Book section
A model to facilitate discussions about cyber attacks
- Abstract:
- The evolution of the Internet and digital systems is making it increasingly difficult to understand cyber attacks. Politicians, ethicists, lawyers, business owners and other stakeholders are all affected by them, yet many lack necessary technical background to make correct decisions in dealing with them. Conversely, cyber-security analysts have a better understanding about the technical aspects of cyber attacks, but many do not understand the repercussions of decisions made from their perspective alone. Both contextual (e.g. societal, political, legal, financial, reputational aspects etc.) as well as technical considerations must be taken into account in making decisions that relate to a cyber attack. A plethora of cyber-attack models exist today that aid (to some degree) understanding of attacks. Most of these however focus on delivering insight from a single perspective: technical detail or understanding of human-centric factors. These approaches do not outline how a discussion among expert-domain people of different backgrounds should be conducted to establish a basic situational awareness understanding, from which to make collective decisions. In this chapter, we present our efforts towards establishing such a model to enable a collective approach in discussing cyber attacks. In this paper, we propose a first version, but believe extensions should be made. We also acknowledge that testing and assessment in real environments is necessary.
- Publication status:
- Published
- Peer review status:
- Peer reviewed
Actions
Access Document
- Files:
-
-
(Preview, Accepted manuscript, pdf, 643.5KB, Terms of use)
-
- Publisher copy:
- 10.1007/978-3-319-45300-2_10
Authors
- Publisher:
- Springer, Cham
- Host title:
- Ethics and Policies for Cyber Operations
- Volume:
- 124
- Pages:
- 169-185
- Series:
- Philosophical Studies Series
- Publication date:
- 2016-12-02
- DOI:
- ISBN:
- 9783319452999
- Pubs id:
-
pubs:580294
- UUID:
-
uuid:6b86c89b-8be0-4947-ab13-493b6072b805
- Local pid:
-
pubs:580294
- Source identifiers:
-
580294
- Deposit date:
-
2015-12-21
Terms of use
- Copyright holder:
- Springer International Publishing Switzerland
- Copyright date:
- 2016
- Notes:
- Copyright © 2017 Springer International Publishing Switzerland. This is the accepted manuscript version of the article. The final version is available online from Springer at: https://doi.org/10.1007/978-3-319-45300-2_10
If you are the owner of this record, you can report an update to it here: Report update to this record