Cyber - Transparencies, assurance and deterrence

Simon Reay Atkinson, David Walker, Kevin Beaulne, Liaquat Hossain

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Abstract

Cyber-has often been considered as a coordination and control, as opposed to collaborative influence, media. This conceptual-design paper, uniquely, builds upon a number of entangled, cross disciplinary research strands - integrating engineering and conflict studies - and a detailed literature review to propose a new paradigm of assurance and deterrence models. We consider an ontology for Cyber-sûréte, which combines both the social trusts necessary for [knowledge &amp, information] assurance such as collaboration by social influence (CSI) and the technological controls and rules for secure information management referred as coordination by rule and control (CRC). We posit Cyber-sûréte as enabling both a 'safe-to-fail' ecology (in which learning, testing and adaptation can take place) within a fail-safe supervisory control and data acquisition (SCADA type) system, e.g. in a nuclear power plant. Building upon traditional state-based threat analysis, we consider Warning Time and the Threat equation with relation to policies for managing Cyber-Deterrence. We examine how the goods of Cyber-might be galvanised so as to encourage virtuous behaviour and deter and / or dissuade ne'er-do-wells through multiple transparencies. We consider how the Deterrence-escalator may be managed by identifying both weak influence and strong control signals so as to create a more benign and responsive cyber-ecology, in which strengths can be exploited and weaknesses identified. Finally, we consider declaratory / mutual transparencies as opposed to legalistic / controlled transparency.

Original languageEnglish
Title of host publicationProceedings of the 2012 ASE International Conference on Cyber Security, CyberSecurity 2012
Place of PublicationUnited States
Pages119-126
Number of pages8
DOIs
Publication statusPublished - 8 Aug 2013
Externally publishedYes
Event2012 ASE International Conference on Cyber Security, CyberSecurity 2012 - Washington, D.C., United States
Duration: 14 Dec 201216 Dec 2012

Conference

Conference2012 ASE International Conference on Cyber Security, CyberSecurity 2012
CountryUnited States
CityWashington, D.C.
Period14/12/1216/12/12

Fingerprint Dive into the research topics of 'Cyber - Transparencies, assurance and deterrence'. Together they form a unique fingerprint.

  • Cite this

    Atkinson, S. R., Walker, D., Beaulne, K., & Hossain, L. (2013). Cyber - Transparencies, assurance and deterrence. In Proceedings of the 2012 ASE International Conference on Cyber Security, CyberSecurity 2012 (pp. 119-126). [6542534]. https://doi.org/10.1109/CyberSecurity.2012.22