2019
DOI: 10.1111/risa.13309
|View full text |Cite
|
Sign up to set email alerts
|

Risk and the Five Hard Problems of Cybersecurity

Abstract: This perspectives article addresses risk in cyber defense and identifies opportunities to incorporate risk analysis principles into the cybersecurity field. The Science of Security (SoS) initiative at the National Security Agency seeks to further and promote interdisciplinary research in cybersecurity. SoS organizes its research into the Five Hard Problems (5HP): (1) scalability and composability; (2) policy-governed secure collaboration; (3) security-metricsdriven evaluation, design, development, and deployme… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 36 publications
(12 citation statements)
references
References 29 publications
0
12
0
Order By: Relevance
“…In terms of internal validity, it means that focusing only on one level of the problem can lead the researcher to exclude alternative explanations for a given finding (e.g., influence of organisational culture) (Turner et al 2017 ). A multiple-method approach can provide more complex results to handle, but at the same time it enables the triangulation of different sources for a more complex view of the phenomena (Driscoll et al 2007 ) and allows for the integration of additional aspects that are as important as the individual level (Scala et al 2019 ) in assessing CIS in organisations. The qualitative and the quantitative methods derived from HERMENEUT methodology and used in the present study are presented in Table 2 .…”
Section: Methodsmentioning
confidence: 99%
“…In terms of internal validity, it means that focusing only on one level of the problem can lead the researcher to exclude alternative explanations for a given finding (e.g., influence of organisational culture) (Turner et al 2017 ). A multiple-method approach can provide more complex results to handle, but at the same time it enables the triangulation of different sources for a more complex view of the phenomena (Driscoll et al 2007 ) and allows for the integration of additional aspects that are as important as the individual level (Scala et al 2019 ) in assessing CIS in organisations. The qualitative and the quantitative methods derived from HERMENEUT methodology and used in the present study are presented in Table 2 .…”
Section: Methodsmentioning
confidence: 99%
“…The study of governance of cybersecurity requires interdisciplinary research [30] drawing, among others, from governance theory, actor-network theory, and the study of sociotechnical regimes [35]. Research on Internet governance has already utilised actor-network theory and interpretative policy analysis to conceptualise multi-stakeholder arrangements engaging heterogeneous actors [36,37].…”
Section: Methodsmentioning
confidence: 99%
“…This partial list provides just a glimpse into the governance challenges of cybersecurity collaboration. The challenge is much more extensive, which explains why policy-governed (and not technology-driven) and secure collaboration is defined by the Science of Security initiative of the US National Security Agency as one of the top five 'hard problems' of cybersecurity [30].…”
Section: Introductionmentioning
confidence: 99%
“…Ecuador remains a country that is developing at the level of ICT [22]., It is for this inexperience, which is considered most work systems and cyber security risk [23].…”
Section: Comparative Methodology Owasp Top Tenmentioning
confidence: 99%