首页> 外文会议>ASE International Conference on Cyber Security >Cyber -- Transparencies, Assurance and Deterrence
【24h】

Cyber -- Transparencies, Assurance and Deterrence

机译:网络 - 透明胶片,保证和威慑

获取原文

摘要

Cyber-has often been considered as a coordination and control, as opposed to collaborative influence, media. This conceptual-design paper, uniquely, builds upon a number of entangled, cross disciplinary research strands -- integrating engineering and conflict studies -- and a detailed literature review to propose a new paradigm of assurance and deterrence models. We consider an ontology for Cyber-sûréte, which combines both the social trusts necessary for [knowledge &amp, information] assurance such as collaboration by social influence (CSI) and the technological controls and rules for secure information management referred as coordination by rule and control (CRC). We posit Cyber-sûréte as enabling both a 'safe-to-fail' ecology (in which learning, testing and adaptation can take place) within a fail-safe supervisory control and data acquisition (SCADA type) system, e.g. in a nuclear power plant. Building upon traditional state-based threat analysis, we consider Warning Time and the Threat equation with relation to policies for managing Cyber-Deterrence. We examine how the goods of Cyber-might be galvanised so as to encourage virtuous behaviour and deter and / or dissuade ne'er-do-wells through multiple transparencies. We consider how the Deterrence-escalator may be managed by identifying both weak influence and strong control signals so as to create a more benign and responsive cyber-ecology, in which strengths can be exploited and weaknesses identified. Finally, we consider declaratory / mutual transparencies as opposed to legalistic / controlled transparency.
机译:网络通常被视为协调和控制,而不是协作影响媒体。这种概念设计论文独特地建立了许多纠缠的跨学科研究股:整合工程和冲突研究 - 以及提出了新的保证和威慑模式的新文献综述。我们考虑Cyber​​-sûréte的本体,它结合了[知识&amp,信息]保证所需的社会信托,例如通过社会影响力(CSI)和安全信息管理的技术控制和规则作为通过规则和控制协调的协调(CRC)。我们在故障安全监督控制和数据采集(SCADA类型)系统中,我们将Cyber​​-sûréte发出“安全到期”生态(在哪种学习,测试和适应)中,例如,在核电站。建立在传统的国家威胁分析上,我们考虑警告时间和威胁方程,与管理网络威慑的政策有关。我们研究网络货物如何镀锌,以便通过多种透明胶片鼓励良好的行为和阻止Ne'er-Do-Wells。我们考虑如何通过识别弱影响和强控制信号来管理威慑自动扶梯,以便创造更良好的良性和响应的网络生态学,其中可以利用强度和识别的弱点。最后,我们考虑宣告/相互透明度,而不是合法/控制的透明度。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号