Holistic Physical Risk and Crises Prioritization Approaches to Solve Cyber Defense Conundrums
During the last decade the techniques and tools of cyber attacks have become more sophisticated, the distinctions between actors and threats have become blurred and attack prospects more worrying. The informational threat can hit any type of civilian or military controls, fixed or mobile infrastruct...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
International Institute of Informatics and Cybernetics
2015-08-01
|
Series: | Journal of Systemics, Cybernetics and Informatics |
Subjects: | |
Online Access: | http://www.iiisci.org/Journal/CV$/sci/pdfs/SA265WV15.pdf
|
id |
doaj-117eeeff879d4f2e9ce74afd29f45ed9 |
---|---|
record_format |
Article |
spelling |
doaj-117eeeff879d4f2e9ce74afd29f45ed92020-11-24T21:23:54ZengInternational Institute of Informatics and CyberneticsJournal of Systemics, Cybernetics and Informatics1690-45242015-08-011346267Holistic Physical Risk and Crises Prioritization Approaches to Solve Cyber Defense ConundrumsFranco Oboni0Cesar Oboni1 During the last decade the techniques and tools of cyber attacks have become more sophisticated, the distinctions between actors and threats have become blurred and attack prospects more worrying. The informational threat can hit any type of civilian or military controls, fixed or mobile infrastructures, putting them down or greatly reducing their service capabilities with direct and indirect physical / economic impacts from tactical or local scale to strategic / national and international level. It has been shown that broad spectrum protection investments and particularly poorly prioritized ones are not efficient as oftentimes they are limited in scope by other operational requirements. So it is simply not possible to protect each property from each threat. The cyberdefense must be rooted on intelligence based on prioritized Risk Management and not on standardized audits and practice of indolent regulations, written a priori, or the biased advice of fear monger solutions sellers. RM offers ultimately support for operational decisions and protection (mitigation), provided that we want to define the level of acceptable risk reduction /mitigation and that we formulate measurable performance targets to achieve .http://www.iiisci.org/Journal/CV$/sci/pdfs/SA265WV15.pdf Physical RiskCyber defensePrioritizationRisk Analysis |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Franco Oboni Cesar Oboni |
spellingShingle |
Franco Oboni Cesar Oboni Holistic Physical Risk and Crises Prioritization Approaches to Solve Cyber Defense Conundrums Journal of Systemics, Cybernetics and Informatics Physical Risk Cyber defense Prioritization Risk Analysis |
author_facet |
Franco Oboni Cesar Oboni |
author_sort |
Franco Oboni |
title |
Holistic Physical Risk and Crises Prioritization Approaches to Solve Cyber Defense Conundrums |
title_short |
Holistic Physical Risk and Crises Prioritization Approaches to Solve Cyber Defense Conundrums |
title_full |
Holistic Physical Risk and Crises Prioritization Approaches to Solve Cyber Defense Conundrums |
title_fullStr |
Holistic Physical Risk and Crises Prioritization Approaches to Solve Cyber Defense Conundrums |
title_full_unstemmed |
Holistic Physical Risk and Crises Prioritization Approaches to Solve Cyber Defense Conundrums |
title_sort |
holistic physical risk and crises prioritization approaches to solve cyber defense conundrums |
publisher |
International Institute of Informatics and Cybernetics |
series |
Journal of Systemics, Cybernetics and Informatics |
issn |
1690-4524 |
publishDate |
2015-08-01 |
description |
During the last decade the techniques and tools of cyber attacks have become more sophisticated, the distinctions between actors and threats have become blurred and attack prospects more worrying. The informational threat can hit any type of civilian or military controls, fixed or mobile infrastructures, putting them down or greatly reducing their service capabilities with direct and indirect physical / economic impacts from tactical or local scale to strategic / national and international level. It has been shown that broad spectrum protection investments and particularly poorly prioritized ones are not efficient as oftentimes they are limited in scope by other operational requirements. So it is simply not possible to protect each property from each threat. The cyberdefense must be rooted on intelligence based on prioritized Risk Management and not on standardized audits and practice of indolent regulations, written a priori, or the biased advice of fear monger solutions sellers. RM offers ultimately support for operational decisions and protection (mitigation), provided that we want to define the level of acceptable risk reduction /mitigation and that we formulate measurable performance targets to achieve . |
topic |
Physical Risk Cyber defense Prioritization Risk Analysis |
url |
http://www.iiisci.org/Journal/CV$/sci/pdfs/SA265WV15.pdf
|
work_keys_str_mv |
AT francooboni holisticphysicalriskandcrisesprioritizationapproachestosolvecyberdefenseconundrums AT cesaroboni holisticphysicalriskandcrisesprioritizationapproachestosolvecyberdefenseconundrums |
_version_ |
1725990549085749248 |