Abstract
This paper describes a proposed approach, centered on human factors, for securing the Total Learning Architecture (TLA). The TLA, which is being developed for the United States Department of Defense, will rely on large stores of personal data that could be targeted by sophisticated adversaries. We describe the TLA and its envisioned users at a fairly high level before describing expected classes of attacks against it. We then examine existing and proposed controls that, if properly managed, should allow users and service providers to significantly reduce the risks to the system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Swan, M.: Emerging patient-driven health care models. Int. J. Environ. Res. Public health 6(2), 492–525 (2009)
Blackhurst, J.L., Gresham, J.S., Stone, M.O.: The quantified warrior: How DoD should lead human performance augmentation. In: Armed Forces Journal (2012)
Kenney, M.: Cyber-terrorism in a post-stuxnet world. Orbis 59(1), 111–128 (2015)
U.S. House of Representatives: Committee on Homeland Security. Hearing on Emerging Cyber Threats to the United States (2016)
Cyber terrorism seen as the BIGGEST single future threat. http://securesense.ca/cyber-terrorism-seen-biggest-single-future-threat
U.S. charges Iranians for cyberattacks on banks, dam. http://www.cnn.com/2016/03/23/politics/iran-hackers-cyber-new-york-dam
Soros hacked, thousands of open society foundation files released online. https://www.rt.com/usa/355919-soros-hacked-files-released
Turns out you can’t trust Russian hackers anymore. https://foreignpolicy.com/2016/08/22/turns-out-you-cant-trust-russian-hackers-anymore
Holt, T.J., Smirnova, O., Chua, Y.-T.: Data Thieves in Action: Examining the International Market for Stolen Personal Information. Springer, New York (2016)
Michigan State University hacked, personal information stolen. http://nbc4i.com/2016/11/18/michigan-state-university-hacked-personal-information-stolen
How was your credit card stolen? https://krebsonsecurity.com/2015/01/how-was-your-credit-card-stolen
Hackers selling 117 million LinkedIn passwords. http://money.cnn.com/2016/05/19/technology/linkedin-hack
Hohlfeld, O., Graf, T., Ciucu, F.: Longtime behavior of harvesting spam bots. In: Proceedings of the 2012 ACM Conference on Internet Measurement (2012)
Celebrities’ medical records tempt hospital workers to snoop. http://www.npr.org/sections/health-shots/2015/12/10/458939656/celebrities-medical-records-tempt-hospital-workers-to-snoop
NSA officers spy on love interests. http://blogs.wsj.com/washwire/2013/08/23/nsa-officers-sometimes-spy-on-love-interests/
Ky. fire commission investigating southeast bullitt fire department. http://www.wdrb.com/story/24643774/ky-fire-commission-investigating-southeast-bullitt-fire-department
Report: Tulsa Sheriff’s office falsified training records for reserve deputy who fatally fired gun instead of Taser. https://www.washingtonpost.com/news/morning-mix/wp/2015/04/16/report-tulsa-sheriffs-office-falsified-training-records-for-reserve-deputy-who-fatally-fired-gun-instead-of-taser/?utm_term=.32c56ea0498e
Harris, S., Maymi, F.: CISSP All-in-one Exam Guide, 7th edn. McGraw-Hill Inc., San Francisco (2016)
Burkett, R.: An Alternative Framework for Agent Recruitment (2013)
US DoD: Pub 3-13: Joint Doctrine for Information Operations, vol. 9, pp. 1–9 (1998)
Acknowledgements
This material is based upon work supported by the Advanced Distributed Learning (ADL) Initiative under Contract No. W911QY-16-C-0019. Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the Advanced Distributed Learning (ADL) Initiative.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
MaymĂ, F., Woods, A., Folsom-Kovarik, J. (2018). Humans as the Strong Link in Securing the Total Learning Architecture. In: Nicholson, D. (eds) Advances in Human Factors in Cybersecurity. AHFE 2017. Advances in Intelligent Systems and Computing, vol 593. Springer, Cham. https://doi.org/10.1007/978-3-319-60585-2_20
Download citation
DOI: https://doi.org/10.1007/978-3-319-60585-2_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-60584-5
Online ISBN: 978-3-319-60585-2
eBook Packages: EngineeringEngineering (R0)