Title :
Cyber -- Transparencies, Assurance and Deterrence
Author :
Atkinson, S.R. ; Beaulne, K. ; Walker, David ; Hossain, L.
Author_Institution :
Fac. of Eng. & IT, Complex Civil Syst. Res. Group, Univ. of Sydney, Sydney, NSW, Australia
Abstract :
Cyber-has often been considered as a coordination and control, as opposed to collaborative influence, media. This conceptual-design paper, uniquely, builds upon a number of entangled, cross disciplinary research strands -- integrating engineering and conflict studies -- and a detailed literature review to propose a new paradigm of assurance and deterrence models. We consider an ontology for Cyber-sûréte, which combines both the social trusts necessary for [knowledge &, information] assurance such as collaboration by social influence (CSI) and the technological controls and rules for secure information management referred as coordination by rule and control (CRC). We posit Cyber-sûréte as enabling both a ´safe-to-fail´ ecology (in which learning, testing and adaptation can take place) within a fail-safe supervisory control and data acquisition (SCADA type) system, e.g. in a nuclear power plant. Building upon traditional state-based threat analysis, we consider Warning Time and the Threat equation with relation to policies for managing Cyber-Deterrence. We examine how the goods of Cyber-might be galvanised so as to encourage virtuous behaviour and deter and / or dissuade ne´er-do-wells through multiple transparencies. We consider how the Deterrence-escalator may be managed by identifying both weak influence and strong control signals so as to create a more benign and responsive cyber-ecology, in which strengths can be exploited and weaknesses identified. Finally, we consider declaratory / mutual transparencies as opposed to legalistic / controlled transparency.
Keywords :
ontologies (artificial intelligence); security of data; trusted computing; CRC; CSI; SCADA; collaboration by social influence; collaborative influence; conceptual-design paper; coordination by rule and control; cross disciplinary research strands; cyber-deterrence; cyber-ecology; cyber-sûréte; deterrence-escalator; fail-safe supervisory control and data acquisition system; ontology; safe-to-fail ecology; social trusts; state-based threat analysis; technological controls; threat equation; warning time; control; cyber-deterrence; cyber-sûréte; cyber-scape; ecology; influence; socio-info-techno; transparencies; trusts;
Conference_Titel :
Cyber Security (CyberSecurity), 2012 International Conference on
Conference_Location :
Washington, DC
Print_ISBN :
978-1-4799-0219-4
DOI :
10.1109/CyberSecurity.2012.22