File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/CyberSecurity.2012.22
- Scopus: eid_2-s2.0-84881048825
- WOS: WOS:000326265700016
Supplementary
- Citations:
- Appears in Collections:
Conference Paper: Cyber - Transparencies, assurance and deterrence
Title | Cyber - Transparencies, assurance and deterrence |
---|---|
Authors | |
Keywords | control cyber-deterrence cyber-scape cyber-sûréte ecology influence socio-info-techno transparencies trusts |
Issue Date | 2013 |
Citation | Proceedings of the 2012 ASE International Conference on Cyber Security, CyberSecurity 2012, 2013, p. 119-126 How to Cite? |
Abstract | Cyber-has often been considered as a coordination and control, as opposed to collaborative influence, media. This conceptual-design paper, uniquely, builds upon a number of entangled, cross disciplinary research strands - integrating engineering and conflict studies - and a detailed literature review to propose a new paradigm of assurance and deterrence models. We consider an ontology for Cyber-sûréte, which combines both the social trusts necessary for [knowledge &, information] assurance such as collaboration by social influence (CSI) and the technological controls and rules for secure information management referred as coordination by rule and control (CRC). We posit Cyber-sûréte as enabling both a 'safe-to-fail' ecology (in which learning, testing and adaptation can take place) within a fail-safe supervisory control and data acquisition (SCADA type) system, e.g. in a nuclear power plant. Building upon traditional state-based threat analysis, we consider Warning Time and the Threat equation with relation to policies for managing Cyber-Deterrence. We examine how the goods of Cyber-might be galvanised so as to encourage virtuous behaviour and deter and / or dissuade ne'er-do-wells through multiple transparencies. We consider how the Deterrence-escalator may be managed by identifying both weak influence and strong control signals so as to create a more benign and responsive cyber-ecology, in which strengths can be exploited and weaknesses identified. Finally, we consider declaratory / mutual transparencies as opposed to legalistic / controlled transparency. © 2012 IEEE. |
Persistent Identifier | http://hdl.handle.net/10722/194440 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Atkinson, SR | - |
dc.contributor.author | Walker, D | - |
dc.contributor.author | Beaulne, K | - |
dc.contributor.author | Hossain, L | - |
dc.date.accessioned | 2014-01-30T03:32:35Z | - |
dc.date.available | 2014-01-30T03:32:35Z | - |
dc.date.issued | 2013 | - |
dc.identifier.citation | Proceedings of the 2012 ASE International Conference on Cyber Security, CyberSecurity 2012, 2013, p. 119-126 | - |
dc.identifier.uri | http://hdl.handle.net/10722/194440 | - |
dc.description.abstract | Cyber-has often been considered as a coordination and control, as opposed to collaborative influence, media. This conceptual-design paper, uniquely, builds upon a number of entangled, cross disciplinary research strands - integrating engineering and conflict studies - and a detailed literature review to propose a new paradigm of assurance and deterrence models. We consider an ontology for Cyber-sûréte, which combines both the social trusts necessary for [knowledge &, information] assurance such as collaboration by social influence (CSI) and the technological controls and rules for secure information management referred as coordination by rule and control (CRC). We posit Cyber-sûréte as enabling both a 'safe-to-fail' ecology (in which learning, testing and adaptation can take place) within a fail-safe supervisory control and data acquisition (SCADA type) system, e.g. in a nuclear power plant. Building upon traditional state-based threat analysis, we consider Warning Time and the Threat equation with relation to policies for managing Cyber-Deterrence. We examine how the goods of Cyber-might be galvanised so as to encourage virtuous behaviour and deter and / or dissuade ne'er-do-wells through multiple transparencies. We consider how the Deterrence-escalator may be managed by identifying both weak influence and strong control signals so as to create a more benign and responsive cyber-ecology, in which strengths can be exploited and weaknesses identified. Finally, we consider declaratory / mutual transparencies as opposed to legalistic / controlled transparency. © 2012 IEEE. | - |
dc.language | eng | - |
dc.relation.ispartof | Proceedings of the 2012 ASE International Conference on Cyber Security, CyberSecurity 2012 | - |
dc.subject | control | - |
dc.subject | cyber-deterrence | - |
dc.subject | cyber-scape | - |
dc.subject | cyber-sûréte | - |
dc.subject | ecology | - |
dc.subject | influence | - |
dc.subject | socio-info-techno | - |
dc.subject | transparencies | - |
dc.subject | trusts | - |
dc.title | Cyber - Transparencies, assurance and deterrence | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1109/CyberSecurity.2012.22 | - |
dc.identifier.scopus | eid_2-s2.0-84881048825 | - |
dc.identifier.spage | 119 | - |
dc.identifier.epage | 126 | - |
dc.identifier.isi | WOS:000326265700016 | - |