2016 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA 2016
DOI: 10.1109/cogsima.2016.7497780
|View full text |Cite
|
Sign up to set email alerts
|

A task analysis toward characterizing cyber-cognitive situation awareness (CCSA) in cyber defense analysts

Abstract: Cyberspace is an increasingly crucial part of everyday living. We have long recognized that defending this space is complex, requiring information integration, and decisions of man and machine to coalesce in a dynamic environment full of shifting priorities. These properties suggest that, as in other domains with similar characteristics, situation awareness (SA) of a human cyber defender is paramount to the quality of decision outcomes in cyber defense. The majority of existing research in cyber situation awar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0
1

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 38 publications
(24 citation statements)
references
References 25 publications
0
19
0
1
Order By: Relevance
“…Therefore, given the potential of application of DSS in IPCS, which implement preventive strategy of OBI cyberprotection [18,19], it appears a relevant problem to develop the methods, models and applied SW applicable to the practical implementation in IDMSS. In particular, these studies are topical in the area of intelligent decision-making support for planning the rational structure of IPS, assessment and prediction of risk of violating the IS and CS, as well as management of IP under conditions of uncertainty in the potential impacts from cybercriminals.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, given the potential of application of DSS in IPCS, which implement preventive strategy of OBI cyberprotection [18,19], it appears a relevant problem to develop the methods, models and applied SW applicable to the practical implementation in IDMSS. In particular, these studies are topical in the area of intelligent decision-making support for planning the rational structure of IPS, assessment and prediction of risk of violating the IS and CS, as well as management of IP under conditions of uncertainty in the potential impacts from cybercriminals.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…The task on choosing the rational structure of CIPM for OBI is carried out according to the following criteria [22,23]: minimal probability of the intruder accomplishing all goals; minimum of average level of losses at OBI from the intruder accomplishing all goals; maximum probability of success in the counteraction by CIPM of the intruder accomplishing all goals; minimum value of the integral indicator "cost -risk". For the proposed architecture of IPCS, we used the model of optimization of structural-technological resource (STR) for mission-critical IM and OBI infrastructure components by the criterion of minimum probability of failure to solve the task [18,22].…”
Section: Architecture Of Information Protection Control Systemmentioning
confidence: 99%
“…It was mentioned in the works [14,15] that ISMS, in which intelligent technologies of cyberthreat identification and reacting to occurrences of IS breaches are realized, are products of private companies, and that a customer in general doesn't have any information about methods and models of leading effects forming in systems [16]. In the works [17,18] all the disadvantages of many DSS and ES systems in the field of IS are shown: lack of highly qualified experts; difficulties that appear in the process of ISMS methods and models adapting to the needs of any particular organization; impossibility of certain ISMS efficiency assessing protection; and demanding true statistics of IS and CS incidents.…”
Section: Literature Data Analysis and Problem Statementmentioning
confidence: 99%
“…On the opinion of some authors [12][13][14][17][18][19][20], existing standards in the field of IS management don't form effective methods of cyber-security management.…”
Section: Literature Data Analysis and Problem Statementmentioning
confidence: 99%
See 1 more Smart Citation