71 research outputs found

    Safety and security in and through practice: tensions at the interface

    Full text link

    Creating Chaos Online

    Get PDF
    Unmasks the disinformation propagated by Russian trolling in public discours

    Rapid Mission Assurance Assessment via Sociotechnical Modeling and Simulation

    Get PDF
    How do organizations rapidly assess command-level effects of cyber attacks? Leaders need a way of assuring themselves that their organization, people, and information technology can continue their missions in a contested cyber environment. To do this, leaders should: 1) require assessments be more than analogical, anecdotal or simplistic snapshots in time; 2) demand the ability to rapidly model their organizations; 3) identify their organization’s structural vulnerabilities; and 4) have the ability to forecast mission assurance scenarios. Using text mining to build agent based dynamic network models of information processing organizations, I examine impacts of contested cyber environments on three common focus areas of information assurance—confidentiality, integrity, and availability. I find that assessing impacts of cyber attacks is a nuanced affair dependent on the nature of the attack, the nature of the organization and its missions, and the nature of the measurements. For well-manned information processing organizations, many attacks are in the nuisance range and that only multipronged or severe attacks cause meaningful failure. I also find that such organizations can design for resiliency and provide guidelines in how to do so

    Implementation of SNS Model for Intrusion Prevention in Wireless Local Area Network

    Get PDF

    An Introduction to Architectural Surety(SM) Education

    Full text link

    The Coupling of Safety and Security

    Get PDF
    This open access book explores the synergies and tensions between safety and security management from a variety of perspectives and by combining input from numerous disciplines. It defines the concepts of safety and security, and discusses the methodological, organizational and institutional implications that accompany approaching them as separate entities and combining them, respectively. The book explores the coupling of safety and security from different perspectives, especially: the concepts and methods of risk, safety and security; the managerial aspects; user experiences in connection with safety and security. Given its scope, the book will be of interest to researchers and practitioners in the fields of safety and security, and to anyone working at a business or in an industry concerned with how safety and security should be managed

    Red Pilled - The Allure of Digital Hate

    Get PDF
    Hate is being reinvented. Over the last two decades, online platforms have been used to repackage racist, sexist and xenophobic ideologies into new sociotechnical forms. Digital hate is ancient but novel, deploying the Internet to boost its allure and broaden its appeal. To understand the logic of hate, the author investigates four objects: 8chan, the cesspool of the Internet, QAnon, the popular meta-conspiracy, Parler, a social media site, and Gab, the "platform for the people." Drawing together powerful human stories with insights from media studies, psychology, political science, and race and cultural studies, he portrays how digital hate infiltrates hearts and minds

    Strategies Used to Mitigate Social Engineering Attacks

    Get PDF
    Cybercriminal activity performed widely through social engineering attacks is estimated to be one of the substantial challenges the world will face over the next 20 years. Cybercriminal activity is important to chief information security officers (CISOs) because these attacks represent the largest transfer of economic wealth in history and pose risks to the incentives for organizational innovation and investment and eventually become more profitable than the global trade of all major illegal drugs combined. Grounded in the balanced control theory, the purpose of this multiple case study was to explore strategies CISOs use to mitigate social engineering attacks within their organizations. Participants consisted of 6 CISOs across 6 small to medium-sized organizations that handle payment card industry data in the West Coast region of the United States of America. Data were collected from CISOs by semi structured telephone interviews. Data were analyzed through interview transcription, in-depth exploration of phenomena, data coding development, and the identification of links to themes. Three major themes emerged from the data analysis: information technology (IT) risks, security awareness, and IT strategies. A key recommendation is for CISOs to develop security awareness programs and implement technical, formal, and informal controls, to sustain operations and protect their networks from potential social engineering attacks. The implications for positive social change include the potential for (a) the mitigation of social engineering attacks, (b) the protection of both organizational and consumer data, and (c) an increase in consumer confidence resulting in increased economic prosperity

    Cyber defensive capacity and capability::A perspective from the financial sector of a small state

    Get PDF
    This thesis explores ways in which the financial sectors of small states are able todefend themselves against ever-growing cyber threats, as well as ways these states can improve their cyber defense capability in order to withstand current andfuture attacks. To date, the context of small states in general is understudied. This study presents the challenges faced by financial sectors in small states with regard to withstanding cyberattacks. This study applies a mixed method approach through the use of various surveys, brainstorming sessions with financial sector focus groups, interviews with critical infrastructure stakeholders, a literature review, a comparative analysis of secondary data and a theoretical narrative review. The findings suggest that, for the Aruban financial sector, compliance is important, as with minimal drivers, precautionary behavior is significant. Countermeasures of formal, informal, and technical controls need to be in place. This study indicates the view that defending a small state such as Aruba is challenging, yet enough economic indicators indicate it not being outside the realm of possibility. On a theoretical level, this thesis proposes a conceptual “whole-of-cyber” model inspired by military science and the VSM (Viable Systems Model). The concept of fighting power components and governance S4 function form cyber defensive capacity’s shield and capability. The “whole-of-cyber” approach may be a good way to compensate for the lack of resources of small states. Collaboration may be an only out, as the fastest-growing need will be for advanced IT skillsets

    Ten Years In: Implementing Strategic Approaches to Cyberspace

    Get PDF
    This book represents a look beyond theories and analogies to examine the challenges of strategy implementation. In the essays that follow, practitioners who are building cyberspace forces at-scale join scholars who study power and force in this new domain to collectively offer a unique perspective on the evolution and future of cyber strategy and operations.https://digital-commons.usnwc.edu/usnwc-newport-papers/1044/thumbnail.jp
    corecore