• Home
  • Resources
    • Find Resources by Topic Tags
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Cybersecurity Related Websites
  • Services
    • Free Technical Inquiry
    • CAT Program
    • Subject Matter Experts
    • Training
    • Contact
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
    • Cyber COI
  • About
    • About the CSIAC
    • The CSIAC Team
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • Inquiries & CAT’s
    • FAQ’s
    • DTIC STI Program
  • Skip to primary navigation
  • Skip to content
  • Skip to footer
Login / Register

CSIAC

Cyber Security and Information Systems Information Analysis Center

  • Resources
    • Find Resources by Topic Tags
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Cybersecurity Websites
  • Services
    • Free Technical Inquiry
    • CAT Program
    • Subject Matter Experts
    • Training
    • Contact
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
    • Cyber COI
  • About
    • About the CSIAC
    • The CSIAC Team
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • Inquiries & CAT’s
    • FAQ’s
    • DTIC STI Program
  • Cybersecurity
  • Modeling & Simulation
  • Knowledge Management
  • Software Engineering
  • Cyber COI
/ Journal Issues / Cyber-As-Zoo: Multidisciplinary Cyber Struggle
Download PDF

Cyber-As-Zoo: Multidisciplinary Cyber Struggle

Journal of Cyber Security and Information Systems

Volume: 6 Number: 2
Posted: 08/09/2018

Download PDF

This quarter’s CSIAC Journal contains five articles that offer some perspectives to address the often-heard phrase “Cyber Is Hard”, usually associated with gnashing of teeth and exasperated sighs.

In particular, how can the Department of Defense deliver new concepts across the train/exercise/execute spectrum to provision cyber capabilities that can effectively address the rapidly changing world of cyber. To call cyber “multi-faceted” is too simple. Compared to the standard observation about near-sighted people observing an elephant in the room (everyone sees an aspect of the elephant, but nobody can see the whole animal), cyber is more like a zoo of animals in a room and the people are trying to find a single cage to put them in by collaborating on what their specific animals are like. Common ground is hard to find. Effectively moving forward involves smart people addressing as much as they can in their domain, while collaborating amongst themselves to share vocabulary and discover any possible higher-level common threads to help tie things together. The articles following cover many ideas and perspectives for the “cyber-as-zoo” we find ourselves in. The way ahead, unsurprisingly, is to maintain our focus on models and pragmatic demonstrations of practical aspects of cyber, while maintaining a dialogue and collaboration across domains. Over time, that approach will build a cyber terrain much like the modern equivalent of zoos, without cages – larger spaces, effective partitions, shared interactions where reasonable, higher-level understanding of relationships between domains.

Download PDF
« Insider Threat and the Malicious Insider Threat
Innovation Based Ecosystems »

Articles In This Issue

  • Cyber-As-Zoo: Multidisciplinary Cyber Struggle

    Author: Michael Weir
    This quarter’s CSIAC Journal contains five articles that offer some perspectives to address the often-heard phrase “Cyber Is Hard”, usually associated with gnashing of teeth and exasperated sighs. In particular, how can the Department of Defense deliver new concepts across the train/exercise/execute spectrum to provision...
  • Cybersecurity Competency Assessment Using Augmented Qualification Standards

    Author: Dr. Christopher Seedyk
    Determining the capabilities of cybersecurity personnel is essential to support the Department of Defense (DoD) Cyber Strategy. The cyber ability of the DoD is contingent upon the continued high standard of performance of cybersecurity and computer network defense (CND) personnel. These personnel are all members...
  • A Collaboration Pipeline for Cybersecurity Research, Analytics, and Tools

    Authors: Jaime Acosta, Salamah Salamah, Edgar Padilla, ...
    Cybersecurity Data Gap Network and host-based sensors collect data that are foundational for current-day cybersecurity technologies such as intrusion detection and prevention systems. However, for cybersecurity incidents, these data only tell a part of the story. Lacking are the data from the inside view (or...
  • Enduring, Fleeting, Future: A brief overview of current sentiment and emotional analysis, a look forward

    Author: Dr. Wemlinger
    Introduction Sentiment and emotion analysis are critical tools in knowledge aggregation and interfacing with people. As we move from the industrial age, where wealth is measured in capital, into the information age, Barbara Endicott-Popovsky suggests that knowledge will be the new measure of wealth [1]....
  • Cyber Operational Architecture Training System – Cyber for All

    Authors: Dr. David “Fuzzy” Wells and Derek Bryan
    Current methods for conducting cyber training are incompatible with the traditional, simulation-based training architectures used to conduct battlestaff training. As a result, there is little to no interaction between the cyber domain and the traditional warfighting domains during exercises. This situation does not accurately reflect...
  • The Elusive Nature of “Key Cyber Terrain”

    Authors: Mr. Giorgio Bertoli and Stephen Raio
    The concept of “Key Cyber Terrain” has gained popularity within the Cyberspace Operations community. The term is used as an analogy to the more traditionally familiar concept of “Key Terrain” that is utilized by commander’s to identify physical terrain features (hills, mountains, choke points, etc.)...

Footer

CSIAC Products & Services

  • Free Technical Inquiry
  • Core Analysis Tasks (CATs)
  • Resources
  • Events Calendar
  • Frequently Asked Questions
  • Product Feedback Form

About CSIAC

The CSIAC is a DoD-sponsored Center of Excellence in the fields of Cybersecurity, Software Engineering, Modeling & Simulation, and Knowledge Management & Information Sharing.Learn More

Contact Us

Phone:800-214-7921
Email:info@csiac.org
Address:   266 Genesee St.
Utica, NY 13502
Send us a Message
ASD(R&E) LogoUS Department of Defense LogoDoD IACs LogoDTIC LogoTEMS Logo

Copyright 2018, Quanterion Solutions Incorporated

Sitemap | Privacy Policy | Terms of Use | Accessibility Information

This website uses cookies to provide our services and to improve your experience. By using this site, you consent to the use of our cookies. To read more about the use of our site, please click "Read More". Otherwise, click "Dismiss" to hide this notice. Dismiss Read More