cognitive schema that dynamically adapts by assimilating new CDPs in the CDPL structure and acclimating the CDPL structure to new knowledge. CDPs and the CDPL together with applied fundamentals of agile systems engineering help facilitate the design and sustainment of agile cybersecurity operations. Copyright © 2015 by Keith D. Willett, Rick Dove, and Mark Blackburn. Published and used by INCOSE with permission.
引用
收藏
页码:770 / 792
相关论文
共 50 条
  • [31] Knowledge triple extraction in cybersecurity with adversarial active learning
    Li T.
    Guo Y.
    Ju A.
    [J]. Tongxin Xuebao/Journal on Communications, 2020, 41 (10): : 80 - 91
  • [32] Extending the Frontiers of Electronic Commerce Knowledge through Cybersecurity
    Vuta, Daniela Roxana
    Nichifor, Eliza
    Tierean, Ovidiu Mircea
    Zamfirache, Alexandra
    Chitu, Ioana Bianca
    Foris, Tiberiu
    Bratucu, Gabriel
    [J]. ELECTRONICS, 2022, 11 (14)
  • [33] Research on Knowledge Graph Construction for Smart Grid Cybersecurity
    Peng, Zhen
    Du, Ye
    Chen, Qifang
    Zheng, Tianshuai
    [J]. PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024, 2024, : 164 - 170
  • [34] Reinforcing Cybersecurity Hands-on Training With Adaptive Learning
    Seda, Pavel
    Vykopal, Jan
    Svabensky, Valdemar
    Celeda, Pavel
    [J]. 2021 IEEE FRONTIERS IN EDUCATION CONFERENCE (FIE 2021), 2021,
  • [35] Cybersecurity threats in the auto industry: Tensions in the knowledge environment
    Morris, David
    Madzudzo, Garikayi
    Garcia-Perez, Alexeis
    [J]. TECHNOLOGICAL FORECASTING AND SOCIAL CHANGE, 2020, 157
  • [36] Research on quality assessment methods for cybersecurity knowledge graphs
    Shi, Ze
    Li, Hongyi
    Zhao, Di
    Pan, Chengwei
    [J]. COMPUTERS & SECURITY, 2024, 142
  • [37] A Concept for Ontology-Based Value of Cybersecurity Knowledge
    Aviad, Adiel
    Wecel, Krzysztof
    Abramowicz, Witold
    [J]. INTERNATIONAL JOURNAL OF MANAGEMENT AND ECONOMICS, 2018, 54 (01) : 50 - 57
  • [38] Employing Augmented Reality for Cybersecurity Operations in High Performance Computing Environments
    Sukhija, Nitin
    Haser, Cory
    Bautista, Elizabeth
    [J]. PEARC '19: PROCEEDINGS OF THE PRACTICE AND EXPERIENCE IN ADVANCED RESEARCH COMPUTING ON RISE OF THE MACHINES (LEARNING), 2019,
  • [39] Taking Risks With Cybersecurity: Using Knowledge and Personal Characteristics to Predict Self-Reported Cybersecurity Behaviors
    Kennison, Shelia M.
    Chan-Tin, Eric
    [J]. FRONTIERS IN PSYCHOLOGY, 2020, 11
  • [40] The impact of financial deprivation on children's cybersecurity knowledge & abilities
    Prior, Suzanne
    Renaud, Karen
    [J]. EDUCATION AND INFORMATION TECHNOLOGIES, 2022, 27 (08) : 10563 - 10583