“…There are several types of security information providers which we have characterized by the following set of features: respectability, reliability, and speed of reaction [207]. Typically, antisecurity cases are discussed as it is much easier to describe a failure and to provide workarounds or long-term solutions after an incident occurred.…”
Section: Security Information Providersmentioning
confidence: 99%
“…Our experience with training of both students and professionals, however, revealed that this is a very time consuming task [207]. a balanced mix of sources is required.…”
“…For example, we applied this approach by mining patterns from the IT Baseline Protection Manual, the CERT Security Improvement Modules and related sources [207]. Another basic application of the theoretical model is to annotate non-pattern information resources which fit in the defined structure.…”
Section: Basic Applicationsmentioning
confidence: 99%
“…We have already discussed parts of these results in certain conference articles, a journal publication and a book [199,200,208,207]. Furthermore, we initiated the establishment of the security pattern community.…”
“…There are several types of security information providers which we have characterized by the following set of features: respectability, reliability, and speed of reaction [207]. Typically, antisecurity cases are discussed as it is much easier to describe a failure and to provide workarounds or long-term solutions after an incident occurred.…”
Section: Security Information Providersmentioning
confidence: 99%
“…Our experience with training of both students and professionals, however, revealed that this is a very time consuming task [207]. a balanced mix of sources is required.…”
“…For example, we applied this approach by mining patterns from the IT Baseline Protection Manual, the CERT Security Improvement Modules and related sources [207]. Another basic application of the theoretical model is to annotate non-pattern information resources which fit in the defined structure.…”
Section: Basic Applicationsmentioning
confidence: 99%
“…We have already discussed parts of these results in certain conference articles, a journal publication and a book [199,200,208,207]. Furthermore, we initiated the establishment of the security pattern community.…”
Aerospace systems are a target for cyberattacks. Sophisticated attacks no longer exploit vulnerabilities in technical systems but exploit the human factor. The myth that aerospace systems are difficult to attack will be dissolved by providing an insight on the ease of information acquisition by the application of open source intelligence. Methods and tools from the field of psychology and organisational development will be introduced to show how attacks may be designed and how the countermeasures must be adapted to protect the information assets of an organisation.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.