This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber situational awareness, visualizati
Theory and models for cyber situation awareness
β Scribed by Jajodia, Sushil; Liu, Peng; Wang, Cliff
- Publisher
- Springer
- Year
- 2017
- Tongue
- English
- Leaves
- 228
- Series
- Lecture notes in computer science 10030.; LNCS sublibrary. SL 2, Programming and software engineering
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Today, when a security incident happens, the top three questions a cyber operation center would ask are: What has happened? Why did it happen? What should I do? Answers to the first two questions form the core of Cyber Situation Awareness (SA). Whether the last question can be satisfactorily addressed is largely dependent upon the cyber situation awareness capability of an enterprise. The goal of this book is to Read more...
Abstract: Today, when a security incident happens, the top three questions a cyber operation center would ask are: What has happened? Why did it happen? What should I do? Answers to the first two questions form the core of Cyber Situation Awareness (SA). Whether the last question can be satisfactorily addressed is largely dependent upon the cyber situation awareness capability of an enterprise. The goal of this book is to present a summary of recent research advances in the development of highly desirable Cyber Situation Awareness capabilities. The 8 invited full papers presented in this volume are organized around the following topics: computer-aided human centric cyber situation awareness; computer and information science aspects of the recent advances in cyber situation awareness; learning and decision making aspects of the recent advances in cyber situation awareness; cognitive science aspects of the recent advances in cyber situation awareness
β¦ Table of Contents
Front Matter ....Pages I-VII
Front Matter ....Pages 1-1
Computer-Aided Human Centric Cyber Situation Awareness (Massimiliano Albanese, Nancy Cooke, GonzΓ‘lez Coty, David Hall, Christopher Healey, Sushil Jajodia et al.)....Pages 3-25
Front Matter ....Pages 27-27
An Integrated Framework for Cyber Situation Awareness (Sushil Jajodia, Massimiliano Albanese)....Pages 29-46
Lessons Learned: Visualizing Cyber Situation Awareness in a Network Security Domain (Christopher G. Healey, Lihua Hao, Steve E. Hutchinson)....Pages 47-65
Enterprise-Level Cyber Situation Awareness (Xiaoyan Sun, Jun Dai, Anoop Singhal, Peng Liu)....Pages 66-109
Front Matter ....Pages 111-111
Dynamics of Decision Making in Cyber Defense: Using Multi-agent Cognitive Modeling to Understand CyberWar (Cleotilde Gonzalez, Noam Ben-Asher, Don Morrison)....Pages 113-127
Studying Analystsβ Data Triage Operations in Cyber Defense Situational Analysis (Chen Zhong, John Yen, Peng Liu, Rob F. Erbacher, Christopher Garneau, Bo Chen)....Pages 128-169
Front Matter ....Pages 171-171
The Cognitive Sciences of Cyber-Security: A Framework for Advancing Socio-Cyber Systems (Michael D. McNeese, David L. Hall)....Pages 173-202
Impact of Team Collaboration on Cybersecurity Situational Awareness (Prashanth Rajivan, Nancy Cooke)....Pages 203-226
Back Matter ....Pages 227-227
β¦ Subjects
Computer networks -- Security measures;Internet -- Security measures
π SIMILAR VOLUMES
<p>This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber situational awareness, visualiz
<p><P>Today, when a security accident occurs, the top three questions security administrators would ask are in essence: What has happened? Why did it happen? What should I do? Answers to the first two questions form the "core" of Cyber Situational Awareness. In addition, whether the last question ca
<p><P>Today, when a security accident occurs, the top three questions security administrators would ask are in essence: What has happened? Why did it happen? What should I do? Answers to the first two questions form the "core" of Cyber Situational Awareness. In addition, whether the last question ca
<p><P>Today, when a security accident occurs, the top three questions security administrators would ask are in essence: What has happened? Why did it happen? What should I do? Answers to the first two questions form the "core" of Cyber Situational Awareness. In addition, whether the last question ca
<p><span> This book overviews the drivers behind the smart city vision, describes its dimensions and introduces the reference architecture. It further enumerates and classifies threats targeting the smart city concept, links corresponding attacks, and traces the impact of these threats on operations