2005
DOI: 10.1177/154193120504900304
|View full text |Cite
|
Sign up to set email alerts
|

Achieving Cyber Defense Situational Awareness: A Cognitive Task Analysis of Information Assurance Analysts

Abstract: A Cognitive Task Analysis (CTA) was performed to investigate the workflow, decision processes, and cognitive demands of information assurance (IA) analysts responsible for defending against attacks on critical computer networks. We interviewed and observed 41 IA analysts responsible for various aspects of cyber defense in seven organizations within the US Department of Defense (DOD) and industry. Results are presented as workflows of the analytical process and as attribute tables including analyst goals, decis… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
26
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 99 publications
(27 citation statements)
references
References 6 publications
0
26
0
Order By: Relevance
“…The papers that were used for the purpose of this research were: D'Amico et al [10], D'Amico et al [11], Erbacher et al [12], Fink et al [13] and Mckenna et al [16]. The reasons these papers were chosen was because of the data they presented.…”
Section: A Familiarizing With Datamentioning
confidence: 99%
See 2 more Smart Citations
“…The papers that were used for the purpose of this research were: D'Amico et al [10], D'Amico et al [11], Erbacher et al [12], Fink et al [13] and Mckenna et al [16]. The reasons these papers were chosen was because of the data they presented.…”
Section: A Familiarizing With Datamentioning
confidence: 99%
“…These papers gave precise details about analyst roles, the type of data they used, how the analysis were conducted, what the analysts thought about visualization approaches and their experiences, if any, with visualizations. D'Amico et al [10] and D'Amico et al [11] gave insight into roles of analysts and the tasks they perform in organizations. Erbacher et al [12] presents interviews with analysts for the specific purpose of cyber-security visualization.…”
Section: A Familiarizing With Datamentioning
confidence: 99%
See 1 more Smart Citation
“…In terms of the system, this is the need to provide the multiple pieces of information required for understanding. A security analyst rarely relies on one piece of information to fully understand a situation [12]. For example, the results from a vulnerability scan indicating that vulnerabilities exist on a system may require additional checks for false positives.…”
Section: ) Correlationmentioning
confidence: 99%
“…According to Amico [2], achieving SA requires the analyst to proceed through three stages: perception, comprehension, and projection. The challenges traversing through these stages are: ingesting large volumes of data, sustaining real time response, and presentation in a comprehensible format.…”
mentioning
confidence: 99%