Ubiquitous Connectivity and Threats: Architecting The Next Generation Cyber Security Operations

被引:0
|
作者
McCallam, Dennis H. [1 ]
Frazier, Preston D. [1 ]
Savold, Risa [1 ]
机构
[1] Northrop Grumman Corp, Falls Church, VA 22042 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to breakneck proliferation of advanced cyber threats, cyber security operations today face challenges that are conflating at an exponential rate. The explosion of the Internet of Things is projected to expand the universe of connected objects from 8.7 billion in 2012 to over 50 billion by 2020, which is going to inundate today's cyber security operations with a sensor data flood of untenable proportions. Additionally, the dearth of skilled cyber security practitioners is projected to increase seven-fold by 2020. The widening gap created by these two compounding trends can only be filled by developing autonomous, pervasive cyber security capabilities that embrace machine learning and automated cognitive technologies to digest immense volumes of data to detect anomalies, make inferences, develop threat intelligence, and automate a multitude of responses in the cyber security operational environment. This paper will explore a proven "system thinking" design approach to empower cyber security operations analysts to regain control of their enterprise network by highlighting necessary capabilities that allow a force multiplier to overcome both the skilled labor shortage and the looming tsunami of data.
引用
收藏
页码:1506 / 1509
页数:4
相关论文
共 50 条
  • [1] The Trust Engineering Framework: Architecting Native Security to Defend Against the Next Generation Threats
    Farroha, Bassam S.
    Farroha, Deborah L.
    2012 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2012), 2012,
  • [2] Threat Hunting as Cyber Security Baseline in the Next-Generation Security Operations Center
    Bikov, Tsviatko
    Radev, Dimitar
    Iliev, Teodor
    Stankovski, Dragan
    2021 29TH TELECOMMUNICATIONS FORUM (TELFOR), 2021,
  • [3] Threats and security defense of next generation networks
    Baluja-Garcia, Walter
    Anias-Calderon, Caridad
    INGENIERIA Y COMPETITIVIDAD, 2006, 8 (02): : 7 - 16
  • [4] THREATS TO CYBER SECURITY
    Tudor, Ana-Maria
    LAW BETWEEN MODERNIZATION AND TRADITION - IMPLICATIONS FOR THE LEGAL, POLITICAL, ADMINISTRATIVE AND PUBLIC ORDER ORGANIZATION, 2015, : 659 - 664
  • [5] Next Generation Cyber Security Solution for an eHealth Organization
    Ahmed, Hossam
    Alsadoon, Abeer
    Prasad, P. W. C.
    Costadopoulos, N.
    Hoe, Lau Siong
    Elchoemi, Amr
    2017 5TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOIC7), 2017,
  • [6] The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies
    Lehto, Martti
    INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2013, 3 (03) : 1 - 18
  • [7] Aviation and Cyber security threats
    Lehto, Martti
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON CLOUD SECURITY AND MANAGEMENT (ICCSM-2015), 2015, : 197 - 197
  • [8] A Survey on Cyber Security Threats
    Gulshan
    Chauhan, Sansar Singh
    Proceedings of International Conference on Technological Advancements and Innovations, ICTAI 2021, 2021, : 218 - 223
  • [9] An Investigation on Cyber Security Threats and Security Models
    Thakur, Kutub
    Qiu, Meikang
    Gai, Keke
    Ali, Md Liakat
    2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 307 - 311
  • [10] Information security economics: cyber security threats
    Hojda, Mihaela Hortensia
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON BUSINESS EXCELLENCE, 2022, 16 (01): : 584 - 592