{"title":"Building cyber resilience through a discursive approach to “big cyber” threat landscapes","authors":"T. Grøtan","doi":"10.1201/9781351174664-390","DOIUrl":null,"url":null,"abstract":"Cyber safety, security and resilience of Critical Infrastructures (CI) and critical societal functions is a contemporary challenge. To understand the bigger picture, we may build composite threat landscapes in which vulnerabilities and threats combine and travel across distinct domains between which expertise, competence, experience and knowledge horizon related to safety, security and risk may differ substantially. Additional sensitization towards emerging cyber threats is however needed. Inspired by the post-normal “science of what-if”, the “BigCyber” model advance threat landscapes further into sensitivity to hidden, dynamic and emergent vulnerabilities. The approach is exemplified in terms of smart metering of household electricity consumption. The need for discursive support for different stakeholders relating to threat landscapes is identified, and a discursive framework for stepwise nurturing of polycentric governance is outlined. The framework can also be used to elaborate and support the idea of resilience landscapes of autonomous entities, facilitating a polycentric approach to cyber resilience. collecting extensive information from installations without the customer's consent, could be coined as the \"industrial Big Other\" In the 1990's, the prospect of \"trusted\" computer systems prevailed. Today, few if any ICT systems are delivered with assurances that support this. Practically no ICT system, including CI, may preclude the possibility of intrusion, disturbance and hacking. Big-scale consumer innovations, e.g. autonomous cars and home appliances, are seemingly always lagging in computer security. Some voices even claim that \"computer security is broken from top to bottom\" (Economist, 2017). Potential countermeasures are often invasive, e.g. on privacy, often unduly playing on strings of fear and anxiety. Public initiatives, e.g. from the EU (Galbusera and Giannopoulos, 2016) aiming for public, semantic web descriptions of critical infrastructures may also be exploited to enable sophisticated attacks. We cannot expect of holistic, cross-nation, crosssector approaches to these challenges. The obstacle is not just the tremendous information coordination challenge, but also the incommensurate and diverse motives and objectives across boundaries of private vs public, classified vs unclassified, national vs international. Information cannot be shared, nor trusted, in one \"heap\". Motives and objectives are incommensurate, increasingly located in an atmosphere of post-fact attitudes, fake news, and information warfare targeting societal trust, in which even security agencies may find it difficult to navigate.","PeriodicalId":278087,"journal":{"name":"Safety and Reliability – Safe Societies in a Changing World","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Safety and Reliability – Safe Societies in a Changing World","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1201/9781351174664-390","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Cyber safety, security and resilience of Critical Infrastructures (CI) and critical societal functions is a contemporary challenge. To understand the bigger picture, we may build composite threat landscapes in which vulnerabilities and threats combine and travel across distinct domains between which expertise, competence, experience and knowledge horizon related to safety, security and risk may differ substantially. Additional sensitization towards emerging cyber threats is however needed. Inspired by the post-normal “science of what-if”, the “BigCyber” model advance threat landscapes further into sensitivity to hidden, dynamic and emergent vulnerabilities. The approach is exemplified in terms of smart metering of household electricity consumption. The need for discursive support for different stakeholders relating to threat landscapes is identified, and a discursive framework for stepwise nurturing of polycentric governance is outlined. The framework can also be used to elaborate and support the idea of resilience landscapes of autonomous entities, facilitating a polycentric approach to cyber resilience. collecting extensive information from installations without the customer's consent, could be coined as the "industrial Big Other" In the 1990's, the prospect of "trusted" computer systems prevailed. Today, few if any ICT systems are delivered with assurances that support this. Practically no ICT system, including CI, may preclude the possibility of intrusion, disturbance and hacking. Big-scale consumer innovations, e.g. autonomous cars and home appliances, are seemingly always lagging in computer security. Some voices even claim that "computer security is broken from top to bottom" (Economist, 2017). Potential countermeasures are often invasive, e.g. on privacy, often unduly playing on strings of fear and anxiety. Public initiatives, e.g. from the EU (Galbusera and Giannopoulos, 2016) aiming for public, semantic web descriptions of critical infrastructures may also be exploited to enable sophisticated attacks. We cannot expect of holistic, cross-nation, crosssector approaches to these challenges. The obstacle is not just the tremendous information coordination challenge, but also the incommensurate and diverse motives and objectives across boundaries of private vs public, classified vs unclassified, national vs international. Information cannot be shared, nor trusted, in one "heap". Motives and objectives are incommensurate, increasingly located in an atmosphere of post-fact attitudes, fake news, and information warfare targeting societal trust, in which even security agencies may find it difficult to navigate.