From Cyber Security Information Sharing to Threat Management

Author(s):  
Sarah Brown ◽  
Joep Gommers ◽  
Oscar Serrano
2021 ◽  
pp. 2150003
Author(s):  
Boyang Dai ◽  
Xiangfeng Yang ◽  
Gyei-Kark Park

The coalitional game focuses on how people share the payoffs of collaboration when they form coalitions. However, we cannot accurately obtain the different coalitions’ payoffs because of the actual situation’s limitation or economic and technical factors. Therefore, we have to rely on experts in the field to estimate the likelihood of various events and give their belief degrees. To deal with the belief degrees, scholars of uncertainty theory suppose the transferable payoffs to be uncertain variables and propose the uncertain coalitional game. Many expected and optimistic solution concepts have been put forward in the literature, even though the expected value criterion does not consider the decision-maker’s attitude to risk, and the optimistic value criterion is too extreme. To better describe the different subjective judgments of decision-makers, the Hurwicz criterion is applied to the uncertain coalitional game, in which the players intend to maximize their Hurwicz payoffs. Besides, the method to discover the Hurwicz-core is provided, and the condition that the core is nonempty is proved. What’s more, the Hurwicz–Shapley value is mathematically proven to be in the Hurwicz-core in a convex uncertain coalitional game. An application in cyber security information sharing is provided.


2018 ◽  
pp. 309-324 ◽  
Author(s):  
Asmeret Bier Naugle ◽  
Austin Silva ◽  
Munaf Aamir

Even with substantial investment in cyber defense, the risk of harm from cyber attacks is significant for many organizations. Multi-organization information-sharing programs have the potential to improve cyber security at relatively low cost by allowing organizations that face similar threats to share information on vulnerabilities, attacks, and defense strategies. The dynamics of an information-sharing program are likely to depend heavily on interactions between human decision makers. This article describes a system dynamics model of an information-sharing program. The model incorporates decision-making strategies of managers and cyber defenders in each participating organization. The model was used to assess how free-riding behavior is likely to affect the success of a multi-organization information-sharing program. Results shows that free riding may make information sharing more volatile and less beneficial early on, but other factors, including cost savings and the perceived utility of shared information, are likely to create success later in the time horizon.


Author(s):  
Cosmena Mahapatra

Recent attacks on Indian Bank customers have exposed the vulnerability of banking networks in India and the ignorance that prevails in the system. Unlike their foreign counterparts Indian banking networks are not aware of solutions easily available in market to counter cyber theft and cyber terrorism. SIEM or Security Information and Event Management is one such solution which could have easily negated these attacks. This chapter focuses on studying various cyber security mechanisms including SIEM for implementation of cyber defense effectively.


From the first community cybersecurity exercise the CIAS at UTSA conducted in San Antonio in 2002, information sharing has been a key element of the community cybersecurity program. Information sharing is essential in the protection and detection aspects of programs such as the NIST cyber security framework. Information sharing helps to alert other organizations to ongoing reconnaissance and attack efforts by attackers. When it comes to cybersecurity, organizations are not in competition with each other but instead are partners in a mutual defense against attackers. This has not been an easy lesson to learn, and it has taken time, but today, there are many robust information sharing programs that help various sectors and geographic regions to band together to help each other in efforts to thwart attacks against any member of the group. Information sharing is an integral part of the community cyber security maturity model and can in fact help provide a catalyst to launch an overall cybersecurity program for a community.


Author(s):  
Christopher G. Reddick

This chapter examines homeland security information systems (HSIS) with a focus on local governments. Local governments are typically the first at the scene when responding to an emergency or a terrorist attack. The most notable incidents are Hurricane Katrina and the terrorist attacks of September 11, 2001. In both of these incidents the first responders were the local governments, which faced dual issues of communication and information sharing. It is important to understand the current level of preparedness and use of HSIS in local governments. This chapter tries to discern the relative priority of HSIS compared to other priorities of local governments in the realm of homeland security. This chapter first outlines some background information on local governments with respect to their organizational structure and level of homeland security preparedness. The second section outlines the stages of e-government adoption, which is commonly discussed in the local e-government literature. Third, there is a discussion of homeland security information sharing between the federal, state, and local governments. There is some evidence presented from existing surveys of the impact of HSIS on local governments. Finally, there is survey results presented from a study conducted by the International City/ County Management Association (ICMA) on homeland security preparedness. This survey information is used to determine where HSIS fits into local priorities on homeland security.


Sign in / Sign up

Export Citation Format

Share Document