Search GSSD

Visual structures for seeing cyber policy strategies

Abstract: 
Organizations are having difficulty staying ahead of the advancements in the capabilities of cyber criminals. The complexity of combining the technical and business aspects of effective cyber security make it difficult to implement new cyber defenses. The paper looks at the current use of visual structures to reduce this complexity of cybersecurity by analyzing both cases of success and failure. The paper focuses on three types of security issues: epidemic, cyber attacks on industrial networks, and terrorist attack threats. The findings indicate that visual structures are largely inadequate, but all provide clear trade-offs and limitations. "In the pursuit of cyber security for organizations, there are tens of thousands of tools, guidelines, best practices, forensics, platforms, toolkits, diagnostics, and analytics available. However according to the Verizon 2014 Data Breach Report: “after analysing 10 years of data... organizations cannot keep up with cyber crime-and the bad guys are winning.” Although billions are expended worldwide on cyber security, organizations struggle with complexity, e.g., the NISTIR 7628 guidelines for cyber-physical systems are over 600 pages of text. And there is a lack of information visibility. Organizations must bridge the gap between technical cyber operations and the business/social priorities since both sides are essential for ensuring cyber security. Identifying visual structures for information synthesis could help reduce the complexity while increasing information visibility within organizations. This paper lays the foundation for investigating such visual structures by first identifying where current visual structures are succeeding or failing. To do this, we examined publicly available analyses related to three types of security issues: 1) epidemic, 2) cyber attacks on an industrial network, and 3) threat of terrorist attack. We found that existing visual structures are largely inadequate for reducing complexity and improving information visibility. However, based on our analysis, we identified a range of different visual structures, and their possible trade-offs/limitation is framing strategies for cyber policy. These structures form the basis of evolving visualization to support information synthesis for policy actions, which has rarely been done but is promising based on the efficacy of existing visualizations for cyber incident detection, attacks, and situation awareness."
Author: 
Jennifer Stoll, Rainhard Z. Bengez
Institution: 
IEEE
Year: 
2015
Domains-Issue Area: 
Industry Focus: 
Internet & Cyberspace
Country: 
United States
Datatype(s): 
Policies
Theory/Definition