Skip to main content

Humans as the Strong Link in Securing the Total Learning Architecture

  • Conference paper
  • First Online:
Advances in Human Factors in Cybersecurity (AHFE 2017)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 593))

Included in the following conference series:

  • 2045 Accesses

Abstract

This paper describes a proposed approach, centered on human factors, for securing the Total Learning Architecture (TLA). The TLA, which is being developed for the United States Department of Defense, will rely on large stores of personal data that could be targeted by sophisticated adversaries. We describe the TLA and its envisioned users at a fairly high level before describing expected classes of attacks against it. We then examine existing and proposed controls that, if properly managed, should allow users and service providers to significantly reduce the risks to the system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Swan, M.: Emerging patient-driven health care models. Int. J. Environ. Res. Public health 6(2), 492–525 (2009)

    Article  Google Scholar 

  2. Blackhurst, J.L., Gresham, J.S., Stone, M.O.: The quantified warrior: How DoD should lead human performance augmentation. In: Armed Forces Journal (2012)

    Google Scholar 

  3. Kenney, M.: Cyber-terrorism in a post-stuxnet world. Orbis 59(1), 111–128 (2015)

    Article  Google Scholar 

  4. U.S. House of Representatives: Committee on Homeland Security. Hearing on Emerging Cyber Threats to the United States (2016)

    Google Scholar 

  5. Cyber terrorism seen as the BIGGEST single future threat. http://securesense.ca/cyber-terrorism-seen-biggest-single-future-threat

  6. U.S. charges Iranians for cyberattacks on banks, dam. http://www.cnn.com/2016/03/23/politics/iran-hackers-cyber-new-york-dam

  7. Soros hacked, thousands of open society foundation files released online. https://www.rt.com/usa/355919-soros-hacked-files-released

  8. Turns out you can’t trust Russian hackers anymore. https://foreignpolicy.com/2016/08/22/turns-out-you-cant-trust-russian-hackers-anymore

  9. Holt, T.J., Smirnova, O., Chua, Y.-T.: Data Thieves in Action: Examining the International Market for Stolen Personal Information. Springer, New York (2016)

    Book  Google Scholar 

  10. Michigan State University hacked, personal information stolen. http://nbc4i.com/2016/11/18/michigan-state-university-hacked-personal-information-stolen

  11. How was your credit card stolen? https://krebsonsecurity.com/2015/01/how-was-your-credit-card-stolen

  12. Hackers selling 117 million LinkedIn passwords. http://money.cnn.com/2016/05/19/technology/linkedin-hack

  13. Hohlfeld, O., Graf, T., Ciucu, F.: Longtime behavior of harvesting spam bots. In: Proceedings of the 2012 ACM Conference on Internet Measurement (2012)

    Google Scholar 

  14. Celebrities’ medical records tempt hospital workers to snoop. http://www.npr.org/sections/health-shots/2015/12/10/458939656/celebrities-medical-records-tempt-hospital-workers-to-snoop

  15. NSA officers spy on love interests. http://blogs.wsj.com/washwire/2013/08/23/nsa-officers-sometimes-spy-on-love-interests/

  16. Ky. fire commission investigating southeast bullitt fire department. http://www.wdrb.com/story/24643774/ky-fire-commission-investigating-southeast-bullitt-fire-department

  17. Report: Tulsa Sheriff’s office falsified training records for reserve deputy who fatally fired gun instead of Taser. https://www.washingtonpost.com/news/morning-mix/wp/2015/04/16/report-tulsa-sheriffs-office-falsified-training-records-for-reserve-deputy-who-fatally-fired-gun-instead-of-taser/?utm_term=.32c56ea0498e

  18. Harris, S., Maymi, F.: CISSP All-in-one Exam Guide, 7th edn. McGraw-Hill Inc., San Francisco (2016)

    Google Scholar 

  19. Burkett, R.: An Alternative Framework for Agent Recruitment (2013)

    Google Scholar 

  20. US DoD: Pub 3-13: Joint Doctrine for Information Operations, vol. 9, pp. 1–9 (1998)

    Google Scholar 

Download references

Acknowledgements

This material is based upon work supported by the Advanced Distributed Learning (ADL) Initiative under Contract No. W911QY-16-C-0019. Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the Advanced Distributed Learning (ADL) Initiative.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fernando MaymĂ­ .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

MaymĂ­, F., Woods, A., Folsom-Kovarik, J. (2018). Humans as the Strong Link in Securing the Total Learning Architecture. In: Nicholson, D. (eds) Advances in Human Factors in Cybersecurity. AHFE 2017. Advances in Intelligent Systems and Computing, vol 593. Springer, Cham. https://doi.org/10.1007/978-3-319-60585-2_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-60585-2_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-60584-5

  • Online ISBN: 978-3-319-60585-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics