Mixed-Initiative Cyber Security: Putting humans in the right loop
نویسندگان
چکیده
Organizations and their computer infrastructures have grown intertwined in complex relationships through mergers, acquisitions, reorganizations, and cooperative service delivery. Consequently, defensive actions and policy changes by one organization may have far-reaching negative consequences on the partner organizations. Human-centric and machine-centric approaches are insufficient for defending the security of today's increasingly complex computer infrastructures. The former are slow but highly adaptive, while the latter are fast but highly specialized. We believe the solution lies in mixed-initiative defenses combining the complementary qualities of both humanand machine-based approaches. We describe the Cooperative Infrastructure Defense (CID), a new cyberdefense paradigm designed to unify complex-adaptive swarm intelligence, logical rational agents, and human insight. CID will enable cooperative defense of infrastructure through situational awareness using visualization, security policy dialogue between humans and agents, shared initiative in solving cyber problems, and a foundation for building trust between humans and agents within and between organizations.
منابع مشابه
Psychological Factors Affecting on the Culture and Awareness of Cyber Security in During of Covid-19 Outbreak
The aim of this study was to investigate the psychological factors affecting the culture and awareness of cyber security in the period of Covid-19 outbreak by qualitative method and theme analysis. Research data from upstream documents that include all valid articles published in 2020 to 2022 inside and outside the country, with 4 keywords (culture, awareness, cyber security, psychological fact...
متن کاملEnabling the Exploration of Operating Procedures in Critical Infrastructures
Modern testbeds for the experimental analysis of critical infrastructures either totally ignore the human factor or incorporate real humanmachine interfaces (HMIs) and software that require the presence of human operators during an experiment. Although experimentation with humans in the loop can provide invaluable experimental data about human decision making and reactions, it is infeasible to ...
متن کاملExternalities and the Magnitude of Cyber security Underinvestment by Private Sector Firms: A Modification of the Gordon-Loeb Model
Cyber security breaches inflict costs to consumers and businesses. The possibility also exists that a cyber security breach may shut down an entire critical infrastructure industry, putting a nation’s whole economy and national defense at risk. Hence, the issue of cyber security investment has risen to the top of the agenda of business and government executives. This paper examines how the exis...
متن کاملIntroduction to Visualization for Computer Security
Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. Automated systems to combat this threat are one potential solution, but most automated systems require vigilant human oversight. This automated approach undervalues the strong analytic capabilities of humans. While automation affords opportunities for increased scalability, humans provide the ability to handle exc...
متن کاملحاکمیت شبکهای در نهادهای پژوهشی امنیت سایبری
Governments change their governance style according to social, political and economic conditions. Cyber security technology is among today’s most changeable technologies, which is a critical key to the national security. Because of the weaknesses in the interaction among syber security research organizations, introducing a model for utilizing all existing capabilities can be an appro...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009