Information Requirements for National Level Cyber Situational Awareness

被引:0
作者
Varga, Stefan [1 ,2 ]
Brynielsson, Joel [1 ,3 ]
Franke, Ulrik [4 ]
机构
[1] KTH Royal Inst Technol, SE-10044 Stockholm, Sweden
[2] Swedish Armed Forces Headquarters, SE-10785 Stockholm, Sweden
[3] FOI Swedish Def Res Agcy, SE-16490 Stockholm, Sweden
[4] SICS, RISE, POB 1263, SE-16429 Kista, Sweden
来源
2018 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM) | 2018年
关键词
Situational awareness; common operational picture; cyber security; information assurance; UNCERTAINTY; DISCOVERY;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As modern societies become more dependent on IT services, the potential impact both of adversarial cyberattacks and non-adversarial service management mistakes grows. This calls for better cyber situational awareness-decision-makers need to know what is going on. The main focus of this paper is to examine the information elements that need to be collected and included in a common operational picture in order for stakeholders to acquire cyber situational awareness. This problem is addressed through a survey conducted among the participants of a national information assurance exercise conducted in Sweden. Most participants were government officials and employees of commercial companies that operate critical infrastructure. The results give insight into information elements that are perceived as useful, that can be contributed to and required from other organizations, which roles and stakeholders would benefit from certain information, and how the organizations work with creating cyber common operational pictures today. Among findings, it is noteworthy that adversarial behavior is not perceived as interesting, and that the respondents in general focus solely on their own organization.
引用
收藏
页码:774 / 781
页数:8
相关论文
共 36 条
[1]  
Adams K., 2011, 2011 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA 2011), P110, DOI 10.1109/COGSIMA.2011.5753427
[2]  
Alberts D., 1999, Network Centric Warfare
[3]  
[Anonymous], CONT SECURITY POLICY
[4]  
Barford P, 2010, ADV INFORM SECUR, V46, P3, DOI 10.1007/978-1-4419-0140-8_1
[5]  
Brynielsson J, 2016, ADV SCI TECH SEC APP, P209, DOI 10.1007/978-3-319-38930-1_12
[6]  
Conti G., 2013, 2013 5 INT C CYB CON, P279
[7]  
Copeland J., 2008, Emergency response: Unity of effort through a common operational picture
[8]   Visual discovery in computer network defense [J].
D'Amico, Anita D. ;
Goodall, John R. ;
Tesone, Daniel R. ;
Kopylec, Jason K. .
IEEE COMPUTER GRAPHICS AND APPLICATIONS, 2007, 27 (05) :20-27
[9]  
D'Antonio S, 2006, LECT NOTES COMPUT SC, V4347, P222
[10]  
Doupé A, 2011, 27TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2011), P51