关键基础设施防御:来自欧盟和美国网络专家的观点

Q3 Engineering
I Leroy, I Zolotaryova
{"title":"关键基础设施防御:来自欧盟和美国网络专家的观点","authors":"I Leroy, I Zolotaryova","doi":"10.33271/nvngu/2023-5/165","DOIUrl":null,"url":null,"abstract":"Purpose. To examine the components of cyber autonomy according to the insights of seasoned professionals from the European Union (EU) and the United States of America (USA). The value of each element will be calculated by obtaining data from structured in-depth interviews. Methodology. Through an investigation of different aspects of the research, we used the Delphi technique and research interviews include the option of the Interviewee Transcript Review (ITR). The Delphi method is processed in several rounds, usually three, with two rounds being considered as a minimum and in that respect the Delphi method helps our study explore, predict and identify the nature and fundamental elements of Cyber Autonomy. Findings. The study findings demonstrate that elements such as “Policies”, “Reputation management”, and “Infrastructure and Architecture” hold substantial importance within Cyber Autonomy. These elements are considered critical for future perspectives. The research highlights the role of Cyber Autonomy in streamlining cybersecurity approaches, mitigating the impact of cyber-attacks, and safeguarding possible reputation damage. The study also highlights the importance of well-defined implementation methods and the organizational structure in successfully deploying Cyber Autonomy. Originality. The research demonstrates the interdisciplinary nature of cybersecurity and applies a comprehensive approach covering information security, information security policy, technical and economic aspects, noting the important role of governance in the company share value recovery process. Cyber Autonomy could offer a concept of defense reputation that helps to identify potential cyber threats that are further intensified in connection with the development of various platforms for remote control of artificial intelligence, distance learning, and opportunities for autonomous operation of enterprise systems, the influence of multinational companies on financial markets, and automated decision-making systems. Practical value. Experts’ insights are analyzed that can help to provide practical solutions for the Cyber Autonomy and risk management methods for implementing cyber resilience strategy for critical infrastructure. The research provides adjustments to existing cybersecurity frameworks and directives which consider new cyber elements of information security realities. The current study can be used as a guide to confidence-building measures for possible reputation and financial loss, reinforces protection actions against disinformation or negative cyber impact.","PeriodicalId":19101,"journal":{"name":"Naukovyi Visnyk Natsionalnoho Hirnychoho Universytetu","volume":"161 ","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Critical infrastructure defense: perspectives from the EU and USA cyber experts\",\"authors\":\"I Leroy, I Zolotaryova\",\"doi\":\"10.33271/nvngu/2023-5/165\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Purpose. To examine the components of cyber autonomy according to the insights of seasoned professionals from the European Union (EU) and the United States of America (USA). The value of each element will be calculated by obtaining data from structured in-depth interviews. Methodology. Through an investigation of different aspects of the research, we used the Delphi technique and research interviews include the option of the Interviewee Transcript Review (ITR). The Delphi method is processed in several rounds, usually three, with two rounds being considered as a minimum and in that respect the Delphi method helps our study explore, predict and identify the nature and fundamental elements of Cyber Autonomy. Findings. The study findings demonstrate that elements such as “Policies”, “Reputation management”, and “Infrastructure and Architecture” hold substantial importance within Cyber Autonomy. These elements are considered critical for future perspectives. The research highlights the role of Cyber Autonomy in streamlining cybersecurity approaches, mitigating the impact of cyber-attacks, and safeguarding possible reputation damage. The study also highlights the importance of well-defined implementation methods and the organizational structure in successfully deploying Cyber Autonomy. Originality. The research demonstrates the interdisciplinary nature of cybersecurity and applies a comprehensive approach covering information security, information security policy, technical and economic aspects, noting the important role of governance in the company share value recovery process. Cyber Autonomy could offer a concept of defense reputation that helps to identify potential cyber threats that are further intensified in connection with the development of various platforms for remote control of artificial intelligence, distance learning, and opportunities for autonomous operation of enterprise systems, the influence of multinational companies on financial markets, and automated decision-making systems. Practical value. Experts’ insights are analyzed that can help to provide practical solutions for the Cyber Autonomy and risk management methods for implementing cyber resilience strategy for critical infrastructure. The research provides adjustments to existing cybersecurity frameworks and directives which consider new cyber elements of information security realities. The current study can be used as a guide to confidence-building measures for possible reputation and financial loss, reinforces protection actions against disinformation or negative cyber impact.\",\"PeriodicalId\":19101,\"journal\":{\"name\":\"Naukovyi Visnyk Natsionalnoho Hirnychoho Universytetu\",\"volume\":\"161 \",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-10-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Naukovyi Visnyk Natsionalnoho Hirnychoho Universytetu\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.33271/nvngu/2023-5/165\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"Engineering\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Naukovyi Visnyk Natsionalnoho Hirnychoho Universytetu","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.33271/nvngu/2023-5/165","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Engineering","Score":null,"Total":0}
引用次数: 0

摘要

目的。根据欧盟(EU)和美国(USA)经验丰富的专业人士的见解,研究网络自治的组成部分。每个元素的价值将通过从结构化深度访谈中获得数据来计算。方法。通过对研究的不同方面的调查,我们使用了德尔菲技术,研究访谈包括受访者成绩单审查(ITR)的选项。德尔菲法分几轮进行处理,通常是三轮,其中两轮被认为是最少的,在这方面,德尔菲法有助于我们的研究探索、预测和识别网络自治的性质和基本要素。发现。研究结果表明,“政策”、“声誉管理”和“基础设施和架构”等要素在网络自治中具有重要意义。这些因素被认为对未来前景至关重要。该研究强调了网络自治在简化网络安全方法、减轻网络攻击的影响以及保护可能的声誉损害方面的作用。该研究还强调了明确定义的实施方法和组织结构在成功部署网络自治中的重要性。创意。该研究展示了网络安全的跨学科性质,并采用了涵盖信息安全、信息安全政策、技术和经济方面的综合方法,注意到治理在公司股票价值恢复过程中的重要作用。网络自治可以提供一个防御声誉的概念,有助于识别潜在的网络威胁,这些威胁与各种远程控制人工智能平台的发展、远程学习、企业系统自主运营的机会、跨国公司对金融市场的影响以及自动化决策系统有关。实用价值。对专家的见解进行分析,有助于为关键基础设施实施网络弹性战略的网络自治和风险管理方法提供实用的解决方案。该研究提供了对现有网络安全框架和指令的调整,这些框架和指令考虑了信息安全现实中的新网络元素。目前的研究可以作为建立信任措施的指南,以应对可能的声誉和财务损失,加强针对虚假信息或负面网络影响的保护行动。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Critical infrastructure defense: perspectives from the EU and USA cyber experts
Purpose. To examine the components of cyber autonomy according to the insights of seasoned professionals from the European Union (EU) and the United States of America (USA). The value of each element will be calculated by obtaining data from structured in-depth interviews. Methodology. Through an investigation of different aspects of the research, we used the Delphi technique and research interviews include the option of the Interviewee Transcript Review (ITR). The Delphi method is processed in several rounds, usually three, with two rounds being considered as a minimum and in that respect the Delphi method helps our study explore, predict and identify the nature and fundamental elements of Cyber Autonomy. Findings. The study findings demonstrate that elements such as “Policies”, “Reputation management”, and “Infrastructure and Architecture” hold substantial importance within Cyber Autonomy. These elements are considered critical for future perspectives. The research highlights the role of Cyber Autonomy in streamlining cybersecurity approaches, mitigating the impact of cyber-attacks, and safeguarding possible reputation damage. The study also highlights the importance of well-defined implementation methods and the organizational structure in successfully deploying Cyber Autonomy. Originality. The research demonstrates the interdisciplinary nature of cybersecurity and applies a comprehensive approach covering information security, information security policy, technical and economic aspects, noting the important role of governance in the company share value recovery process. Cyber Autonomy could offer a concept of defense reputation that helps to identify potential cyber threats that are further intensified in connection with the development of various platforms for remote control of artificial intelligence, distance learning, and opportunities for autonomous operation of enterprise systems, the influence of multinational companies on financial markets, and automated decision-making systems. Practical value. Experts’ insights are analyzed that can help to provide practical solutions for the Cyber Autonomy and risk management methods for implementing cyber resilience strategy for critical infrastructure. The research provides adjustments to existing cybersecurity frameworks and directives which consider new cyber elements of information security realities. The current study can be used as a guide to confidence-building measures for possible reputation and financial loss, reinforces protection actions against disinformation or negative cyber impact.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
1.70
自引率
0.00%
发文量
148
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信