Skip to main content

Building Blocks of an Innovative Approach to Education in the Field of Cyber Operations in Smart Environment

  • Conference paper
  • First Online:
Internet of Things, Smart Spaces, and Next Generation Networks and Systems (NEW2AN 2019, ruSMART 2019)

Abstract

Future cyber operations in an IoT-enabled smart environment will be much more demanding and complex. The purpose of this paper is to present the building blocks of an innovative approach to education in the field of cyber operations. Proposed model of an innovative approach to education in the field of cyber operations includes three building blocks with the set of key elements. The model is focused on the work process of cyber operations modelling, that will allow students with different levels of knowledge and specializations to work efficiently. The objective of the innovative approach to education in the field of cyber operations is to connect students with different knowledge in the field of cyber security and thus contribute to the development of highly secure IoT solutions and better security awareness. The main objective of the proposed model of an innovative approach to education in the field of cyber operations is to allow the students to develop a content-rich, in-depth knowledge in the field of cyber operations, especially in smart environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Almasizadeh, J., Abdollahi Azgomi, M.: Mean privacy: a metric for security of computer systems. Comput. Commun. 52, 47–59 (2014)

    Article  Google Scholar 

  • Celik, Z.B., et al.: Mapping sample scenarios to operational models. In: Military Communications Conference MILCOM (2016)

    Google Scholar 

  • Chang, Y.H., Jirutitijaroen, P., Ten, C.W.: A simulation model of cyber threats for energy metering devices in a secondary distribution network. In: Proceedings of the 5th International Conference on Critical Infrastructure, pp. 1–7 (2010)

    Google Scholar 

  • Dewri, R., Ray, I., Poolsappasit, N., Whitley, D.: Optimal security hardening on attack tree models of networks: a cost-benefit analysis. Int. J. Inf. Secur. 11(3), 167–188 (2012)

    Article  Google Scholar 

  • Gibson, H.: Acquisition and preparation of data for OSINT investigations. In: Akhgar, B., Bayerl, P., Sampson, F. (eds.) Open Source Intelligence Investigation. ASTSA, pp. 69–93. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-47671-1_6

    Chapter  Google Scholar 

  • Hong, J., Kim, D.S.: HARMs: Hierarchical Attack Representation Models for Network Security Analysis (2012)

    Google Scholar 

  • Ivanc, B.: Modelling of information attacks on critical infrastructure by using an enhanced structural model. Master thesis (2013)

    Google Scholar 

  • Ivanc, B.: Providing information privacy with attack modelling: from simple techniques to the enhanced structural model. In: Corporate Security: Open Dilemmas in the Modern Information Society, pp. 161–168 (2014)

    Google Scholar 

  • Jajodia, S., Noel, S., Kalapa, P., Albanese, M.: Cauldron - mission-centric cyber situational awareness with defense in depth. In: Military Communications Conference (MILCOM 2011), pp. 1–6 (2011)

    Google Scholar 

  • Kim, K.H., Eom, J.H.: Modeling of cyber target selection for effective acquisition of cyber weapon systems. Int. J. Secur. Appl. 10(11), 293–302 (2016)

    Google Scholar 

  • Kordy, B., Pietre-Cambacedes, L., Schweitzer, P.: DAG-based attack and defense modelling: Don’t miss the forest for the attack trees. Comput. Sci. Rev.w 13–14, 1–38 (2014)

    MATH  Google Scholar 

  • Kumar, S., Carley, K.M.: Understanding DDoS cyber-attacks using social media analytics. In: Conference on Intelligence and Security Informatics (ISI), pp. 231–236 (2016)

    Google Scholar 

  • Mell, P., Scarfone, K., Romanosky, S.: A Complete Guide to the Common Vulnerability Scoring System Version 2.0 (2007)

    Google Scholar 

  • Paul, S., Vignon-Davillier, R.: Unifying traditional risk assessment approaches with attack trees. J. Inf. Secur. Appl. 19(3), 165–181 (2014)

    Google Scholar 

  • Piètre-Cambacédès, L., Bouissou, M.: Cross-fertilization between safety and security engineering. Reliab. Eng. Syst. Saf. 110, 110–126 (2013)

    Article  Google Scholar 

  • Pipyrosa, K., Thraskiasb, C., Mitroua, L., Gritzalisa, D., Apostolopoulos, T.: A new strategy for improving cyber-attacks evaluation in the context of Tallinn manual. Comput. Secur. 74, 371–383 (2018)

    Article  Google Scholar 

  • Strahonja, V.: The evaluation criteria of workflow metamodels. In: Proceedings of the International Conference on Information Technology Interfaces, pp. 553–558 (2007)

    Google Scholar 

  • Ten, C.W., Manimaran, G., Liu, C.C.: Cybersecurity for critical infrastructures: attack and defense modeling. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 40(4), 853–865 (2010)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Polona Šprajc .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ivanc, B., Podbregar, I., Šprajc, P. (2019). Building Blocks of an Innovative Approach to Education in the Field of Cyber Operations in Smart Environment. In: Galinina, O., Andreev, S., Balandin, S., Koucheryavy, Y. (eds) Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN ruSMART 2019 2019. Lecture Notes in Computer Science(), vol 11660. Springer, Cham. https://doi.org/10.1007/978-3-030-30859-9_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-30859-9_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-30858-2

  • Online ISBN: 978-3-030-30859-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics