Building cyber resilience through a discursive approach to “big cyber” threat landscapes

T. Grøtan
{"title":"Building cyber resilience through a discursive approach to “big cyber” threat landscapes","authors":"T. Grøtan","doi":"10.1201/9781351174664-390","DOIUrl":null,"url":null,"abstract":"Cyber safety, security and resilience of Critical Infrastructures (CI) and critical societal functions is a contemporary challenge. To understand the bigger picture, we may build composite threat landscapes in which vulnerabilities and threats combine and travel across distinct domains between which expertise, competence, experience and knowledge horizon related to safety, security and risk may differ substantially. Additional sensitization towards emerging cyber threats is however needed. Inspired by the post-normal “science of what-if”, the “BigCyber” model advance threat landscapes further into sensitivity to hidden, dynamic and emergent vulnerabilities. The approach is exemplified in terms of smart metering of household electricity consumption. The need for discursive support for different stakeholders relating to threat landscapes is identified, and a discursive framework for stepwise nurturing of polycentric governance is outlined. The framework can also be used to elaborate and support the idea of resilience landscapes of autonomous entities, facilitating a polycentric approach to cyber resilience. collecting extensive information from installations without the customer's consent, could be coined as the \"industrial Big Other\" In the 1990's, the prospect of \"trusted\" computer systems prevailed. Today, few if any ICT systems are delivered with assurances that support this. Practically no ICT system, including CI, may preclude the possibility of intrusion, disturbance and hacking. Big-scale consumer innovations, e.g. autonomous cars and home appliances, are seemingly always lagging in computer security. Some voices even claim that \"computer security is broken from top to bottom\" (Economist, 2017). Potential countermeasures are often invasive, e.g. on privacy, often unduly playing on strings of fear and anxiety. Public initiatives, e.g. from the EU (Galbusera and Giannopoulos, 2016) aiming for public, semantic web descriptions of critical infrastructures may also be exploited to enable sophisticated attacks. We cannot expect of holistic, cross-nation, crosssector approaches to these challenges. The obstacle is not just the tremendous information coordination challenge, but also the incommensurate and diverse motives and objectives across boundaries of private vs public, classified vs unclassified, national vs international. Information cannot be shared, nor trusted, in one \"heap\". Motives and objectives are incommensurate, increasingly located in an atmosphere of post-fact attitudes, fake news, and information warfare targeting societal trust, in which even security agencies may find it difficult to navigate.","PeriodicalId":278087,"journal":{"name":"Safety and Reliability – Safe Societies in a Changing World","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Safety and Reliability – Safe Societies in a Changing World","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1201/9781351174664-390","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Cyber safety, security and resilience of Critical Infrastructures (CI) and critical societal functions is a contemporary challenge. To understand the bigger picture, we may build composite threat landscapes in which vulnerabilities and threats combine and travel across distinct domains between which expertise, competence, experience and knowledge horizon related to safety, security and risk may differ substantially. Additional sensitization towards emerging cyber threats is however needed. Inspired by the post-normal “science of what-if”, the “BigCyber” model advance threat landscapes further into sensitivity to hidden, dynamic and emergent vulnerabilities. The approach is exemplified in terms of smart metering of household electricity consumption. The need for discursive support for different stakeholders relating to threat landscapes is identified, and a discursive framework for stepwise nurturing of polycentric governance is outlined. The framework can also be used to elaborate and support the idea of resilience landscapes of autonomous entities, facilitating a polycentric approach to cyber resilience. collecting extensive information from installations without the customer's consent, could be coined as the "industrial Big Other" In the 1990's, the prospect of "trusted" computer systems prevailed. Today, few if any ICT systems are delivered with assurances that support this. Practically no ICT system, including CI, may preclude the possibility of intrusion, disturbance and hacking. Big-scale consumer innovations, e.g. autonomous cars and home appliances, are seemingly always lagging in computer security. Some voices even claim that "computer security is broken from top to bottom" (Economist, 2017). Potential countermeasures are often invasive, e.g. on privacy, often unduly playing on strings of fear and anxiety. Public initiatives, e.g. from the EU (Galbusera and Giannopoulos, 2016) aiming for public, semantic web descriptions of critical infrastructures may also be exploited to enable sophisticated attacks. We cannot expect of holistic, cross-nation, crosssector approaches to these challenges. The obstacle is not just the tremendous information coordination challenge, but also the incommensurate and diverse motives and objectives across boundaries of private vs public, classified vs unclassified, national vs international. Information cannot be shared, nor trusted, in one "heap". Motives and objectives are incommensurate, increasingly located in an atmosphere of post-fact attitudes, fake news, and information warfare targeting societal trust, in which even security agencies may find it difficult to navigate.
通过对“大网络”威胁景观的话语方法建立网络弹性
关键基础设施(CI)和关键社会功能的网络安全、安全性和弹性是当代的挑战。为了理解更大的图景,我们可以构建复合威胁景观,其中漏洞和威胁结合在一起,并跨越不同的领域,在这些领域中,与安全、安保和风险相关的专业知识、能力、经验和知识范围可能存在很大差异。然而,需要对新出现的网络威胁提高敏感度。受后常态“假设科学”的启发,“大网络”模型进一步将威胁景观推进到对隐藏的、动态的和紧急的漏洞的敏感性。家庭用电量的智能电表就是一个例子。确定了对与威胁景观相关的不同利益相关者的话语支持的需求,并概述了逐步培养多中心治理的话语框架。该框架还可用于阐述和支持自治实体弹性景观的概念,促进网络弹性的多中心方法。在未经客户同意的情况下从设备中收集大量信息,可以被称为“工业大他者”。在20世纪90年代,“可信”计算机系统的前景盛行。今天,几乎没有信息通信技术系统提供支持这一点的保证。几乎没有任何ICT系统,包括CI,可以排除入侵、干扰和黑客攻击的可能性。大规模的消费创新,例如自动驾驶汽车和家用电器,在计算机安全方面似乎总是落后。一些声音甚至声称“计算机安全从上到下被打破”(《经济学人》,2017)。潜在的对策往往是侵入性的,例如侵犯隐私,往往过度地利用恐惧和焦虑。公共倡议,例如来自欧盟(Galbusera和Giannopoulos, 2016),针对关键基础设施的公共语义web描述也可能被利用来实现复杂的攻击。我们不能指望采取全面的、跨国家的、跨部门的办法来应对这些挑战。障碍不仅在于巨大的信息协调挑战,还在于跨越私人与公共、机密与非机密、国家与国际边界的不相称和多样化的动机和目标。信息不能在一个“堆”中共享,也不可信。动机和目标是不相称的,越来越多地处于一种事后态度、假新闻和以社会信任为目标的信息战的氛围中,即使是安全机构也可能难以驾驭。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信