2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) 2018
DOI: 10.1109/asonam.2018.8508410
|View full text |Cite
|
Sign up to set email alerts
|

Information Requirements for National Level Cyber Situational Awareness

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(20 citation statements)
references
References 25 publications
0
20
0
Order By: Relevance
“…Broadly, Swedish cyber and information security has been investigated with respect to, e.g., the railway system [12], the financial sector [13], and national level exercises [14]. The closest related work we have found is a study commissioned by the Swedish Civil Contingencies Agency (MSB) and the Swedish Water & Wastewater Association (SWWA) on the state of cyber security in Swedish water plants [15].…”
Section: A General Cyber Security In Swedenmentioning
confidence: 99%
See 1 more Smart Citation
“…Broadly, Swedish cyber and information security has been investigated with respect to, e.g., the railway system [12], the financial sector [13], and national level exercises [14]. The closest related work we have found is a study commissioned by the Swedish Civil Contingencies Agency (MSB) and the Swedish Water & Wastewater Association (SWWA) on the state of cyber security in Swedish water plants [15].…”
Section: A General Cyber Security In Swedenmentioning
confidence: 99%
“…These results may reflect prior experience where attacks and accidents exhibit similar frequencies, but a similarity in frequency does not necessarily imply a similarity in appropriate counter-measures. It is known from the literature that, at least in the cyber security exercise setting investigated, many Swedish enterprises (private and public alike) tended to disregard adversarial elements such as attacker motives or strategies in favor of just resolving incidents, not bothering with whether they were accidental or intentional [14].…”
Section: Different Cyber Risks and Corresponding Security Measuresmentioning
confidence: 99%
“…At some point, however, the threat will need to be understood and treated as an operational or a strategic dilemma. The findings of Varga et al (2018) highlights an area where CyOs may face challenges when communicating RCPs to non-/less technical personnel and explicates the importance of being mindful of how a communication partner's background and associated priorities affects their mental threat models and situational understanding (Ask et al, 2021a).…”
Section: Organizational Structures Introduce Challenges To Rcp Communication Between Cyos and Decision-makersmentioning
confidence: 98%
“…When this fails to be applied, critical information can get lost due to suboptimal communication flow leading to potentially dire consequences for mission assurance (Knox et al, 2018;Rosen et al, 2008). In a recent study surveying what information Swedish stakeholders (spanning national to local, and private to public actors including providers of critical infrastructure) perceived as needed to meet their RCP requirements, it was reported that none of the stakeholders listed awareness of adversarial behavior as important (Varga et al, 2018). This may suggest a blind-spot in different decisionmaking agents' mental models of what information is necessary to achieve CSA during a cyber threat situation.…”
Section: Organizational Structures Introduce Challenges To Rcp Communication Between Cyos and Decision-makersmentioning
confidence: 99%
“…This may affect what information different individuals think is important during a cyber threat situation (Ask et al, 2021a). For instance, previous research on the RCP needs of local-and national-level stakeholders in Sweden showed that no one listed knowledge about adversarial behavior as important for their RCPs (Varga et al 2018). If awareness of adversarial behavior is required for achieving SA Level 1 during a CTS and is necessary to make good cyber defense decisions (Barford et al, 2009), then ignoring information of adversarial behavior may result in an insufficient CSA.…”
Section: Introductionmentioning
confidence: 99%