Confidence Assertions in Cyber-Security for an Information-Sharing Environment

05/17/2021
by   Paul B. Kantor, et al.
0

Information sharing is vital in resisting cyberattacks, and the volume and severity of these attacks is increasing very rapidly. Therefore responders must triage incoming warnings in deciding how to act. This study asked a very specific question: "how can the addition of confidence information to alerts and warnings improve overall resistance to cyberattacks." We sought, in particular, to identify current practices, and if possible, to identify some "best practices." The research involved literature review and interviews with subject matter experts at every level from system administrators to persons who develop broad principles of policy. An innovative Modified Online Delphi Panel technique was used to elicit judgments and recommendations from experts who were able to speak with each other and vote anonymously to rank proposed practices.

READ FULL TEXT

page 5

page 7

page 9

page 10

page 12

page 30

page 37

page 42

research
05/11/2022

Visualization Guidelines for Model Performance Communication Between Data Scientists and Subject Matter Experts

Presenting the complexities of a model's performance is a communication ...
research
07/13/2020

SMEs Confidentiality Concerns for Security Information Sharing

Small and medium sized enterprises are considered an essential part of t...
research
04/25/2020

Best Practices for IoT Security: What Does That Even Mean?

Best practices for Internet of Things (IoT) security have recently attra...
research
03/01/2021

Narratives and Counternarratives on Data Sharing in Africa

As machine learning and data science applications grow ever more prevale...
research
07/21/2017

Searching Data: A Review of Observational Data Retrieval Practices

A cross-disciplinary examination of the user behaviours involved in seek...
research
07/16/2020

SMEs Confidentiality Issues and Adoption of Good Cybersecurity Practices

Small and medium-sized enterprises (SME) are considered more vulnerable ...
research
04/05/2017

Best Practices for Applying Deep Learning to Novel Applications

This report is targeted to groups who are subject matter experts in thei...

Please sign up or login with your details

Forgot password? Click here to reset