Ubiquitous Connectivity and Threats: Architecting The Next Generation Cyber Security Operations

被引:0
|
作者
McCallam, Dennis H. [1 ]
Frazier, Preston D. [1 ]
Savold, Risa [1 ]
机构
[1] Northrop Grumman Corp, Falls Church, VA 22042 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to breakneck proliferation of advanced cyber threats, cyber security operations today face challenges that are conflating at an exponential rate. The explosion of the Internet of Things is projected to expand the universe of connected objects from 8.7 billion in 2012 to over 50 billion by 2020, which is going to inundate today's cyber security operations with a sensor data flood of untenable proportions. Additionally, the dearth of skilled cyber security practitioners is projected to increase seven-fold by 2020. The widening gap created by these two compounding trends can only be filled by developing autonomous, pervasive cyber security capabilities that embrace machine learning and automated cognitive technologies to digest immense volumes of data to detect anomalies, make inferences, develop threat intelligence, and automate a multitude of responses in the cyber security operational environment. This paper will explore a proven "system thinking" design approach to empower cyber security operations analysts to regain control of their enterprise network by highlighting necessary capabilities that allow a force multiplier to overcome both the skilled labor shortage and the looming tsunami of data.
引用
收藏
页码:1506 / 1509
页数:4
相关论文
共 50 条
  • [21] Cyber security threats in IoT: A review
    Rana, Pragati
    Patil, B. P.
    JOURNAL OF HIGH SPEED NETWORKS, 2023, 29 (02) : 105 - 120
  • [22] Emerging Technologies, Evolving Threats: Next-Generation Security Challenges
    Bonaci, Tamara
    Michael, Katina
    Rivas, Pablo
    Robertson, Lindsay J.
    Zimmer, Michael
    IEEE Transactions on Technology and Society, 2022, 3 (03): : 155 - 162
  • [23] Mission-Centricity in Cyber Security: Architecting Cyber Attack Resilient Missions
    Jakobson, Gabriel
    2013 5TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON), 2013,
  • [24] Enabling Next-Generation Cyber Ranges with Mobile Security Components
    Russo, Enrico
    Verderame, Luca
    Merlo, Alessio
    TESTING SOFTWARE AND SYSTEMS, ICTSS 2020, 2020, 12543 : 150 - 165
  • [25] Security From the Core: Design of a Next Generation Cyber Resilient Architecture
    Loew, Alexander
    Maybaum, Markus
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2018), 2018, : 402 - 411
  • [26] Combining Cyber Security Intelligence to Refine Automotive Cyber Threats
    Sommer, Florian
    Gierl, Mona
    Kriesten, Reiner
    Kargl, Frank
    Sax, Eric
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2024, 27 (02)
  • [27] An Intelligent Security Assistant for Cyber Security Operations
    Sayan, Carla Maria
    Hariri, Salim
    Ball, George
    2017 IEEE 2ND INTERNATIONAL WORKSHOPS ON FOUNDATIONS AND APPLICATIONS OF SELF* SYSTEMS (FAS*W), 2017, : 375 - 376
  • [28] Cyber Security of Cyber Physical Systems: Cyber Threats and Defense of Critical Infrastructures
    Shukla, Sandeep K.
    2016 29TH INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2016 15TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID), 2016, : 30 - 31
  • [29] Predicting Cyber Threats with Virtual Security Products
    Chen, Shang-Tse
    Han, Yufei
    Chau, Duen Horng
    Gates, Christopher
    Hart, Michael
    Roundy, Kevin A.
    33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, : 189 - 199
  • [30] Preparing for Cyber Threats with Information Security Policies
    Ilvonen, Ilona
    Virtanen, Pasi
    INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2013, 3 (04) : 22 - 31