2018
DOI: 10.1007/978-3-030-03638-6_14
|View full text |Cite
|
Sign up to set email alerts
|

What You Can Change and What You Can’t: Human Experience in Computer Network Defenses

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(7 citation statements)
references
References 9 publications
0
7
0
Order By: Relevance
“…Roles & Responsibilities [8], [14], [46], [54], [66], [79]- [81] Recruitment & Retention [10], [15], [32], [82]- [93] Training & Awareness [14], [88], [89], [93]- [96] Collaboration & Communication [8], [11], [12], [17], [23], [47], [97]- [99] be more specific when the SOC grows. For example, in a small SOC with only a few analysts, everyone needs to be knowledgeable on several skills because a few employees need to cover all the arising tasks.…”
Section: People Referencesmentioning
confidence: 99%
“…Roles & Responsibilities [8], [14], [46], [54], [66], [79]- [81] Recruitment & Retention [10], [15], [32], [82]- [93] Training & Awareness [14], [88], [89], [93]- [96] Collaboration & Communication [8], [11], [12], [17], [23], [47], [97]- [99] be more specific when the SOC grows. For example, in a small SOC with only a few analysts, everyone needs to be knowledgeable on several skills because a few employees need to cover all the arising tasks.…”
Section: People Referencesmentioning
confidence: 99%
“…The exchange of threat information within sharing communities is a recommended practice for individuals working in Computer Network Defence, such as Security Operations Centres (SOCs) and Computer Security Incident Response Teams (CSIRTs). Studies report that effective information sharing and collective problem solving are required for a successful security incident response [1,[18][19][20]. There are risks when sharing communities span multiple organizations and it is important that sensitive information about threats, their remediation and legal and organizational requirements are safeguarded.…”
Section: Use Case: Cyber Threat Information Sharingmentioning
confidence: 99%
“…The transcribed interviews were analysed using Grounded Theory techniques, such as line by line coding, the development of categories and themes, and memo writing. The theoretical analysis resulted in five themes [19].…”
Section: Uncovering Human Security Experiencementioning
confidence: 99%
See 2 more Smart Citations