Holistic Physical Risk and Crises Prioritization Approaches to Solve Cyber Defense Conundrums

During the last decade the techniques and tools of cyber attacks have become more sophisticated, the distinctions between actors and threats have become blurred and attack prospects more worrying. The informational threat can hit any type of civilian or military controls, fixed or mobile infrastruct...

Full description

Bibliographic Details
Main Authors: Franco Oboni, Cesar Oboni
Format: Article
Language:English
Published: International Institute of Informatics and Cybernetics 2015-08-01
Series:Journal of Systemics, Cybernetics and Informatics
Subjects:
Online Access:http://www.iiisci.org/Journal/CV$/sci/pdfs/SA265WV15.pdf
id doaj-117eeeff879d4f2e9ce74afd29f45ed9
record_format Article
spelling doaj-117eeeff879d4f2e9ce74afd29f45ed92020-11-24T21:23:54ZengInternational Institute of Informatics and CyberneticsJournal of Systemics, Cybernetics and Informatics1690-45242015-08-011346267Holistic Physical Risk and Crises Prioritization Approaches to Solve Cyber Defense ConundrumsFranco Oboni0Cesar Oboni1 During the last decade the techniques and tools of cyber attacks have become more sophisticated, the distinctions between actors and threats have become blurred and attack prospects more worrying. The informational threat can hit any type of civilian or military controls, fixed or mobile infrastructures, putting them down or greatly reducing their service capabilities with direct and indirect physical / economic impacts from tactical or local scale to strategic / national and international level. It has been shown that broad spectrum protection investments and particularly poorly prioritized ones are not efficient as oftentimes they are limited in scope by other operational requirements. So it is simply not possible to protect each property from each threat. The cyberdefense must be rooted on intelligence based on prioritized Risk Management and not on standardized audits and practice of indolent regulations, written a priori, or the biased advice of fear monger solutions sellers. RM offers ultimately support for operational decisions and protection (mitigation), provided that we want to define the level of acceptable risk reduction /mitigation and that we formulate measurable performance targets to achieve .http://www.iiisci.org/Journal/CV$/sci/pdfs/SA265WV15.pdf Physical RiskCyber defensePrioritizationRisk Analysis
collection DOAJ
language English
format Article
sources DOAJ
author Franco Oboni
Cesar Oboni
spellingShingle Franco Oboni
Cesar Oboni
Holistic Physical Risk and Crises Prioritization Approaches to Solve Cyber Defense Conundrums
Journal of Systemics, Cybernetics and Informatics
Physical Risk
Cyber defense
Prioritization
Risk Analysis
author_facet Franco Oboni
Cesar Oboni
author_sort Franco Oboni
title Holistic Physical Risk and Crises Prioritization Approaches to Solve Cyber Defense Conundrums
title_short Holistic Physical Risk and Crises Prioritization Approaches to Solve Cyber Defense Conundrums
title_full Holistic Physical Risk and Crises Prioritization Approaches to Solve Cyber Defense Conundrums
title_fullStr Holistic Physical Risk and Crises Prioritization Approaches to Solve Cyber Defense Conundrums
title_full_unstemmed Holistic Physical Risk and Crises Prioritization Approaches to Solve Cyber Defense Conundrums
title_sort holistic physical risk and crises prioritization approaches to solve cyber defense conundrums
publisher International Institute of Informatics and Cybernetics
series Journal of Systemics, Cybernetics and Informatics
issn 1690-4524
publishDate 2015-08-01
description During the last decade the techniques and tools of cyber attacks have become more sophisticated, the distinctions between actors and threats have become blurred and attack prospects more worrying. The informational threat can hit any type of civilian or military controls, fixed or mobile infrastructures, putting them down or greatly reducing their service capabilities with direct and indirect physical / economic impacts from tactical or local scale to strategic / national and international level. It has been shown that broad spectrum protection investments and particularly poorly prioritized ones are not efficient as oftentimes they are limited in scope by other operational requirements. So it is simply not possible to protect each property from each threat. The cyberdefense must be rooted on intelligence based on prioritized Risk Management and not on standardized audits and practice of indolent regulations, written a priori, or the biased advice of fear monger solutions sellers. RM offers ultimately support for operational decisions and protection (mitigation), provided that we want to define the level of acceptable risk reduction /mitigation and that we formulate measurable performance targets to achieve .
topic Physical Risk
Cyber defense
Prioritization
Risk Analysis
url http://www.iiisci.org/Journal/CV$/sci/pdfs/SA265WV15.pdf
work_keys_str_mv AT francooboni holisticphysicalriskandcrisesprioritizationapproachestosolvecyberdefenseconundrums
AT cesaroboni holisticphysicalriskandcrisesprioritizationapproachestosolvecyberdefenseconundrums
_version_ 1725990549085749248