首页> 外文会议>International Conference on Cyber Conflict >Visual structures for seeing cyber policy strategies
【24h】

Visual structures for seeing cyber policy strategies

机译:视觉结构查看网络政策策略

获取原文

摘要

In the pursuit of cyber security for organizations, there are tens of thousands of tools, guidelines, best practices, forensics, platforms, toolkits, diagnostics, and analytics available. However according to the Verizon 2014 Data Breach Report: “after analysing 10 years of data... organizations cannot keep up with cyber crime-and the bad guys are winning.” Although billions are expended worldwide on cyber security, organizations struggle with complexity, e.g., the NISTIR 7628 guidelines for cyber-physical systems are over 600 pages of text. And there is a lack of information visibility. Organizations must bridge the gap between technical cyber operations and the business/social priorities since both sides are essential for ensuring cyber security. Identifying visual structures for information synthesis could help reduce the complexity while increasing information visibility within organizations. This paper lays the foundation for investigating such visual structures by first identifying where current visual structures are succeeding or failing. To do this, we examined publicly available analyses related to three types of security issues: 1) epidemic, 2) cyber attacks on an industrial network, and 3) threat of terrorist attack. We found that existing visual structures are largely inadequate for reducing complexity and improving information visibility. However, based on our analysis, we identified a range of different visual structures, and their possible trade-offs/limitation is framing strategies for cyber policy. These structures form the basis of evolving visualization to support information synthesis for policy actions, which has rarely been done but is promising based on the efficacy of existing visualizations for cyber incident detection, attacks, and situation awareness.
机译:在追求组织的网络安全,也有可用的工具,方针,最佳做法,取证,平台,工具包,诊断和分析数以万计。然而,根据Verizon的2014数据泄露报告:“分析10年的数据后......企业无法与网络犯罪和坏人正在赢得跟上。”虽然过百亿是在网络安全全球消耗,组织复杂性,例如斗争,对网络物理系统的NISTIR 7628准则是600多页的文字。还有就是缺乏信息可见性。由于双方对确保网络安全必不可少的组织必须弥合技术的网络运营和业务/社会优先之间的差距。识别信息合成视觉结构有助于降低复杂性,同时组织内部日益增多的信息的可视性。本文奠定了通过首先识别在那里当前视觉结构被成功或失败调查这种可视化结构的基础。要做到这一点,我们研究了有关三种类型的安全问题公开可用的分析:1)疫情,2)工业网络上的网络攻击,以及3)恐怖袭击的威胁。我们发现,现有的可视化结构是降低复杂性,提高信息的可见性大大不足。然而,根据我们的分析,我们发现了一系列不同的可视化结构,及其可能的权衡/限制了框架,网络政策战略。这些结构形成不断变化的可视化,以支持信息综合政策行动,已很少做,但基于对网络事件检测,攻击和态势感知现有可视化的效果有前途的基础。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号