Abstract
Future cyber operations in an IoT-enabled smart environment will be much more demanding and complex. The purpose of this paper is to present the building blocks of an innovative approach to education in the field of cyber operations. Proposed model of an innovative approach to education in the field of cyber operations includes three building blocks with the set of key elements. The model is focused on the work process of cyber operations modelling, that will allow students with different levels of knowledge and specializations to work efficiently. The objective of the innovative approach to education in the field of cyber operations is to connect students with different knowledge in the field of cyber security and thus contribute to the development of highly secure IoT solutions and better security awareness. The main objective of the proposed model of an innovative approach to education in the field of cyber operations is to allow the students to develop a content-rich, in-depth knowledge in the field of cyber operations, especially in smart environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Almasizadeh, J., Abdollahi Azgomi, M.: Mean privacy: a metric for security of computer systems. Comput. Commun. 52, 47–59 (2014)
Celik, Z.B., et al.: Mapping sample scenarios to operational models. In: Military Communications Conference MILCOM (2016)
Chang, Y.H., Jirutitijaroen, P., Ten, C.W.: A simulation model of cyber threats for energy metering devices in a secondary distribution network. In: Proceedings of the 5th International Conference on Critical Infrastructure, pp. 1–7 (2010)
Dewri, R., Ray, I., Poolsappasit, N., Whitley, D.: Optimal security hardening on attack tree models of networks: a cost-benefit analysis. Int. J. Inf. Secur. 11(3), 167–188 (2012)
Gibson, H.: Acquisition and preparation of data for OSINT investigations. In: Akhgar, B., Bayerl, P., Sampson, F. (eds.) Open Source Intelligence Investigation. ASTSA, pp. 69–93. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-47671-1_6
Hong, J., Kim, D.S.: HARMs: Hierarchical Attack Representation Models for Network Security Analysis (2012)
Ivanc, B.: Modelling of information attacks on critical infrastructure by using an enhanced structural model. Master thesis (2013)
Ivanc, B.: Providing information privacy with attack modelling: from simple techniques to the enhanced structural model. In: Corporate Security: Open Dilemmas in the Modern Information Society, pp. 161–168 (2014)
Jajodia, S., Noel, S., Kalapa, P., Albanese, M.: Cauldron - mission-centric cyber situational awareness with defense in depth. In: Military Communications Conference (MILCOM 2011), pp. 1–6 (2011)
Kim, K.H., Eom, J.H.: Modeling of cyber target selection for effective acquisition of cyber weapon systems. Int. J. Secur. Appl. 10(11), 293–302 (2016)
Kordy, B., Pietre-Cambacedes, L., Schweitzer, P.: DAG-based attack and defense modelling: Don’t miss the forest for the attack trees. Comput. Sci. Rev.w 13–14, 1–38 (2014)
Kumar, S., Carley, K.M.: Understanding DDoS cyber-attacks using social media analytics. In: Conference on Intelligence and Security Informatics (ISI), pp. 231–236 (2016)
Mell, P., Scarfone, K., Romanosky, S.: A Complete Guide to the Common Vulnerability Scoring System Version 2.0 (2007)
Paul, S., Vignon-Davillier, R.: Unifying traditional risk assessment approaches with attack trees. J. Inf. Secur. Appl. 19(3), 165–181 (2014)
Piètre-Cambacédès, L., Bouissou, M.: Cross-fertilization between safety and security engineering. Reliab. Eng. Syst. Saf. 110, 110–126 (2013)
Pipyrosa, K., Thraskiasb, C., Mitroua, L., Gritzalisa, D., Apostolopoulos, T.: A new strategy for improving cyber-attacks evaluation in the context of Tallinn manual. Comput. Secur. 74, 371–383 (2018)
Strahonja, V.: The evaluation criteria of workflow metamodels. In: Proceedings of the International Conference on Information Technology Interfaces, pp. 553–558 (2007)
Ten, C.W., Manimaran, G., Liu, C.C.: Cybersecurity for critical infrastructures: attack and defense modeling. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 40(4), 853–865 (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Ivanc, B., Podbregar, I., Šprajc, P. (2019). Building Blocks of an Innovative Approach to Education in the Field of Cyber Operations in Smart Environment. In: Galinina, O., Andreev, S., Balandin, S., Koucheryavy, Y. (eds) Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN ruSMART 2019 2019. Lecture Notes in Computer Science(), vol 11660. Springer, Cham. https://doi.org/10.1007/978-3-030-30859-9_15
Download citation
DOI: https://doi.org/10.1007/978-3-030-30859-9_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-30858-2
Online ISBN: 978-3-030-30859-9
eBook Packages: Computer ScienceComputer Science (R0)