Ubiquitous Connectivity and Threats: Architecting The Next Generation Cyber Security Operations

被引:0
|
作者
McCallam, Dennis H. [1 ]
Frazier, Preston D. [1 ]
Savold, Risa [1 ]
机构
[1] Northrop Grumman Corp, Falls Church, VA 22042 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to breakneck proliferation of advanced cyber threats, cyber security operations today face challenges that are conflating at an exponential rate. The explosion of the Internet of Things is projected to expand the universe of connected objects from 8.7 billion in 2012 to over 50 billion by 2020, which is going to inundate today's cyber security operations with a sensor data flood of untenable proportions. Additionally, the dearth of skilled cyber security practitioners is projected to increase seven-fold by 2020. The widening gap created by these two compounding trends can only be filled by developing autonomous, pervasive cyber security capabilities that embrace machine learning and automated cognitive technologies to digest immense volumes of data to detect anomalies, make inferences, develop threat intelligence, and automate a multitude of responses in the cyber security operational environment. This paper will explore a proven "system thinking" design approach to empower cyber security operations analysts to regain control of their enterprise network by highlighting necessary capabilities that allow a force multiplier to overcome both the skilled labor shortage and the looming tsunami of data.
引用
收藏
页码:1506 / 1509
页数:4
相关论文
共 50 条
  • [31] Evaluation of Cyber Security Threats in Banking Systems
    Stanikzai, Abdul Qarib
    Shah, Munam Ali
    2021 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI 2021), 2021,
  • [32] The Dark Triad and Insider Threats in Cyber Security
    Maasberg, Michele
    Van Slyke, Craig
    Ellis, Selwyn
    Beebe, Nicole
    COMMUNICATIONS OF THE ACM, 2020, 63 (12) : 64 - 70
  • [33] Cyber Security: Terms, Laws, Threats and Protection
    Jha, Manasi
    Anand, C. S.
    Mahawar, Yogesh
    Kalyan, Uday
    Verma, Vikas
    2021 INTERNATIONAL CONFERENCE ON COMPUTING SCIENCES (ICCS 2021), 2021, : 148 - 151
  • [34] Middle East Cyber Security: Threats and Opportunities
    Shires, James
    Handler, Simon
    Moran, Jim
    Bahgat, Gawdat
    MIDDLE EAST POLICY, 2021, 28 (3-4) : 22 - 39
  • [35] Cyber Security Threats - Smart Grid Infrastructure
    Pandey, Rajendra Kumar
    Misra, Mohit
    2016 NATIONAL POWER SYSTEMS CONFERENCE (NPSC), 2016,
  • [36] Analysis of Cyber Security Threats of the Printing Enterprise
    Shepita P.
    Tupychak L.
    Shepita J.
    Journal of Cyber Security and Mobility, 2023, 12 (03): : 415 - 434
  • [37] Repercussions of Coronavirus on Cyber-Security Threats
    Pandharipande, Aryan
    Parashar, Ritik
    BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2020, 13 (14): : 45 - 48
  • [38] Cyber-Security Threats Origins and their Analysis
    Cerget, Maros
    Hudec, Jan
    ACTA POLYTECHNICA HUNGARICA, 2023, 20 (09) : 23 - 41
  • [39] Towards Middleware Security Framework for Next Generation Data Centers Connectivity
    Talpur, Samar Raza
    Abdalla, Sameh
    Kechadi, Tahar
    2015 SCIENCE AND INFORMATION CONFERENCE (SAI), 2015, : 1277 - 1283
  • [40] Cyber4Drone: A Systematic Review of Cyber Security and Forensics in Next-Generation Drones
    Sihag, Vikas
    Choudhary, Gaurav
    Choudhary, Pankaj
    Dragoni, Nicola
    DRONES, 2023, 7 (07)