Science.gov

Sample records for cyber security self-assessment

  1. CS2SAT: THE CONTROL SYSTEMS CYBER SECURITY SELF-ASSESSMENT TOOL

    SciTech Connect

    Kathleen A. Lee

    2008-01-01

    The Department of Homeland Security National Cyber Security Division has developed the Control System Cyber Security Self-Assessment Tool (CS2SAT) that provides users with a systematic and repeatable approach for assessing the cyber-security posture of their industrial control system networks. The CS2SAT was developed by cyber security experts from Department of Energy National Laboratories and with assistance from the National Institute of Standards and Technology. The CS2SAT is a desktop software tool that guides users through a step-by-step process to collect facility-specific control system information and then makes appropriate recommendations for improving the system’s cyber-security posture. The CS2SAT provides recommendations from a database of industry available cyber-security practices, which have been adapted specifically for application to industry control system networks and components. Each recommendation is linked to a set of actions that can be applied to remediate-specific security vulnerabilities.

  2. A Cyber Security Self-Assessment Method for Nuclear Power Plants

    SciTech Connect

    Glantz, Clifford S.; Coles, Garill A.; Bass, Robert B.

    2004-11-01

    A cyber security self-assessment method (the Method) has been developed by Pacific Northwest National Laboratory. The development of the Method was sponsored and directed by the U.S. Nuclear Regulatory Commission. Members of the Nuclear Energy Institute Cyber Security Task Force also played a substantial role in developing the Method. The Method's structured approach guides nuclear power plants in scrutinizing their digital systems, assessing the potential consequences to the plant of a cyber exploitation, identifying vulnerabilities, estimating cyber security risks, and adopting cost-effective protective measures. The focus of the Method is on critical digital assets. A critical digital asset is a digital device or system that plays a role in the operation, maintenance, or proper functioning of a critical system (i.e., a plant system that can impact safety, security, or emergency preparedness). A critical digital asset may have a direct or indirect connection to a critical system. Direct connections include both wired and wireless communication pathways. Indirect connections include sneaker-net pathways by which software or data are manually transferred from one digital device to another. An indirect connection also may involve the use of instructions or data stored on a critical digital asset to make adjustments to a critical system. The cyber security self-assessment begins with the formation of an assessment team, and is followed by a six-stage process.

  3. Metaphors for cyber security.

    SciTech Connect

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  4. The Cyber Security Crisis

    ScienceCinema

    Spafford, Eugene [Purdue University, West Lafayette, Indiana, United States

    2016-07-12

    Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

  5. The Cyber Security Crisis

    SciTech Connect

    Spafford, Eugene

    2006-05-10

    Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

  6. Cyber Security Evaluation Tool

    2009-08-03

    CSET is a desktop software tool that guides users through a step-by-step process to assess their control system network security practices against recognized industry standards. The output from CSET is a prioritized list of recommendations for improving the cyber security posture of your organization’s ICS or enterprise network. CSET derives the recommendations from a database of cybersecurity standards, guidelines, and practices. Each recommendation is linked to a set of actions that can be applied tomore » enhance cybersecurity controls.« less

  7. Cyber Security Evaluation Tool

    SciTech Connect

    2009-08-03

    CSET is a desktop software tool that guides users through a step-by-step process to assess their control system network security practices against recognized industry standards. The output from CSET is a prioritized list of recommendations for improving the cyber security posture of your organization’s ICS or enterprise network. CSET derives the recommendations from a database of cybersecurity standards, guidelines, and practices. Each recommendation is linked to a set of actions that can be applied to enhance cybersecurity controls.

  8. INL@Work Cyber Security

    ScienceCinema

    Chaffin, May

    2016-07-12

    May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

  9. INL@Work Cyber Security

    SciTech Connect

    Chaffin, May

    2010-01-01

    May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

  10. Visualizing Cyber Security: Usable Workspaces

    SciTech Connect

    Fink, Glenn A.; North, Christopher L.; Endert, Alexander; Rose, Stuart J.

    2009-10-11

    An environment that supports cyber analytics work should enable multiple, simultaneous investigations, information foraging, and provide a solution space for organizing data. We describe our study of cyber security professionals and visualizations in a large, high-resolution display work environment. We discuss the tasks and needs of analysts that such an environment can support and present several prototypes designed to support these needs. We conclude with a usability evaluation of the prototypes and additional lessons learned.

  11. Cyber Security and Resilient Systems

    SciTech Connect

    Robert S. Anderson

    2009-07-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the

  12. Microgrid cyber security reference architecture.

    SciTech Connect

    Veitch, Cynthia K.; Henry, Jordan M.; Richardson, Bryan T.; Hart, Derek H.

    2013-07-01

    This document describes a microgrid cyber security reference architecture. First, we present a high-level concept of operations for a microgrid, including operational modes, necessary power actors, and the communication protocols typically employed. We then describe our motivation for designing a secure microgrid; in particular, we provide general network and industrial control system (ICS)-speci c vulnerabilities, a threat model, information assurance compliance concerns, and design criteria for a microgrid control system network. Our design approach addresses these concerns by segmenting the microgrid control system network into enclaves, grouping enclaves into functional domains, and describing actor communication using data exchange attributes. We describe cyber actors that can help mitigate potential vulnerabilities, in addition to performance bene ts and vulnerability mitigation that may be realized using this reference architecture. To illustrate our design approach, we present a notional a microgrid control system network implementation, including types of communica- tion occurring on that network, example data exchange attributes for actors in the network, an example of how the network can be segmented to create enclaves and functional domains, and how cyber actors can be used to enforce network segmentation and provide the neces- sary level of security. Finally, we describe areas of focus for the further development of the reference architecture.

  13. Cyber Security of the Electric Power Grid

    SciTech Connect

    Dagle, Jeffery E.

    2009-03-31

    Economic security and quality of life in modern society depend on the reliable supply and delivery of electric power. New cyber security vulnerabilities are emerging that introduce new risks to the Nation’s electric power grid. This presentation will describe issues, trends, and research opportunities for enhancing the cyber security of control systems associated with electric power system operations.

  14. Mathematical and Statistical Opportunities in Cyber Security

    SciTech Connect

    Meza, Juan; Campbell, Scott; Bailey, David

    2009-03-23

    The role of mathematics in a complex system such as the Internet has yet to be deeply explored. In this paper, we summarize some of the important and pressing problems in cyber security from the viewpoint of open science environments. We start by posing the question 'What fundamental problems exist within cyber security research that can be helped by advanced mathematics and statistics'? Our first and most important assumption is that access to real-world data is necessary to understand large and complex systems like the Internet. Our second assumption is that many proposed cyber security solutions could critically damage both the openness and the productivity of scientific research. After examining a range of cyber security problems, we come to the conclusion that the field of cyber security poses a rich set of new and exciting research opportunities for the mathematical and statistical sciences.

  15. Cyber Security Audit and Attack Detection Toolkit

    SciTech Connect

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  16. 76 FR 22409 - Nationwide Cyber Security Review (NCSR) Assessment

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-21

    ... SECURITY Nationwide Cyber Security Review (NCSR) Assessment AGENCY: National Protection and Programs.... SUMMARY: The Department of Homeland Security (DHS), National Protection and Programs Directorate (NPPD), Office of Cybersecurity and Communications (CS&C), National Cyber Security Division (NCSD),...

  17. Cyber Security and Critical Energy Infrastructure

    SciTech Connect

    Onyeji, Ijeoma; Bazilian, Morgan; Bronk, Chris

    2014-03-01

    Both the number and security implications of sophisticated cyber attacks on companies providing critical energy infrastructures are increasing. As power networks and, to a certain extent, oil and gas infrastructure both upstream and downstream, are becoming increasingly integrated with information communication technology systems, they are growing more susceptible to cyber attacks.

  18. Cyber/Physical Security Vulnerability Assessment Integration

    SciTech Connect

    MacDonald, Douglas G.; Clements, Samuel L.; Patrick, Scott W.; Perkins, Casey J.; Muller, George; Lancaster, Mary J.; Hutton, William J.

    2013-02-28

    Securing high value and critical assets is one of the biggest challenges facing this nation and others around the world. In modern integrated systems, there are four potential modes of attack available to an adversary: • physical only attack, • cyber only attack, • physical-enabled cyber attack, • cyber-enabled physical attack. Blended attacks involve an adversary working in one domain to reduce system effectiveness in another domain. This enables the attacker to penetrate further into the overall layered defenses. Existing vulnerability assessment (VA) processes and software tools which predict facility vulnerabilities typically evaluate the physical and cyber domains separately. Vulnerabilities which result from the integration of cyber-physical control systems are not well characterized and are often overlooked by existing assessment approaches. In this paper, we modified modification of the timely detection methodology, used for decades in physical security VAs, to include cyber components. The Physical and Cyber Risk Analysis Tool (PACRAT) prototype illustrates an integrated vulnerability assessment that includes cyber-physical interdependencies. Information about facility layout, network topology, and emplaced safeguards is used to evaluate how well suited a facility is to detect, delay, and respond to attacks, to identify the pathways most vulnerable to attack, and to evaluate how often safeguards are compromised for a given threat or adversary type. We have tested the PACRAT prototype on critical infrastructure facilities and the results are promising. Future work includes extending the model to prescribe the recommended security improvements via an automated cost-benefit analysis.

  19. Realizing Scientific Methods for Cyber Security

    SciTech Connect

    Carroll, Thomas E.; Manz, David O.; Edgar, Thomas W.; Greitzer, Frank L.

    2012-07-18

    There is little doubt among cyber security researchers about the lack of scientic rigor that underlies much of the liter-ature. The issues are manifold and are well documented. Further complicating the problem is insufficient scientic methods to address these issues. Cyber security melds man and machine: we inherit the challenges of computer science, sociology, psychology, and many other elds and create new ones where these elds interface. In this paper we detail a partial list of challenges imposed by rigorous science and survey how other sciences have tackled them, in the hope of applying a similar approach to cyber security science. This paper is by no means comprehensive: its purpose is to foster discussion in the community on how we can improve rigor in cyber security science.

  20. 75 FR 26171 - Cyber Security Certification Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-11

    ... the Commission has sought to motivate industry to adopt effective cyber security measures has been... how the criteria could be structured to reward greater transparency among service providers so...

  1. Embracing the Cloud for Better Cyber Security

    SciTech Connect

    Shue, Craig A; Lagesse, Brent J

    2011-01-01

    The future of cyber security is inextricably tied to the future of computing. Organizational needs and economic factors will drive computing outcomes. Cyber security researchers and practitioners must recognize the path of computing evolution and position themselves to influence the process to incorporate security as an inherent property. The best way to predict future computing trends is to look at recent developments and their motivations. Organizations are moving towards outsourcing their data storage, computation, and even user desktop environments. This trend toward cloud computing has a direct impact on cyber security: rather than securing user machines, preventing malware access, and managing removable media, a cloud-based security scheme must focus on enabling secure communication with remote systems. This change in approach will have profound implications for cyber security research efforts. In this work, we highlight existing and emerging technologies and the limitations of cloud computing systems. We then discuss the cyber security efforts that would support these applications. Finally, we discuss the implications of these computing architecture changes, in particular with respect to malware and social engineering.

  2. Integrated Safeguards and Security Management Self-Assessment 2004

    SciTech Connect

    Lunford, Dan; Ramsey, Dwayne

    2005-04-01

    In 2002 Ernest Orlando Lawrence Berkeley National Laboratory deployed the first Integrated Safeguards and Security Management (ISSM) Self-Assessment process, designed to measure the effect of the Laboratory's ISSM efforts. This process was recognized by DOE as a best practice and model program for self-assessment and training. In 2004, the second Self-Assessment was launched. The cornerstone of this process was an employee survey that was designed to meet several objectives: (1) Ensure that Laboratory assets are protected. (2) Provide a measurement of the Laboratory's current security status that can be compared against the 2002 Self-Assessment baseline. (3) Educate all Laboratory staff about security responsibilities, tools, and practices. (4) Provide security staff with feedback on the effectiveness of security programs. (5) Provide line management with the information they need to make informed decisions about security. This 2004 Self Assessment process began in July 2004 with every employee receiving an information packet and instructions for completing the ISSM survey. The Laboratory-wide survey contained questions designed to measure awareness and conformance to policy and best practices. The survey response was excellent--90% of Berkeley Lab employees completed the questionnaire. ISSM liaisons from each division followed up on the initial survey results with individual employees to improve awareness and resolve ambiguities uncovered by the questionnaire. As with the 2002 survey, the Self-Assessment produced immediate positive results for the ISSM program and revealed opportunities for longer-term corrective actions. Results of the questionnaire provided information for organizational profiles and an institutional summary. The overall level of security protection and awareness was very high--often above 90%. Post-survey work by the ISSM liaisons and line management consistently led to improved awareness and metrics, as shown by a comparison of profiles at the

  3. Cyber / Physical Security Vulnerability Assessment Integration

    SciTech Connect

    MacDonald, Douglas G.; Simpkins, Bret E.

    2012-07-28

    Abstract Both physical protection and cyber security domains offer solutions for the discovery of vulnerabilities through the use of various assessment processes and software tools. Each vulnerability assessment (VA) methodology provides the ability to identify and categorize vulnerabilities, and quantifies the risks within their own areas of expertise. Neither approach fully represents the true potential security risk to a site and/or a facility, nor comprehensively assesses the overall security posture. The technical approach to solving this problem was to identify methodologies and processes that blend the physical and cyber security assessments, and develop tools to accurately quantify the unaccounted for risk. SMEs from both the physical and the cyber security domains developed the blending methodologies, and cross trained each other on the various aspects of the physical and cyber security assessment processes. A local critical infrastructure entity volunteered to host a proof of concept physical/cyber security assessment, and the lessons learned have been leveraged by this effort. The four potential modes of attack an adversary can use in approaching a target are; Physical Only Attack, Cyber Only Attack, Physical Enabled Cyber Attack, and the Cyber Enabled Physical Attack. The Physical Only and the Cyber Only pathway analysis are two of the most widely analyzed attack modes. The pathway from an off-site location to the desired target location is dissected to ensure adversarial activity can be detected and neutralized by the protection strategy, prior to completion of a predefined task. This methodology typically explores a one way attack from the public space (or common area) inward towards the target. The Physical Enabled Cyber Attack and the Cyber Enabled Physical Attack are much more intricate. Both scenarios involve beginning in one domain to affect change in the other, then backing outward to take advantage of the reduced system effectiveness, before

  4. Control Systems Cyber Security Standards Support Activities

    SciTech Connect

    Robert Evans

    2009-01-01

    The Department of Homeland Security’s Control Systems Security Program (CSSP) is working with industry to secure critical infrastructure sectors from cyber intrusions that could compromise control systems. This document describes CSSP’s current activities with industry organizations in developing cyber security standards for control systems. In addition, it summarizes the standards work being conducted by organizations within the sector and provides a brief listing of sector meetings and conferences that might be of interest for each sector. Control systems cyber security standards are part of a rapidly changing environment. The participation of CSSP in the development effort for these standards has provided consistency in the technical content of the standards while ensuring that information developed by CSSP is included.

  5. CYBER/PHYSICAL SECURITY VULNERABILITY ASSESSMENT INTEGRATION

    SciTech Connect

    MacDonald, Douglas G.; Key, Brad; Clements, Samuel L.; Hutton, William J.; Craig, Philip A.; Patrick, Scott W.; Crawford, Cary E.

    2011-07-17

    This internally funded Laboratory-Directed R&D project by the Pacific Northwest National Laboratory, in conjunction with QinetiQ North America, is intended to identify and properly assess areas of overlap (and interaction) in the vulnerability assessment process between cyber security and physical protection. Existing vulnerability analysis (VA) processes and software tools exist, and these are heavily utilized in the determination of predicted vulnerability within the physical and cyber security domains. These determinations are normally performed independently of one another, and only interact on a superficial level. Both physical and cyber security subject matter experts have come to realize that though the various interactive elements exist, they are not currently quantified in most periodic security assessments. This endeavor aims to evaluate both physical and cyber VA techniques and provide a strategic approach to integrate the interdependent relationships of each into a single VA capability. This effort will also transform the existing suite of software currently utilized in the physical protection world to more accurately quantify the risk associated with a blended attack scenario. Performance databases will be created to support the characterization of the cyber security elements, and roll them into prototype software tools. This new methodology and software capability will enable analysts to better identify and assess the overall risk during a vulnerability analysis.

  6. Cyber Security--Are You Prepared?

    ERIC Educational Resources Information Center

    Newman, Scott

    2007-01-01

    During the summer 2002 term, Oklahoma State University-Okmulgee's Information Technologies Division offered a one credit-hour network security course--which barely had adequate student interest to meet the institution's enrollment requirements. Today, OSU-Okmulgee boasts one of the nation's premier cyber security programs. Many prospective…

  7. Competitive Cyber-Insurance and Internet Security

    NASA Astrophysics Data System (ADS)

    Shetty, Nikhil; Schwartz, Galina; Felegyhazi, Mark; Walrand, Jean

    This paper investigates how competitive cyber-insurers affect network security and welfare of the networked society. In our model, a user's probability to incur damage (from being attacked) depends on both his security and the network security, with the latter taken by individual users as given. First, we consider cyberinsurers who cannot observe (and thus, affect) individual user security. This asymmetric information causes moral hazard. Then, for most parameters, no equilibrium exists: the insurance market is missing. Even if an equilibrium exists, the insurance contract covers only a minor fraction of the damage; network security worsens relative to the no-insurance equilibrium. Second, we consider insurers with perfect information about their users' security. Here, user security is perfectly enforceable (zero cost); each insurance contract stipulates the required user security. The unique equilibrium contract covers the entire user damage. Still, for most parameters, network security worsens relative to the no-insurance equilibrium. Although cyber-insurance improves user welfare, in general, competitive cyber-insurers fail to improve network security.

  8. Towards Efficient Collaboration in Cyber Security

    SciTech Connect

    Hui, Peter SY; Bruce, Joseph R.; Fink, Glenn A.; Gregory, Michelle L.; Best, Daniel M.; McGrath, Liam R.; Endert, Alexander

    2010-06-03

    Cyber security analysts in different geographical and organizational domains are often largely tasked with similar duties, albeit with domain-specific variations. These analysts necessarily perform much of the same work independently— for instance, analyzing the same list of security bulletins released by largely the same set of software vendors. As such, communication and collaboration between such analysts would be mutually beneficial to the analysts involved, potentially reducing redundancy and offering the opportunity to preemptively alert each other to high-severity security alerts in a more timely fashion. However, several barriers to practical and efficient collaboration exist, and as such, no such framework exists to support such efforts. In this paper, we discuss the inherent difficulties which make efficient collaboration between cyber security analysts a difficult goal to achieve. We discuss preliminary ideas and concepts towards a collaborative cyber-security framework currently under development, whose goal is to facilitate analyst collaboration across these boundaries. While still in its early stages, we describe work-in-progress towards achieving this goal, including motivation, functionality, concepts, and a high-level description of the proposed system architecture.

  9. Interdependent Risk and Cyber Security: An Analysis of Security Investment and Cyber Insurance

    ERIC Educational Resources Information Center

    Shim, Woohyun

    2010-01-01

    An increasing number of firms rely on highly interconnected information networks. In such environments, defense against cyber attacks is complicated by residual risks caused by the interdependence of information security decisions of firms. IT security is affected not only by a firm's own management strategies but also by those of others. This…

  10. Primer Control System Cyber Security Framework and Technical Metrics

    SciTech Connect

    Wayne F. Boyer; Miles A. McQueen

    2008-05-01

    The Department of Homeland Security National Cyber Security Division supported development of a control system cyber security framework and a set of technical metrics to aid owner-operators in tracking control systems security. The framework defines seven relevant cyber security dimensions and provides the foundation for thinking about control system security. Based on the developed security framework, a set of ten technical metrics are recommended that allow control systems owner-operators to track improvements or degradations in their individual control systems security posture.

  11. Security Informatics Research Challenges for Mitigating Cyber Friendly Fire

    SciTech Connect

    Carroll, Thomas E.; Greitzer, Frank L.; Roberts, Adam D.

    2014-09-30

    This paper addresses cognitive implications and research needs surrounding the problem of cyber friendly re (FF). We dene cyber FF as intentional o*ensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintentionally harms the mission e*ectiveness of friendly or neutral forces. We describe examples of cyber FF and discuss how it ts within a general conceptual framework for cyber security failures. Because it involves human failure, cyber FF may be considered to belong to a sub-class of cyber security failures characterized as unintentional insider threats. Cyber FF is closely related to combat friendly re in that maintaining situation awareness (SA) is paramount to avoiding unintended consequences. Cyber SA concerns knowledge of a system's topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system and its nodes, the nature of the activities or work performed, and the available defensive and o*ensive countermeasures that may be applied to thwart network attacks. We describe a test bed designed to support empirical research on factors a*ecting cyber FF. Finally, we discuss mitigation strategies to combat cyber FF, including both training concepts and suggestions for decision aids and visualization approaches.

  12. Help for the Developers of Control System Cyber Security Standards

    SciTech Connect

    Robert P. Evans

    2008-05-01

    A Catalog of Control Systems Security: Recommendations for Standards Developers (Catalog), aimed at assisting organizations to facilitate the development and implementation of control system cyber security standards, has been developed. This catalog contains requirements that can help protect control systems from cyber attacks and can be applied to the Critical Infrastructures and Key Resources of the United States and other nations. The requirements contained in the catalog are a compilation of practices or various industry bodies used to increase the security of control systems from both physical and cyber attacks. They should be viewed as a collection of recommendations to be considered and judiciously employed, as appropriate, when reviewing and developing cyber security standards for control systems. The recommendations in the Catalog are intended to be broad enough to provide any industry using control systems the flexibility needed to develop sound cyber security standards specific to their individual security requirements.

  13. Building organisational cyber resilience: A strategic knowledge-based view of cyber security management.

    PubMed

    Ferdinand, Jason

    The concept of cyber resilience has emerged in recent years in response to the recognition that cyber security is more than just risk management. Cyber resilience is the goal of organisations, institutions and governments across the world and yet the emerging literature is somewhat fragmented due to the lack of a common approach to the subject. This limits the possibility of effective collaboration across public, private and governmental actors in their efforts to build and maintain cyber resilience. In response to this limitation, and to calls for a more strategically focused approach, this paper offers a knowledge-based view of cyber security management that explains how an organisation can build, assess, and maintain cyber resilience. PMID:26642176

  14. Building organisational cyber resilience: A strategic knowledge-based view of cyber security management.

    PubMed

    Ferdinand, Jason

    The concept of cyber resilience has emerged in recent years in response to the recognition that cyber security is more than just risk management. Cyber resilience is the goal of organisations, institutions and governments across the world and yet the emerging literature is somewhat fragmented due to the lack of a common approach to the subject. This limits the possibility of effective collaboration across public, private and governmental actors in their efforts to build and maintain cyber resilience. In response to this limitation, and to calls for a more strategically focused approach, this paper offers a knowledge-based view of cyber security management that explains how an organisation can build, assess, and maintain cyber resilience.

  15. Ant-Based Cyber Security

    SciTech Connect

    Haack, Jereme N.; Fink, Glenn A.; Maiden, Wendy M.; McKinnon, Archibald D.; Templeton, Steven J.; Fulp, Errin W.

    2011-07-12

    We describe a swarming-agent-based, mixed-initiative approach to infrastructure defense where teams of humans and software agents defend cooperating organizations in tandem by sharing insights and solutions without violating proprietary boundaries. The system places human administrators at the appropriate level where they provide system guidance while lower-level agents carry out tasks humans are unable to perform quickly enough to mitigate today’s security threats. Cooperative Infrastructure Defense (CID) uses our ant-based approach to enable dialogue between humans and agents to foster a collaborative problem-solving environment, increase human situational awareness and influence using visualization and shared control. We discuss theoretical implementation characteristics along with results from recent proof-of-concept implementations.

  16. Mission Assurance Modeling and Simulation: A Cyber Security Roadmap

    NASA Technical Reports Server (NTRS)

    Gendron, Gerald; Roberts, David; Poole, Donold; Aquino, Anna

    2012-01-01

    This paper proposes a cyber security modeling and simulation roadmap to enhance mission assurance governance and establish risk reduction processes within constrained budgets. The term mission assurance stems from risk management work by Carnegie Mellon's Software Engineering Institute in the late 19905. By 2010, the Defense Information Systems Agency revised its cyber strategy and established the Program Executive Officer-Mission Assurance. This highlights a shift from simply protecting data to balancing risk and begins a necessary dialogue to establish a cyber security roadmap. The Military Operations Research Society has recommended a cyber community of practice, recognizing there are too few professionals having both cyber and analytic experience. The authors characterize the limited body of knowledge in this symbiotic relationship. This paper identifies operational and research requirements for mission assurance M&S supporting defense and homeland security. M&S techniques are needed for enterprise oversight of cyber investments, test and evaluation, policy, training, and analysis.

  17. Evaluation Report on "The Department's Unclassified Cyber Security Program"

    SciTech Connect

    2009-10-01

    defenses against malicious intruders and other externals threats. These are positive accomplishments. However, in our judgment, additional action is required to further enhance the Department's unclassified cyber security program and help reduce risks to its systems and data. For example, our current review identified opportunities for improvements in areas such as security planning and testing, systems inventory, access controls, and configuration management. In particular, we issued a number of findings at sites managed by the National Nuclear Security Administration (NNSA). We also identified weaknesses across various Department program elements. Issues that warrant further attention include: (1) Weaknesses such as outdated security plans and not completing annual security control self-assessments were identified at several sites; (2) The Department had not yet resolved systems inventory issues and had yet to deploy a complex-wide automated asset management tool to help track information technology resources and identify interfaces between systems or networks; (3) Although certain improvements had been made to enhance access controls, we noted deficiencies such as a lack of periodic account reviews and inadequate password management at a number of sites; and (4) Previously identified weaknesses in configuration management had been corrected, however, we found problems related to weak administrator account settings and failure to install software patches, as well as incomplete implementation of the Federal Desktop Core Configuration. These internal control weaknesses existed, at least in part, because certain cyber security roles and responsibilities were not clearly delineated. Program officials also had not effectively performed monitoring and review activities essential for evaluating the adequacy of cyber security performance. In some cases, officials had not ensured that weaknesses discovered during audits and other evaluations were recorded and tracked to

  18. Cyber security best practices for the nuclear industry

    SciTech Connect

    Badr, I.

    2012-07-01

    When deploying software based systems, such as, digital instrumentation and controls for the nuclear industry, it is vital to include cyber security assessment as part of architecture and development process. When integrating and delivering software-intensive systems for the nuclear industry, engineering teams should make use of a secure, requirements driven, software development life cycle, ensuring security compliance and optimum return on investment. Reliability protections, data loss prevention, and privacy enforcement provide a strong case for installing strict cyber security policies. (authors)

  19. Cyber security analysis testbed : combining real, emulation, and simulation.

    SciTech Connect

    Villamarin, Charles H.; Eldridge, John M.; Van Leeuwen, Brian P.; Urias, Vincent E.

    2010-07-01

    Cyber security analysis tools are necessary to evaluate the security, reliability, and resilience of networked information systems against cyber attack. It is common practice in modern cyber security analysis to separately utilize real systems of computers, routers, switches, firewalls, computer emulations (e.g., virtual machines) and simulation models to analyze the interplay between cyber threats and safeguards. In contrast, Sandia National Laboratories has developed novel methods to combine these evaluation platforms into a hybrid testbed that combines real, emulated, and simulated components. The combination of real, emulated, and simulated components enables the analysis of security features and components of a networked information system. When performing cyber security analysis on a system of interest, it is critical to realistically represent the subject security components in high fidelity. In some experiments, the security component may be the actual hardware and software with all the surrounding components represented in simulation or with surrogate devices. Sandia National Laboratories has developed a cyber testbed that combines modeling and simulation capabilities with virtual machines and real devices to represent, in varying fidelity, secure networked information system architectures and devices. Using this capability, secure networked information system architectures can be represented in our testbed on a single, unified computing platform. This provides an 'experiment-in-a-box' capability. The result is rapidly-produced, large-scale, relatively low-cost, multi-fidelity representations of networked information systems. These representations enable analysts to quickly investigate cyber threats and test protection approaches and configurations.

  20. Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop

    SciTech Connect

    Sheldon, Frederick T; Krings, Axel; Yoo, Seong-Moo; Mili, Ali; Trien, Joseph P

    2006-01-01

    The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglected or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .

  1. Evaluation of current visualization tools for cyber security

    NASA Astrophysics Data System (ADS)

    Langton, John T.; Newey, Brent

    2010-04-01

    Visualization tools for cyber security often overlook related research from the information visualization domain. Cyber security data sets are notoriously large, yet many of the popular analysis tools use 3D techniques and parallel coordinates which have been shown to suffer issues of occlusion when applied to large data sets1,2. While techniques exist to ameliorate these issues they are typically not used. In this paper we evaluate several cyber security visualization tools based on established design principles and human-computer interaction research. We conclude by enumerating challenges, requirements, and recommendations for future work.

  2. Empirical analysis of the effects of cyber security incidents.

    PubMed

    Davis, Ginger; Garcia, Alfredo; Zhang, Weide

    2009-09-01

    We analyze the time series associated with web traffic for a representative set of online businesses that have suffered widely reported cyber security incidents. Our working hypothesis is that cyber security incidents may prompt (security conscious) online customers to opt out and conduct their business elsewhere or, at the very least, to refrain from accessing online services. For companies relying almost exclusively on online channels, this presents an important business risk. We test for structural changes in these time series that may have been caused by these cyber security incidents. Our results consistently indicate that cyber security incidents do not affect the structure of web traffic for the set of online businesses studied. We discuss various public policy considerations stemming from our analysis. PMID:19558397

  3. Empirical analysis of the effects of cyber security incidents.

    PubMed

    Davis, Ginger; Garcia, Alfredo; Zhang, Weide

    2009-09-01

    We analyze the time series associated with web traffic for a representative set of online businesses that have suffered widely reported cyber security incidents. Our working hypothesis is that cyber security incidents may prompt (security conscious) online customers to opt out and conduct their business elsewhere or, at the very least, to refrain from accessing online services. For companies relying almost exclusively on online channels, this presents an important business risk. We test for structural changes in these time series that may have been caused by these cyber security incidents. Our results consistently indicate that cyber security incidents do not affect the structure of web traffic for the set of online businesses studied. We discuss various public policy considerations stemming from our analysis.

  4. Visualization for cyber security command and control

    NASA Astrophysics Data System (ADS)

    Langton, John T.; Newey, Brent; Havig, Paul R.

    2010-04-01

    To address the unique requirements of cyber Command and Control (C2), new visualization methods are needed to provide situation awareness and decision support within the cyber domain. A key challenge is the complexity of relevant data: it is immense and multidimensional, includes streaming and log data, and comes from multiple, disparate applications and devices. Decision makers must be afforded a view of a) the current state of the cyber battlespace, b) enemy and friendly capabilities and vulnerabilities, c) correlations between cyber events, and d) potential effects of alternative courses of action within cyberspace. In this paper we present requirements and designs for Visualization for Integrated Cyber Command and Control (VIC3).

  5. Cyber-Physical System Security of Smart Grids

    SciTech Connect

    Dagle, Jeffery E.

    2012-01-31

    Abstract—This panel presentation will provide perspectives of cyber-physical system security of smart grids. As smart grid technologies are deployed, the interconnected nature of these systems is becoming more prevalent and more complex, and the cyber component of this cyber-physical system is increasing in importance. Studying system behavior in the face of failures (e.g., cyber attacks) allows a characterization of the systems’ response to failure scenarios, loss of communications, and other changes in system environment (such as the need for emergent updates and rapid reconfiguration). The impact of such failures on the availability of the system can be assessed and mitigation strategies considered. Scenarios associated with confidentiality, integrity, and availability are considered. The cyber security implications associated with the American Recovery and Reinvestment Act of 2009 in the United States are discussed.

  6. Process Control System Cyber Security Standards - An Overview

    SciTech Connect

    Robert P. Evans

    2006-05-01

    The use of cyber security standards can greatly assist in the protection of process control systems by providing guidelines and requirements for the implementation of computer-controlled systems. These standards are most effective when the engineers and operators, using the standards, understand what each standard addresses. This paper provides an overview of several standards that deal with the cyber security of process measurements and control systems.

  7. Gamification for Measuring Cyber Security Situational Awareness

    SciTech Connect

    Fink, Glenn A.; Best, Daniel M.; Manz, David O.; Popovsky, V. M.; Endicott-Popovsky, Barbara E.

    2013-03-01

    Cyber defense competitions arising from U.S. service academy exercises, offer a platform for collecting data that can inform research that ranges from characterizing the ideal cyber warrior to describing behaviors during certain challenging cyber defense situations. This knowledge could lead to better preparation of cyber defenders in both military and civilian settings. This paper describes how one regional competition, the PRCCDC, a participant in the national CCDC program, conducted proof of concept experimentation to collect data during the annual competition for later analysis. The intent is to create an ongoing research agenda that expands on this current work and incorporates augmented cognition and gamification methods for measuring cybersecurity situational awareness under the stress of cyber attack.

  8. Cyber Security Testing and Training Programs for Industrial Control Systems

    SciTech Connect

    Daniel Noyes

    2012-03-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  9. Cyber Security Vulnerability Impact on I&C Reliability

    SciTech Connect

    Hadley, Mark D.; McBride, Justin B.

    2006-11-01

    We present a discussion of the cyber security vulnerability impact on instrument and control reliability. In the discussion we demonstrate the likely vector of attack and vulnerabilities associated with commodity hardware, protocols and communication media. The current fleet of nuclear power plants in the United States utilizes aging analog instrument and control systems which are more frequently suffering from obsolescence and failure. The commodity equipment available now and in the near future incorporates features from information technology systems which compound cyber vulnerabilities.

  10. Evaluation of a Cyber Security System for Hospital Network.

    PubMed

    Faysel, Mohammad A

    2015-01-01

    Most of the cyber security systems use simulated data in evaluating their detection capabilities. The proposed cyber security system utilizes real hospital network connections. It uses a probabilistic data mining algorithm to detect anomalous events and takes appropriate response in real-time. On an evaluation using real-world hospital network data consisting of incoming network connections collected for a 24-hour period, the proposed system detected 15 unusual connections which were undetected by a commercial intrusion prevention system for the same network connections. Evaluation of the proposed system shows a potential to secure protected patient health information on a hospital network. PMID:26262217

  11. Evaluation of a Cyber Security System for Hospital Network.

    PubMed

    Faysel, Mohammad A

    2015-01-01

    Most of the cyber security systems use simulated data in evaluating their detection capabilities. The proposed cyber security system utilizes real hospital network connections. It uses a probabilistic data mining algorithm to detect anomalous events and takes appropriate response in real-time. On an evaluation using real-world hospital network data consisting of incoming network connections collected for a 24-hour period, the proposed system detected 15 unusual connections which were undetected by a commercial intrusion prevention system for the same network connections. Evaluation of the proposed system shows a potential to secure protected patient health information on a hospital network.

  12. The cyber security threat stops in the boardroom.

    PubMed

    Scully, Tim

    The attitude that 'it won't happen to me' still prevails in the boardrooms of industry when senior executives consider the threat of targeted cyber intrusions. Not much has changed in the commercial world of cyber security over the past few years; hackers are not being challenged to find new ways to steal companies' intellectual property and confidential information. The consequences of even major security breaches seem not to be felt by the leaders of victim companies. Why is this so? Surely IT security practitioners are seeking new ways to detect and prevent targeted intrusions into companies' networks? Are the consequences of targeted intrusions so insignificant that the captains of industry tolerate them? Or do only others feel the pain of their failure? This paper initially explores the failure of cyber security in industry and contends that, while industry leaders should not be alone in accepting responsibility for this failure, they must take the initiative to make life harder for cyber threat actors. They cannot wait for government leadership on policy, strategy or coordination. The paper then suggests some measures that a CEO can adopt to build a new corporate approach to cyber security. PMID:24457325

  13. The cyber security threat stops in the boardroom.

    PubMed

    Scully, Tim

    The attitude that 'it won't happen to me' still prevails in the boardrooms of industry when senior executives consider the threat of targeted cyber intrusions. Not much has changed in the commercial world of cyber security over the past few years; hackers are not being challenged to find new ways to steal companies' intellectual property and confidential information. The consequences of even major security breaches seem not to be felt by the leaders of victim companies. Why is this so? Surely IT security practitioners are seeking new ways to detect and prevent targeted intrusions into companies' networks? Are the consequences of targeted intrusions so insignificant that the captains of industry tolerate them? Or do only others feel the pain of their failure? This paper initially explores the failure of cyber security in industry and contends that, while industry leaders should not be alone in accepting responsibility for this failure, they must take the initiative to make life harder for cyber threat actors. They cannot wait for government leadership on policy, strategy or coordination. The paper then suggests some measures that a CEO can adopt to build a new corporate approach to cyber security.

  14. Towards A Network-of-Networks Framework for Cyber Security

    SciTech Connect

    Halappanavar, Mahantesh; Choudhury, Sutanay; Hogan, Emilie A.; Hui, Peter SY; Johnson, John R.; Ray, Indrajit; Holder, Lawrence B.

    2013-06-07

    Networks-of-networks (NoN) is a graph-theoretic model of interdependent networks that have distinct dynamics at each network (layer). By adding special edges to represent relationships between nodes in different layers, NoN provides a unified mechanism to study interdependent systems intertwined in a complex relationship. While NoN based models have been proposed for cyber-physical systems, in this paper we build towards a three-layer NoN model for an enterprise cyber system. Each layer captures a different facet of a cyber system. We then discuss the potential benefits of graph-theoretic analysis enabled from such a model. Our goal is to provide a novel and powerful tool for modeling and analyzing problems in cyber security.

  15. Using a Prediction Model to Manage Cyber Security Threats.

    PubMed

    Jaganathan, Venkatesh; Cherurveettil, Priyesh; Muthu Sivashanmugam, Premapriya

    2015-01-01

    Cyber-attacks are an important issue faced by all organizations. Securing information systems is critical. Organizations should be able to understand the ecosystem and predict attacks. Predicting attacks quantitatively should be part of risk management. The cost impact due to worms, viruses, or other malicious software is significant. This paper proposes a mathematical model to predict the impact of an attack based on significant factors that influence cyber security. This model also considers the environmental information required. It is generalized and can be customized to the needs of the individual organization. PMID:26065024

  16. Process Control System Cyber Security Standards - An Overview

    SciTech Connect

    Robert P. Evans; V Stanley Scown; Rolf Carlson; Shabbir Shamsuddin; George Shaw; Jeff Dagle; Paul W Oman; Jeannine Schmidt

    2005-10-01

    The use of cyber security standards can greatly assist in the protection of critical infrastructure by providing guidelines and requisite imperatives in the implementation of computer-controlled systems. These standards are most effective when the engineers and operators using the standards understand what each of the standards addresses and does not address. This paper provides a review and comparison of ten documents dealing with control system cyber security. It is not meant to be a complete treatment of all applicable standards; rather, this is an exemplary analysis showing the benefits of comparing and contrasting differing documents.

  17. Using a Prediction Model to Manage Cyber Security Threats.

    PubMed

    Jaganathan, Venkatesh; Cherurveettil, Priyesh; Muthu Sivashanmugam, Premapriya

    2015-01-01

    Cyber-attacks are an important issue faced by all organizations. Securing information systems is critical. Organizations should be able to understand the ecosystem and predict attacks. Predicting attacks quantitatively should be part of risk management. The cost impact due to worms, viruses, or other malicious software is significant. This paper proposes a mathematical model to predict the impact of an attack based on significant factors that influence cyber security. This model also considers the environmental information required. It is generalized and can be customized to the needs of the individual organization.

  18. Cyber security evaluation of II&C technologies

    SciTech Connect

    Thomas, Ken

    2014-11-01

    The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a

  19. Using a Prediction Model to Manage Cyber Security Threats

    PubMed Central

    Muthu Sivashanmugam, Premapriya

    2015-01-01

    Cyber-attacks are an important issue faced by all organizations. Securing information systems is critical. Organizations should be able to understand the ecosystem and predict attacks. Predicting attacks quantitatively should be part of risk management. The cost impact due to worms, viruses, or other malicious software is significant. This paper proposes a mathematical model to predict the impact of an attack based on significant factors that influence cyber security. This model also considers the environmental information required. It is generalized and can be customized to the needs of the individual organization. PMID:26065024

  20. Cyber resilience: a review of critical national infrastructure and cyber security protection measures applied in the UK and USA.

    PubMed

    Harrop, Wayne; Matteson, Ashley

    This paper presents cyber resilience as key strand of national security. It establishes the importance of critical national infrastructure protection and the growing vicarious nature of remote, well-planned, and well executed cyber attacks on critical infrastructures. Examples of well-known historical cyber attacks are presented, and the emergence of 'internet of things' as a cyber vulnerability issue yet to be tackled is explored. The paper identifies key steps being undertaken by those responsible for detecting, deterring, and disrupting cyber attacks on critical national infrastructure in the United Kingdom and the USA.

  1. Cyber resilience: a review of critical national infrastructure and cyber security protection measures applied in the UK and USA.

    PubMed

    Harrop, Wayne; Matteson, Ashley

    This paper presents cyber resilience as key strand of national security. It establishes the importance of critical national infrastructure protection and the growing vicarious nature of remote, well-planned, and well executed cyber attacks on critical infrastructures. Examples of well-known historical cyber attacks are presented, and the emergence of 'internet of things' as a cyber vulnerability issue yet to be tackled is explored. The paper identifies key steps being undertaken by those responsible for detecting, deterring, and disrupting cyber attacks on critical national infrastructure in the United Kingdom and the USA. PMID:24457326

  2. Survey of cyber security issues in smart grids

    NASA Astrophysics Data System (ADS)

    Chen, Thomas M.

    2010-04-01

    The future smart grid will enable cost savings and lower energy use by means of smart appliances and smart meters which support dynamic load management and real-time monitoring of energy use and distribution. The introduction of two-way communications and control into power grid introduces security and privacy concerns. This talk will survey the security and privacy issues in smart grids using the NIST reference model, and relate these issues to cyber security in the Internet.

  3. Cyber Security and American Cyber Competitiveness Act of 2011

    THOMAS, 112th Congress

    Sen. Reid, Harry [D-NV

    2011-01-25

    01/25/2011 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (text of measure as introduced: CR S130) (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  4. Data fusion in cyber security: first order entity extraction from common cyber data

    NASA Astrophysics Data System (ADS)

    Giacobe, Nicklaus A.

    2012-06-01

    The Joint Directors of Labs Data Fusion Process Model (JDL Model) provides a framework for how to handle sensor data to develop higher levels of inference in a complex environment. Beginning from a call to leverage data fusion techniques in intrusion detection, there have been a number of advances in the use of data fusion algorithms in this subdomain of cyber security. While it is tempting to jump directly to situation-level or threat-level refinement (levels 2 and 3) for more exciting inferences, a proper fusion process starts with lower levels of fusion in order to provide a basis for the higher fusion levels. The process begins with first order entity extraction, or the identification of important entities represented in the sensor data stream. Current cyber security operational tools and their associated data are explored for potential exploitation, identifying the first order entities that exist in the data and the properties of these entities that are described by the data. Cyber events that are represented in the data stream are added to the first order entities as their properties. This work explores typical cyber security data and the inferences that can be made at the lower fusion levels (0 and 1) with simple metrics. Depending on the types of events that are expected by the analyst, these relatively simple metrics can provide insight on their own, or could be used in fusion algorithms as a basis for higher levels of inference.

  5. A Hierarchical Security Architecture for Cyber-Physical Systems

    SciTech Connect

    Quanyan Zhu; Tamer Basar

    2011-08-01

    Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.

  6. Cyber secure systems approach for NPP digital control systems

    SciTech Connect

    McCreary, T. J.; Hsu, A.

    2006-07-01

    Whether fossil or nuclear power, the chief operations goal is to generate electricity. The heart of most plant operations is the I and C system. With the march towards open architecture, the I and C system is more vulnerable than ever to system security attacks (denial of service, virus attacks and others), thus jeopardizing plant operations. Plant staff must spend large amounts of time and money setting up and monitoring a variety of security strategies to counter the threats and actual attacks to the system. This time and money is a drain on the financial performance of a plant and distracts valuable operations resources from their real goals: product. The pendulum towards complete open architecture may have swung too far. Not all aspects of proprietary hardware and software are necessarily 'bad'. As the aging U.S. fleet of nuclear power plants starts to engage in replacing legacy control systems, and given the on-going (and legitimate) concern about the security of present digital control systems, decisions about how best to approach cyber security are vital to the specification and selection of control system vendors for these upgrades. The authors maintain that utilizing certain resources available in today's digital technology, plant control systems can be configured from the onset to be inherently safe, so that plant staff can concentrate on the operational issues of the plant. The authors postulate the concept of the plant I and C being bounded in a 'Cyber Security Zone' and present a design approach that can alleviate the concern and cost at the plant level of dealing with system security strategies. Present approaches through various IT cyber strategies, commercial software, and even postulated standards from various industry/trade organizations are almost entirely reactive and simply add to cost and complexity. This Cyber Security Zone design demonstrates protection from the four classes of cyber security attacks: 1)Threat from an intruder attempting to

  7. UVI Cyber-security Workshop Workshop Analysis.

    SciTech Connect

    Kuykendall, Tommie G.; Allsop, Jacob Lee; Anderson, Benjamin Robert; Boumedine, Marc; Carter, Cedric; Galvin, Seanmichael Yurko; Gonzalez, Oscar; Lee, Wellington K.; Lin, Han Wei; Morris, Tyler Jake; Nauer, Kevin S.; Potts, Beth A.; Ta, Kim Thanh; Trasti, Jennifer; White, David R.

    2015-07-08

    The cybersecurity consortium, which was established by DOE/NNSA’s Minority Serving Institutions Partnerships Program (MSIPP), allows students from any of the partner schools (13 HBCUs, two national laboratories, and a public school district) to have all consortia options available to them, to create career paths and to open doors to DOE sites and facilities to student members of the consortium. As a part of this year consortium activities, Sandia National Laboratories and the University of Virgin Islands conducted a week long cyber workshop that consisted of three courses; Digital Forensics and Malware Analysis, Python Programming, and ThunderBird Cup. These courses are designed to enhance cyber defense skills and promote learning within STEM related fields.

  8. A Comparison of Cross-Sector Cyber Security Standards

    SciTech Connect

    Robert P. Evans

    2005-09-01

    This report presents a review and comparison (commonality and differences) of three cross-sector cyber security standards and an internationally recognized information technology standard. The comparison identifies the security areas covered by each standard and reveals where the standards differ in emphasis. By identifying differences in the standards, the user can evaluate which standard best meets their needs. For this report, only cross-sector standards were reviewed.

  9. Automatic Labeling for Entity Extraction in Cyber Security

    SciTech Connect

    Bridges, Robert A; Jones, Corinne L; Iannacone, Michael D; Testa, Kelly M; Goodall, John R

    2014-01-01

    Timely analysis of cyber-security information necessitates automated information extraction from unstructured text. While state-of-the-art extraction methods produce extremely accurate results, they require ample training data, which is generally unavailable for specialized applications, such as detecting security related entities; moreover, manual annotation of corpora is very costly and often not a viable solution. In response, we develop a very precise method to automatically label text from several data sources by leveraging related, domain-specific, structured data and provide public access to a corpus annotated with cyber-security entities. Next, we implement a Maximum Entropy Model trained with the average perceptron on a portion of our corpus (~750,000 words) and achieve near perfect precision, recall, and accuracy, with training times under 17 seconds.

  10. Cyber Security Research Frameworks For Coevolutionary Network Defense

    SciTech Connect

    Rush, George D.; Tauritz, Daniel Remy

    2015-12-03

    Several architectures have been created for developing and testing systems used in network security, but most are meant to provide a platform for running cyber security experiments as opposed to automating experiment processes. In the first paper, we propose a framework termed Distributed Cyber Security Automation Framework for Experiments (DCAFE) that enables experiment automation and control in a distributed environment. Predictive analysis of adversaries is another thorny issue in cyber security. Game theory can be used to mathematically analyze adversary models, but its scalability limitations restrict its use. Computational game theory allows us to scale classical game theory to larger, more complex systems. In the second paper, we propose a framework termed Coevolutionary Agent-based Network Defense Lightweight Event System (CANDLES) that can coevolve attacker and defender agent strategies and capabilities and evaluate potential solutions with a custom network defense simulation. The third paper is a continuation of the CANDLES project in which we rewrote key parts of the framework. Attackers and defenders have been redesigned to evolve pure strategy, and a new network security simulation is devised which specifies network architecture and adds a temporal aspect. We also add a hill climber algorithm to evaluate the search space and justify the use of a coevolutionary algorithm.

  11. Breaking the cyber-security dilemma: aligning security needs and removing vulnerabilities.

    PubMed

    Dunn Cavelty, Myriam

    2014-09-01

    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and "its" security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace to (national) security is presented as possible disruption to a specific way of life, one building on information technologies and critical functions of infrastructures, with relatively little consideration for humans directly. This non-focus on people makes it easier for state actors to militarize cyber-security and (re-)assert their power in cyberspace, thereby overriding the different security needs of human beings in that space. Paradoxically, the use of cyberspace as a tool for national security, both in the dimension of war fighting and the dimension of mass-surveillance, has detrimental effects on the level of cyber-security globally. A solution out of this dilemma is a cyber-security policy that is decidedly anti-vulnerability and at the same time based on strong considerations for privacy and data protection. Such a security would have to be informed by an ethics of the infosphere that is based on the dignity of information related to human beings. PMID:24781874

  12. Breaking the cyber-security dilemma: aligning security needs and removing vulnerabilities.

    PubMed

    Dunn Cavelty, Myriam

    2014-09-01

    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and "its" security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace to (national) security is presented as possible disruption to a specific way of life, one building on information technologies and critical functions of infrastructures, with relatively little consideration for humans directly. This non-focus on people makes it easier for state actors to militarize cyber-security and (re-)assert their power in cyberspace, thereby overriding the different security needs of human beings in that space. Paradoxically, the use of cyberspace as a tool for national security, both in the dimension of war fighting and the dimension of mass-surveillance, has detrimental effects on the level of cyber-security globally. A solution out of this dilemma is a cyber-security policy that is decidedly anti-vulnerability and at the same time based on strong considerations for privacy and data protection. Such a security would have to be informed by an ethics of the infosphere that is based on the dignity of information related to human beings.

  13. Validating Cyber Security Requirements: A Case Study

    SciTech Connect

    Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2011-01-01

    Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, security should not be quantified by the number of vulnerabilities. Security should be managed by pursuing a policy that leads us first to the highest impact vulnerabilities. In light of these observations, we argue in favor of shifting our focus from vulnerability avoidance/removal to measurable security attributes. To this effect, we recommend a logic be used for system security, which captures/represents security properties in quantifiable, verifiable, measurable terms so that it is possible to reason about security in terms of its observable/perceptible effects rather than its hypothesized causes. This approach is orthogonal to existing techniques for vulnerability avoidance, removal, detection, and recovery, in the sense that it provides a means to assess, quantify, and combine these techniques.

  14. Bio-Inspired Cyber Security for Smart Grid Deployments

    SciTech Connect

    McKinnon, Archibald D.; Thompson, Seth R.; Doroshchuk, Ruslan A.; Fink, Glenn A.; Fulp, Errin W.

    2013-05-01

    mart grid technologies are transforming the electric power grid into a grid with bi-directional flows of both power and information. Operating millions of new smart meters and smart appliances will significantly impact electric distribution systems resulting in greater efficiency. However, the scale of the grid and the new types of information transmitted will potentially introduce several security risks that cannot be addressed by traditional, centralized security techniques. We propose a new bio-inspired cyber security approach. Social insects, such as ants and bees, have developed complex-adaptive systems that emerge from the collective application of simple, light-weight behaviors. The Digital Ants framework is a bio-inspired framework that uses mobile light-weight agents. Sensors within the framework use digital pheromones to communicate with each other and to alert each other of possible cyber security issues. All communication and coordination is both localized and decentralized thereby allowing the framework to scale across the large numbers of devices that will exist in the smart grid. Furthermore, the sensors are light-weight and therefore suitable for implementation on devices with limited computational resources. This paper will provide a brief overview of the Digital Ants framework and then present results from test bed-based demonstrations that show that Digital Ants can identify a cyber attack scenario against smart meter deployments.

  15. Ideal Based Cyber Security Technical Metrics for Control Systems

    SciTech Connect

    W. F. Boyer; M. A. McQueen

    2007-10-01

    Much of the world's critical infrastructure is at risk from attack through electronic networks connected to control systems. Security metrics are important because they provide the basis for management decisions that affect the protection of the infrastructure. A cyber security technical metric is the security relevant output from an explicit mathematical model that makes use of objective measurements of a technical object. A specific set of technical security metrics are proposed for use by the operators of control systems. Our proposed metrics are based on seven security ideals associated with seven corresponding abstract dimensions of security. We have defined at least one metric for each of the seven ideals. Each metric is a measure of how nearly the associated ideal has been achieved. These seven ideals provide a useful structure for further metrics development. A case study shows how the proposed metrics can be applied to an operational control system.

  16. SecureCPS: Defending a nanosatellite cyber-physical system

    NASA Astrophysics Data System (ADS)

    Forbes, Lance; Vu, Huy; Udrea, Bogdan; Hagar, Hamilton; Koutsoukos, Xenofon D.; Yampolskiy, Mark

    2014-06-01

    Recent inexpensive nanosatellite designs employ maneuvering thrusters, much as large satellites have done for decades. However, because a maneuvering nanosatellite can threaten HVAs on-­orbit, it must provide a level of security typically reserved for HVAs. Securing nanosatellites with maneuvering capability is challenging due to extreme cost, size, and power constraints. While still in the design process, our low-­cost SecureCPS architecture promises to dramatically improve security, to include preempting unknown binaries and detecting abnormal behavior. SecureCPS also applies to a broad class of cyber-­physical systems (CPS), such as aircraft, cars, and trains. This paper focuses on Embry-­Riddle's ARAPAIMA nanosatellite architecture, where we assume any off-­the-­shelf component could be compromised by a supply chain attack.1 Based on these assumptions, we have used Vanderbilt's Cyber Physical -­ Attack Description Language (CP-­ADL) to represent realistic attacks, analyze how these attacks propagate in the ARAPAIMA architecture, and how to defeat them using the combination of a low-­cost Root of Trust (RoT) Module, Global InfoTek's Advanced Malware Analysis System (GAMAS), and Anomaly Detection by Machine Learning (ADML).2 Our most recent efforts focus on refining and validating the design of SecureCPS.

  17. INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY

    SciTech Connect

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

  18. Cyber security risk assessment for SCADA and DCS networks.

    PubMed

    Ralston, P A S; Graham, J H; Hieb, J L

    2007-10-01

    The growing dependence of critical infrastructures and industrial automation on interconnected physical and cyber-based control systems has resulted in a growing and previously unforeseen cyber security threat to supervisory control and data acquisition (SCADA) and distributed control systems (DCSs). It is critical that engineers and managers understand these issues and know how to locate the information they need. This paper provides a broad overview of cyber security and risk assessment for SCADA and DCS, introduces the main industry organizations and government groups working in this area, and gives a comprehensive review of the literature to date. Major concepts related to the risk assessment methods are introduced with references cited for more detail. Included are risk assessment methods such as HHM, IIM, and RFRM which have been applied successfully to SCADA systems with many interdependencies and have highlighted the need for quantifiable metrics. Presented in broad terms is probability risk analysis (PRA) which includes methods such as FTA, ETA, and FEMA. The paper concludes with a general discussion of two recent methods (one based on compromise graphs and one on augmented vulnerability trees) that quantitatively determine the probability of an attack, the impact of the attack, and the reduction in risk associated with a particular countermeasure. PMID:17624350

  19. Cyber security risk assessment for SCADA and DCS networks.

    PubMed

    Ralston, P A S; Graham, J H; Hieb, J L

    2007-10-01

    The growing dependence of critical infrastructures and industrial automation on interconnected physical and cyber-based control systems has resulted in a growing and previously unforeseen cyber security threat to supervisory control and data acquisition (SCADA) and distributed control systems (DCSs). It is critical that engineers and managers understand these issues and know how to locate the information they need. This paper provides a broad overview of cyber security and risk assessment for SCADA and DCS, introduces the main industry organizations and government groups working in this area, and gives a comprehensive review of the literature to date. Major concepts related to the risk assessment methods are introduced with references cited for more detail. Included are risk assessment methods such as HHM, IIM, and RFRM which have been applied successfully to SCADA systems with many interdependencies and have highlighted the need for quantifiable metrics. Presented in broad terms is probability risk analysis (PRA) which includes methods such as FTA, ETA, and FEMA. The paper concludes with a general discussion of two recent methods (one based on compromise graphs and one on augmented vulnerability trees) that quantitatively determine the probability of an attack, the impact of the attack, and the reduction in risk associated with a particular countermeasure.

  20. Cyber Assessment Methods For SCADA Security

    SciTech Connect

    May Robin Permann; Kenneth Rohde

    2005-06-01

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  1. Cyber Assessment Methods for SCADA Security

    SciTech Connect

    Not Available

    2005-06-01

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  2. Tensions in collaborative cyber security and how they affect incident detection and response

    SciTech Connect

    Fink, Glenn A.; McKinnon, Archibald D.; Clements, Samuel L.; Frincke, Deborah A.

    2009-12-01

    Security often requires collaboration, but when multiple stakeholders are involved, it is typical for their priorities to differ or even conflict with one another. In today’s increasingly networked world, cyber security collaborations may span organizations and countries. In this chapter, we address collaboration tensions, their effects on incident detection and response, and how these tensions may potentially be resolved. We present three case studies of collaborative cyber security within the U.S. government and discuss technical, social, and regulatory challenges to collaborative cyber security. We suggest possible solutions, and present lessons learned from conflicts. Finally, we compare collaborative solutions from other domains and apply them to cyber security collaboration. Although we concentrate our analysis on collaborations whose purpose is to achieve cyber security, we believe that this work applies readily to security tensions found in collaborations of a general nature as well.

  3. Probabilistic Characterization of Adversary Behavior in Cyber Security

    SciTech Connect

    Meyers, C A; Powers, S S; Faissol, D M

    2009-10-08

    The objective of this SMS effort is to provide a probabilistic characterization of adversary behavior in cyber security. This includes both quantitative (data analysis) and qualitative (literature review) components. A set of real LLNL email data was obtained for this study, consisting of several years worth of unfiltered traffic sent to a selection of addresses at ciac.org. The email data was subjected to three interrelated analyses: a textual study of the header data and subject matter, an examination of threats present in message attachments, and a characterization of the maliciousness of embedded URLs.

  4. Comparison of two methods to quantify cyber and physical security effectiveness.

    SciTech Connect

    Wyss, Gregory Dane; Gordon, Kristl A.

    2005-11-01

    With the increasing reliance on cyber technology to operate and control physical security system components, there is a need for methods to assess and model the interactions between the cyber system and the physical security system to understand the effects of cyber technology on overall security system effectiveness. This paper evaluates two methodologies for their applicability to the combined cyber and physical security problem. The comparison metrics include probabilities of detection (P{sub D}), interruption (P{sub I}), and neutralization (P{sub N}), which contribute to calculating the probability of system effectiveness (P{sub E}), the probability that the system can thwart an adversary attack. P{sub E} is well understood in practical applications of physical security but when the cyber security component is added, system behavior becomes more complex and difficult to model. This paper examines two approaches (Bounding Analysis Approach (BAA) and Expected Value Approach (EVA)) to determine their applicability to the combined physical and cyber security issue. These methods were assessed for a variety of security system characteristics to determine whether reasonable security decisions could be made based on their results. The assessments provided insight on an adversary's behavior depending on what part of the physical security system is cyber-controlled. Analysis showed that the BAA is more suited to facility analyses than the EVA because it has the ability to identify and model an adversary's most desirable attack path.

  5. Secure control systems with application to cyber-physical systems

    SciTech Connect

    Dong, Jin; Djouadi, Seddik M; Nutaro, James J; Kuruganti, Phani Teja

    2014-01-01

    Control systems are computer-based systems with networked units consisting of sensors, actuators, control processing units, and communication devices. The role of control system is to interact, monitor, and control physical processes. Reactive power control is a fundamental issue in ensuring the security of the power network. It is claimed that Synchronous Condensers (SC) have been used at both distribution and transmission voltage levels to improve stability and to maintain voltages within desired limits under changing load conditions and contingency situations. Performance of PI controller corresponding to various tripping faults are analyzed for SC systems. Most of the eort in protecting these systems has been in protection against random failures or reliability. However, besides failures these systems are subject to various signal attacks for which new analysis are discussed here. When a breach does occur, it is necessary to react in a time commensurate with the physical dynamics of the system as it responds to the attack. Failure to act swiftly enough may result in undesirable, and possibly irreversible, physical eects. Therefore, it is meaningful to evaluate the security of a cyber-physical system, especially to protect it from cyber-attack. Illustrative numerical examples are provided together with an application to the SC systems.

  6. Secure it now or secure it later: the benefits of addressing cyber-security from the outset

    NASA Astrophysics Data System (ADS)

    Olama, Mohammed M.; Nutaro, James

    2013-05-01

    The majority of funding for research and development (R&D) in cyber-security is focused on the end of the software lifecycle where systems have been deployed or are nearing deployment. Recruiting of cyber-security personnel is similarly focused on end-of-life expertise. By emphasizing cyber-security at these late stages, security problems are found and corrected when it is most expensive to do so, thus increasing the cost of owning and operating complex software systems. Worse, expenditures on expensive security measures often mean less money for innovative developments. These unwanted increases in cost and potential slowing of innovation are unavoidable consequences of an approach to security that finds and remediate faults after software has been implemented. We argue that software security can be improved and the total cost of a software system can be substantially reduced by an appropriate allocation of resources to the early stages of a software project. By adopting a similar allocation of R&D funds to the early stages of the software lifecycle, we propose that the costs of cyber-security can be better controlled and, consequently, the positive effects of this R&D on industry will be much more pronounced.

  7. Emerging Security Mechanisms for Medical Cyber Physical Systems.

    PubMed

    Kocabas, Ovunc; Soyata, Tolga; Aktas, Mehmet K

    2016-01-01

    The following decade will witness a surge in remote health-monitoring systems that are based on body-worn monitoring devices. These Medical Cyber Physical Systems (MCPS) will be capable of transmitting the acquired data to a private or public cloud for storage and processing. Machine learning algorithms running in the cloud and processing this data can provide decision support to healthcare professionals. There is no doubt that the security and privacy of the medical data is one of the most important concerns in designing an MCPS. In this paper, we depict the general architecture of an MCPS consisting of four layers: data acquisition, data aggregation, cloud processing, and action. Due to the differences in hardware and communication capabilities of each layer, different encryption schemes must be used to guarantee data privacy within that layer. We survey conventional and emerging encryption schemes based on their ability to provide secure storage, data sharing, and secure computation. Our detailed experimental evaluation of each scheme shows that while the emerging encryption schemes enable exciting new features such as secure sharing and secure computation, they introduce several orders-of-magnitude computational and storage overhead. We conclude our paper by outlining future research directions to improve the usability of the emerging encryption schemes in an MCPS. PMID:26812732

  8. Emerging Security Mechanisms for Medical Cyber Physical Systems.

    PubMed

    Kocabas, Ovunc; Soyata, Tolga; Aktas, Mehmet K

    2016-01-01

    The following decade will witness a surge in remote health-monitoring systems that are based on body-worn monitoring devices. These Medical Cyber Physical Systems (MCPS) will be capable of transmitting the acquired data to a private or public cloud for storage and processing. Machine learning algorithms running in the cloud and processing this data can provide decision support to healthcare professionals. There is no doubt that the security and privacy of the medical data is one of the most important concerns in designing an MCPS. In this paper, we depict the general architecture of an MCPS consisting of four layers: data acquisition, data aggregation, cloud processing, and action. Due to the differences in hardware and communication capabilities of each layer, different encryption schemes must be used to guarantee data privacy within that layer. We survey conventional and emerging encryption schemes based on their ability to provide secure storage, data sharing, and secure computation. Our detailed experimental evaluation of each scheme shows that while the emerging encryption schemes enable exciting new features such as secure sharing and secure computation, they introduce several orders-of-magnitude computational and storage overhead. We conclude our paper by outlining future research directions to improve the usability of the emerging encryption schemes in an MCPS.

  9. Network Intrusion Detection and Visualization using Aggregations in a Cyber Security Data Warehouse

    SciTech Connect

    Czejdo, Bogdan; Ferragut, Erik M; Goodall, John R; Laska, Jason A

    2012-01-01

    The challenge of achieving situational understanding is a limiting factor in effective, timely, and adaptive cyber-security analysis. Anomaly detection fills a critical role in network assessment and trend analysis, both of which underlie the establishment of comprehensive situational understanding. To that end, we propose a cyber security data warehouse implemented as a hierarchical graph of aggregations that captures anomalies at multiple scales. Each node of our pro-posed graph is a summarization table of cyber event aggregations, and the edges are aggregation operators. The cyber security data warehouse enables domain experts to quickly traverse a multi-scale aggregation space systematically. We describe the architecture of a test bed system and a summary of results on the IEEE VAST 2012 Cyber Forensics data.

  10. Cyber Friendly Fire: Research Challenges for Security Informatics

    SciTech Connect

    Greitzer, Frank L.; Carroll, Thomas E.; Roberts, Adam D.

    2013-06-06

    This paper addresses cognitive implications and research needs surrounding the problem of cyber friendly fire (FF). We define cyber FF as intentional offensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintention-ally harms the mission effectiveness of friendly or neutral forces. Just as with combat friendly fire, maintaining situation awareness (SA) is paramount to avoiding cyber FF incidents. Cyber SA concerns knowledge of a system’s topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system and its nodes, the nature of the activities or work performed, and the available defensive and offensive countermeasures that may be applied to thwart network attacks. Mitigation strategies to combat cyber FF— including both training concepts and suggestions for decision aids and visualization approaches—are discussed.

  11. Cyber Terrorism: A Study of the Extent of Coverage in Computer Security Textbooks

    ERIC Educational Resources Information Center

    Prichard, Janet J.; MacDonald, Laurie E.

    2004-01-01

    On September 11th, 2001 the United States experienced the largest terrorist attack in its history. This event caused many government agencies to review their security practices and procedures. It also has raised awareness of other avenues that terrorists might pursue to achieve their goals, including cyber terrorism. Cyber terrorism can be…

  12. 32 CFR 236.5 - Cyber security information sharing.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... is determined to be relevant to a reported incident, including information regarding forensic analyses, mitigation and remediation, and cyber intrusion damage assessments. (d) Cyber intrusion damage assessment. Following analysis of a cyber incident, DC3/DCISE may provide information relevant to...

  13. 32 CFR 236.5 - Cyber security information sharing.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... is determined to be relevant to a reported incident, including information regarding forensic analyses, mitigation and remediation, and cyber intrusion damage assessments. (d) Cyber intrusion damage assessment. Following analysis of a cyber incident, DC3/DCISE may provide information relevant to...

  14. 32 CFR 236.5 - Cyber security information sharing.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... is determined to be relevant to a reported incident, including information regarding forensic analyses, mitigation and remediation, and cyber intrusion damage assessments. (d) Cyber intrusion damage assessment. Following analysis of a cyber incident, DC3/DCISE may provide information relevant to...

  15. Towards an Experimental Testbed Facility for Cyber-Physical Security Research

    SciTech Connect

    Edgar, Thomas W.; Manz, David O.; Carroll, Thomas E.

    2012-01-07

    Cyber-Physical Systems (CPSs) are under great scrutiny due to large Smart Grid investments and recent high profile security vulnerabilities and attacks. Research into improved security technologies, communication models, and emergent behavior is necessary to protect these systems from sophisticated adversaries and new risks posed by the convergence of CPSs with IT equipment. However, cyber-physical security research is limited by the lack of access to universal cyber-physical testbed facilities that permit flexible, high-fidelity experiments. This paper presents a remotely-configurable and community-accessible testbed design that integrates elements from the virtual, simulated, and physical environments. Fusing data between the three environments enables the creation of realistic and scalable environments where new functionality and ideas can be exercised. This novel design will enable the research community to analyze and evaluate the security of current environments and design future, secure, cyber-physical technologies.

  16. A genetic epidemiology approach to cyber-security.

    PubMed

    Gil, Santiago; Kott, Alexander; Barabási, Albert-László

    2014-01-01

    While much attention has been paid to the vulnerability of computer networks to node and link failure, there is limited systematic understanding of the factors that determine the likelihood that a node (computer) is compromised. We therefore collect threat log data in a university network to study the patterns of threat activity for individual hosts. We relate this information to the properties of each host as observed through network-wide scans, establishing associations between the network services a host is running and the kinds of threats to which it is susceptible. We propose a methodology to associate services to threats inspired by the tools used in genetics to identify statistical associations between mutations and diseases. The proposed approach allows us to determine probabilities of infection directly from observation, offering an automated high-throughput strategy to develop comprehensive metrics for cyber-security. PMID:25028059

  17. A genetic epidemiology approach to cyber-security

    PubMed Central

    Gil, Santiago; Kott, Alexander; Barabási, Albert-László

    2014-01-01

    While much attention has been paid to the vulnerability of computer networks to node and link failure, there is limited systematic understanding of the factors that determine the likelihood that a node (computer) is compromised. We therefore collect threat log data in a university network to study the patterns of threat activity for individual hosts. We relate this information to the properties of each host as observed through network-wide scans, establishing associations between the network services a host is running and the kinds of threats to which it is susceptible. We propose a methodology to associate services to threats inspired by the tools used in genetics to identify statistical associations between mutations and diseases. The proposed approach allows us to determine probabilities of infection directly from observation, offering an automated high-throughput strategy to develop comprehensive metrics for cyber-security. PMID:25028059

  18. Cyber-Security Considerations for the Smart Grid

    SciTech Connect

    Clements, Samuel L.; Kirkham, Harold

    2010-07-26

    The electrical power grid is evolving into the “smart grid”. The goal of the smart grid is to improve efficiency and availability of power by adding more monitoring and control capabilities. These new technologies and mechanisms are certain to introduce vulnerabilities into the power grid. In this paper we provide an overview of the cyber security state of the electrical power grid. We highlight some of the vulnerabilities that already exist in the power grid including limited capacity systems, implicit trust and the lack of authentication. We also address challenges of complexity, scale, added capabilities and the move to multipurpose hardware and software as the power grid is upgraded. These changes create vulnerabilities that did not exist before and bring increased risks. We conclude the paper by showing that there are a number mitigation strategies that can help keep the risk at an acceptable level.

  19. A genetic epidemiology approach to cyber-security.

    PubMed

    Gil, Santiago; Kott, Alexander; Barabási, Albert-László

    2014-07-16

    While much attention has been paid to the vulnerability of computer networks to node and link failure, there is limited systematic understanding of the factors that determine the likelihood that a node (computer) is compromised. We therefore collect threat log data in a university network to study the patterns of threat activity for individual hosts. We relate this information to the properties of each host as observed through network-wide scans, establishing associations between the network services a host is running and the kinds of threats to which it is susceptible. We propose a methodology to associate services to threats inspired by the tools used in genetics to identify statistical associations between mutations and diseases. The proposed approach allows us to determine probabilities of infection directly from observation, offering an automated high-throughput strategy to develop comprehensive metrics for cyber-security.

  20. Control Systems Cyber Security:Defense in Depth Strategies

    SciTech Connect

    David Kuipers; Mark Fabro

    2006-05-01

    Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: Maintenance of various field devices, telemetry collection, and/or industrial-level process systems Access to facilities via remote data link or modem Public facing services for customer or corporate operations A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

  1. Cyber security challenges in Smart Cities: Safety, security and privacy

    PubMed Central

    Elmaghraby, Adel S.; Losavio, Michael M.

    2014-01-01

    The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, cars, public venues and other social systems are now on their path to the full connectivity known as the “Internet of Things.” Standards are evolving for all of these potentially connected systems. They will lead to unprecedented improvements in the quality of life. To benefit from them, city infrastructures and services are changing with new interconnected systems for monitoring, control and automation. Intelligent transportation, public and private, will access a web of interconnected data from GPS location to weather and traffic updates. Integrated systems will aid public safety, emergency responders and in disaster recovery. We examine two important and entangled challenges: security and privacy. Security includes illegal access to information and attacks causing physical disruptions in service availability. As digital citizens are more and more instrumented with data available about their location and activities, privacy seems to disappear. Privacy protecting systems that gather data and trigger emergency response when needed are technological challenges that go hand-in-hand with the continuous security challenges. Their implementation is essential for a Smart City in which we would wish to live. We also present a model representing the interactions between person, servers and things. Those are the major element in the Smart City and their interactions are what we need to protect. PMID:25685517

  2. Cyber security challenges in Smart Cities: Safety, security and privacy.

    PubMed

    Elmaghraby, Adel S; Losavio, Michael M

    2014-07-01

    The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, cars, public venues and other social systems are now on their path to the full connectivity known as the "Internet of Things." Standards are evolving for all of these potentially connected systems. They will lead to unprecedented improvements in the quality of life. To benefit from them, city infrastructures and services are changing with new interconnected systems for monitoring, control and automation. Intelligent transportation, public and private, will access a web of interconnected data from GPS location to weather and traffic updates. Integrated systems will aid public safety, emergency responders and in disaster recovery. We examine two important and entangled challenges: security and privacy. Security includes illegal access to information and attacks causing physical disruptions in service availability. As digital citizens are more and more instrumented with data available about their location and activities, privacy seems to disappear. Privacy protecting systems that gather data and trigger emergency response when needed are technological challenges that go hand-in-hand with the continuous security challenges. Their implementation is essential for a Smart City in which we would wish to live. We also present a model representing the interactions between person, servers and things. Those are the major element in the Smart City and their interactions are what we need to protect. PMID:25685517

  3. Cyber security challenges in Smart Cities: Safety, security and privacy.

    PubMed

    Elmaghraby, Adel S; Losavio, Michael M

    2014-07-01

    The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, cars, public venues and other social systems are now on their path to the full connectivity known as the "Internet of Things." Standards are evolving for all of these potentially connected systems. They will lead to unprecedented improvements in the quality of life. To benefit from them, city infrastructures and services are changing with new interconnected systems for monitoring, control and automation. Intelligent transportation, public and private, will access a web of interconnected data from GPS location to weather and traffic updates. Integrated systems will aid public safety, emergency responders and in disaster recovery. We examine two important and entangled challenges: security and privacy. Security includes illegal access to information and attacks causing physical disruptions in service availability. As digital citizens are more and more instrumented with data available about their location and activities, privacy seems to disappear. Privacy protecting systems that gather data and trigger emergency response when needed are technological challenges that go hand-in-hand with the continuous security challenges. Their implementation is essential for a Smart City in which we would wish to live. We also present a model representing the interactions between person, servers and things. Those are the major element in the Smart City and their interactions are what we need to protect.

  4. Cyber Science and Security - An R&D Partnership at LLNL

    SciTech Connect

    Brase, J; Henson, V

    2011-03-11

    Lawrence Livermore National Laboratory has established a mechanism for partnership that integrates the high-performance computing capabilities of the National Labs, the network and cyber technology expertise of leading information technology companies, and the long-term research vision of leading academic cyber programs. The Cyber Science and Security Center is designed to be a working partnership among Laboratory, Industrial, and Academic institutions, and provides all three with a shared R&D environment, technical information sharing, sophisticated high-performance computing facilities, and data resources for the partner institutions and sponsors. The CSSC model is an institution where partner organizations can work singly or in groups on the most pressing problems of cyber security, where shared vision and mutual leveraging of expertise and facilities can produce results and tools at the cutting edge of cyber science.

  5. A developmental approach to learning causal models for cyber security

    NASA Astrophysics Data System (ADS)

    Mugan, Jonathan

    2013-05-01

    To keep pace with our adversaries, we must expand the scope of machine learning and reasoning to address the breadth of possible attacks. One approach is to employ an algorithm to learn a set of causal models that describes the entire cyber network and each host end node. Such a learning algorithm would run continuously on the system and monitor activity in real time. With a set of causal models, the algorithm could anticipate novel attacks, take actions to thwart them, and predict the second-order effects flood of information, and the algorithm would have to determine which streams of that flood were relevant in which situations. This paper will present the results of efforts toward the application of a developmental learning algorithm to the problem of cyber security. The algorithm is modeled on the principles of human developmental learning and is designed to allow an agent to learn about the computer system in which it resides through active exploration. Children are flexible learners who acquire knowledge by actively exploring their environment and making predictions about what they will find,1, 2 and our algorithm is inspired by the work of the developmental psychologist Jean Piaget.3 Piaget described how children construct knowledge in stages and learn new concepts on top of those they already know. Developmental learning allows our algorithm to focus on subsets of the environment that are most helpful for learning given its current knowledge. In experiments, the algorithm was able to learn the conditions for file exfiltration and use that knowledge to protect sensitive files.

  6. Situational Awareness as a Measure of Performance in Cyber Security Collaborative Work

    SciTech Connect

    Malviya, Ashish; Fink, Glenn A.; Sego, Landon H.; Endicott-Popovsky, Barbara E.

    2011-04-11

    Cyber defense competitions arising from U.S. service academy exercises, offer a platform for collecting data that can inform research that ranges from characterizing the ideal cyber warrior to describing behaviors during certain challenging cyber defense situations. This knowledge in turn could lead to better preparation of cyber defenders in both military and civilian settings. We conducted proof of concept experimentation to collect data during the Pacific-rim Regional Collegiate Cyber Defense Competition (PRCCDC) and analyzed it to study the behavior of cyber defenders. We propose that situational awareness predicts performance of cyber security professionals, and in this paper we focus on our collection and analysis of competition data to determine whether it supports our hypothesis. In addition to normal cyber data, we collected situational awareness and workload data and compared it against the performance of cyber defenders as indicated by their competition score. We conclude that there is a weak correlation between our measure of situational awareness and performance that we hope to exploit in further studies.

  7. DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY

    SciTech Connect

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

  8. Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues

    SciTech Connect

    Wayne F. Boyer; Scott A. McBride

    2009-04-01

    This document provides information for a report to congress on Smart Grid security as required by Section 1309 of Title XIII of the Energy Independence and Security Act of 2007. The security of any future Smart Grid is dependent on successfully addressing the cyber security issues associated with the nation’s current power grid. Smart Grid will utilize numerous legacy systems and technologies that are currently installed. Therefore, known vulnerabilities in these legacy systems must be remediated and associated risks mitigated in order to increase the security and success of the Smart Grid. The implementation of Smart Grid will include the deployment of many new technologies and multiple communication infrastructures. This report describes the main technologies that support Smart Grid and summarizes the status of implementation into the existing U.S. electrical infrastructure.

  9. Towards Resilient Critical Infrastructures: Application of Type-2 Fuzzy Logic in Embedded Network Security Cyber Sensor

    SciTech Connect

    Ondrej Linda; Todd Vollmer; Jim Alves-Foss; Milos Manic

    2011-08-01

    Resiliency and cyber security of modern critical infrastructures is becoming increasingly important with the growing number of threats in the cyber-environment. This paper proposes an extension to a previously developed fuzzy logic based anomaly detection network security cyber sensor via incorporating Type-2 Fuzzy Logic (T2 FL). In general, fuzzy logic provides a framework for system modeling in linguistic form capable of coping with imprecise and vague meanings of words. T2 FL is an extension of Type-1 FL which proved to be successful in modeling and minimizing the effects of various kinds of dynamic uncertainties. In this paper, T2 FL provides a basis for robust anomaly detection and cyber security state awareness. In addition, the proposed algorithm was specifically developed to comply with the constrained computational requirements of low-cost embedded network security cyber sensors. The performance of the system was evaluated on a set of network data recorded from an experimental cyber-security test-bed.

  10. Control Systems Cyber Security: Defense-in-Depth Strategies

    SciTech Connect

    Mark Fabro

    2007-10-01

    Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: • Maintenance of various field devices, telemetry collection, and/or industrial-level process systems • Access to facilities via remote data link or modem • Public facing services for customer or corporate operations • A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

  11. A preliminary cyber-physical security assessment of the Robot Operating System (ROS)

    NASA Astrophysics Data System (ADS)

    McClean, Jarrod; Stull, Christopher; Farrar, Charles; Mascareñas, David

    2013-05-01

    Over the course of the last few years, the Robot Operating System (ROS) has become a highly popular software framework for robotics research. ROS has a very active developer community and is widely used for robotics research in both academia and government labs. The prevalence and modularity of ROS cause many people to ask the question: "What prevents ROS from being used in commercial or government applications?" One of the main problems that is preventing this increased use of ROS in these applications is the question of characterizing its security (or lack thereof). In the summer of 2012, a crowd sourced cyber-physical security contest was launched at the cyber security conference DEF CON 20 to begin the process of characterizing the security of ROS. A small-scale, car-like robot was configured as a cyber-physical security "honeypot" running ROS. DEFFCON-20 attendees were invited to find exploits and vulnerabilities in the robot while network traffic was collected. The results of this experiment provided some interesting insights and opened up many security questions pertaining to deployed robotic systems. The Federal Aviation Administration is tasked with opening up the civil airspace to commercial drones by September 2015 and driverless cars are already legal for research purposes in a number of states. Given the integration of these robotic devices into our daily lives, the authors pose the following question: "What security exploits can a motivated person with little-to-no experience in cyber security execute, given the wide availability of free cyber security penetration testing tools such as Metasploit?" This research focuses on applying common, low-cost, low-overhead, cyber-attacks on a robot featuring ROS. This work documents the effectiveness of those attacks.

  12. Fuzzy Logic Based Anomaly Detection for Embedded Network Security Cyber Sensor

    SciTech Connect

    Ondrej Linda; Todd Vollmer; Jason Wright; Milos Manic

    2011-04-01

    Resiliency and security in critical infrastructure control systems in the modern world of cyber terrorism constitute a relevant concern. Developing a network security system specifically tailored to the requirements of such critical assets is of a primary importance. This paper proposes a novel learning algorithm for anomaly based network security cyber sensor together with its hardware implementation. The presented learning algorithm constructs a fuzzy logic rule based model of normal network behavior. Individual fuzzy rules are extracted directly from the stream of incoming packets using an online clustering algorithm. This learning algorithm was specifically developed to comply with the constrained computational requirements of low-cost embedded network security cyber sensors. The performance of the system was evaluated on a set of network data recorded from an experimental test-bed mimicking the environment of a critical infrastructure control system.

  13. 75 FR 18819 - Second DRAFT NIST Interagency Report (NISTIR) 7628, Smart Grid Cyber Security Strategy and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-13

    ...) Dynamic optimization of grid operations and resources, with full cyber-security * * *'' With the Smart... Grid. NIST published a request for public comments in the Federal Register on October 9, 2009 (74 FR... to address emerging threats, Smart Grid paradigms and other changing elements of security....

  14. Good Things in Small Packages: Micro Worlds and Cyber Security

    SciTech Connect

    David I Gertman

    2013-11-01

    Cyber events, as perpetrated by terrorists and nation states, have become commonplace as evidenced in national and international news media. Cyber attacks affect day-to-day activities of end users through exploitation of social networks, businesses such as banking and stock exchanges, and government entities including Departments of Defense. They are becoming more frequent and sophisticated. Currently, efforts are directed to understanding the methods employed by attackers and towards dissecting the planning and activities of the perpetrator, including review of psychosocial factors.

  15. Measuring the Effectiveness of Visual Analytics and Data Fusion Techniques on Situation Awareness in Cyber-Security

    ERIC Educational Resources Information Center

    Giacobe, Nicklaus A.

    2013-01-01

    Cyber-security involves the monitoring a complex network of inter-related computers to prevent, identify and remediate from undesired actions. This work is performed in organizations by human analysts. These analysts monitor cyber-security sensors to develop and maintain situation awareness (SA) of both normal and abnormal activities that occur on…

  16. Cyber Security Indications and Warning System (SV): CRADA 1573.94 Project Accomplishments Summary

    SciTech Connect

    Hu, Tan Chang; Robinson, David G.

    2011-09-08

    As the national focus on cyber security increases, there is an evolving need for a capability to provide for high-speed sensing of events, correlation of events, and decision-making based on the adverse events seen across multiple independent large-scale network environments. The purpose of this Shared Vision project, Cyber Security Indications and Warning System, was to combine both Sandia's and LMC's expertise to discover new solutions to the challenge of protecting our nation's infrastructure assets. The objectives and scope of the proposal was limited to algorithm and High Performance Computing (HPC) model assessment in the unclassified environment within funding and schedule constraints. The interest is the identification, scalability assessment, and applicability of current utilized cyber security algorithms as applied in an HPC environment.

  17. T3: Secure, Scalable, Distributed Data Movement and Remote System Control for Enterprise Level Cyber Security

    SciTech Connect

    Thomas, Gregory S.; Nickless, William K.; Thiede, David R.; Gorton, Ian; Pitre, Bill J.; Christy, Jason E.; Faultersack, Elizabeth M.; Mauth, Jeffery A.

    2009-07-20

    Enterprise level cyber security requires the deployment, operation, and monitoring of many sensors across geographically dispersed sites. Communicating with the sensors to gather data and control behavior is a challenging task when the number of sensors is rapidly growing. This paper describes the system requirements, design, and implementation of T3, the third generation of our transport software that performs this task. T3 relies on open source software and open Internet standards. Data is encoded in MIME format messages and transported via NNTP, which provides scalability. OpenSSL and public key cryptography are used to secure the data. Robustness and ease of development are increased by defining an internal cryptographic API, implemented by modules in C, Perl, and Python. We are currently using T3 in a production environment. It is freely available to download and use for other projects.

  18. Individual differences in cyber security behaviors: an examination of who is sharing passwords.

    PubMed

    Whitty, Monica; Doodson, James; Creese, Sadie; Hodges, Duncan

    2015-01-01

    In spite of the number of public advice campaigns, researchers have found that individuals still engage in risky password practices. There is a dearth of research available on individual differences in cyber security behaviors. This study focused on the risky practice of sharing passwords. As predicted, we found that individuals who scored high on a lack of perseverance were more likely to share passwords. Contrary to our hypotheses, we found younger [corrected] people and individuals who score high on self-monitoring were more likely to share passwords. We speculate on the reasons behind these findings, and examine how they might be considered in future cyber security educational campaigns. PMID:25517697

  19. Individual differences in cyber security behaviors: an examination of who is sharing passwords.

    PubMed

    Whitty, Monica; Doodson, James; Creese, Sadie; Hodges, Duncan

    2015-01-01

    In spite of the number of public advice campaigns, researchers have found that individuals still engage in risky password practices. There is a dearth of research available on individual differences in cyber security behaviors. This study focused on the risky practice of sharing passwords. As predicted, we found that individuals who scored high on a lack of perseverance were more likely to share passwords. Contrary to our hypotheses, we found younger [corrected] people and individuals who score high on self-monitoring were more likely to share passwords. We speculate on the reasons behind these findings, and examine how they might be considered in future cyber security educational campaigns.

  20. Individual Differences in Cyber Security Behaviors: An Examination of Who Is Sharing Passwords

    PubMed Central

    Doodson, James; Creese, Sadie; Hodges, Duncan

    2015-01-01

    Abstract In spite of the number of public advice campaigns, researchers have found that individuals still engage in risky password practices. There is a dearth of research available on individual differences in cyber security behaviors. This study focused on the risky practice of sharing passwords. As predicted, we found that individuals who scored high on a lack of perseverance were more likely to share passwords. Contrary to our hypotheses, we found older people and individuals who score high on self-monitoring were more likely to share passwords. We speculate on the reasons behind these findings, and examine how they might be considered in future cyber security educational campaigns. PMID:25517697

  1. Modeling and simulation for cyber-physical system security research, development and applications.

    SciTech Connect

    Pollock, Guylaine M.; Atkins, William Dee; Schwartz, Moses Daniel; Chavez, Adrian R.; Urrea, Jorge Mario; Pattengale, Nicholas; McDonald, Michael James; Cassidy, Regis H.; Halbgewachs, Ronald D.; Richardson, Bryan T.; Mulder, John C.

    2010-02-01

    This paper describes a new hybrid modeling and simulation architecture developed at Sandia for understanding and developing protections against and mitigations for cyber threats upon control systems. It first outlines the challenges to PCS security that can be addressed using these technologies. The paper then describes Virtual Control System Environments (VCSE) that use this approach and briefly discusses security research that Sandia has performed using VCSE. It closes with recommendations to the control systems security community for applying this valuable technology.

  2. Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation

    SciTech Connect

    Greitzer, Frank L.; Frincke, Deborah A.

    2010-09-01

    The purpose of this chapter is to motivate the combination of traditional cyber security audit data with psychosocial data, so as to move from an insider threat detection stance to one that enables prediction of potential insider presence. Two distinctive aspects of the approach are the objective of predicting or anticipating potential risks and the use of organizational data in addition to cyber data to support the analysis. The chapter describes the challenges of this endeavor and progress in defining a usable set of predictive indicators, developing a framework for integrating the analysis of organizational and cyber security data to yield predictions about possible insider exploits, and developing the knowledge base and reasoning capability of the system. We also outline the types of errors that one expects in a predictive system versus a detection system and discuss how those errors can affect the usefulness of the results.

  3. Main control computer security model of closed network systems protection against cyber attacks

    NASA Astrophysics Data System (ADS)

    Seymen, Bilal

    2014-06-01

    The model that brings the data input/output under control in closed network systems, that maintains the system securely, and that controls the flow of information through the Main Control Computer which also brings the network traffic under control against cyber-attacks. The network, which can be controlled single-handedly thanks to the system designed to enable the network users to make data entry into the system or to extract data from the system securely, intends to minimize the security gaps. Moreover, data input/output record can be kept by means of the user account assigned for each user, and it is also possible to carry out retroactive tracking, if requested. Because the measures that need to be taken for each computer on the network regarding cyber security, do require high cost; it has been intended to provide a cost-effective working environment with this model, only if the Main Control Computer has the updated hardware.

  4. An assessment of the cyber security legislation and its impact on the United States electrical sector

    NASA Astrophysics Data System (ADS)

    Born, Joshua

    The purpose of this research was to examine the cyber-security posture for the United States' electrical grid, which comprises a major component of critical infrastructure for the country. The United States electrical sector is so vast, that the Department of Homeland Security (DHS) estimates, it contains more than 6,413 power plants (this includes 3,273 traditional electric utilities and 1,738 nonutility power producers) with approximately 1,075 gigawatts of energy produced on a daily basis. A targeted cyber-security attack against the electric grid would likely have catastrophic results and could even serve as a precursor to a physical attack against the United States. A recent report by the consulting firm Black and Veatch found that one of the top five greatest concerns for United States electric utilities is the risk that cybersecurity poses to their industry and yet, only one-third state they are currently prepared to meet the increasingly likely threat. The report goes on to state, "only 32% of electric utilities surveyed had integrated security systems with the proper segmentation, monitoring and redundancies needed for cyber threat protection. Another 48 % said they did not" Recent estimates indicate that a large-scale cyber-attack against this sector could cost the United States economy as much as a trillion dollars within a weeks' time. Legislative efforts in the past have primarily been focused on creating mandates that encourage public and private partnership, which have been not been adopted as quickly as desired. With 85 % of all electric utilities being privately owned, it is key that the public and private sector partner in order to mitigate risks and respond as a cohesive unit in the event of a major attack. Keywords: Cybersecurity, Professor Riddell, cyber security, energy, intelligence, outlook, electrical, compliance, legislation, partnerships, critical infrastructure.

  5. 76 FR 6637 - Assumption Buster Workshop: Defense-in-Depth Is a Smart Investment for Cyber Security

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-07

    ... Coordination Office (NCO) for the Networking and Information Technology Research and Development (NITRD.... SUMMARY: The NCO, on behalf of the Special Cyber Operations Research and Engineering (SCORE) Committee, an interagency working group that coordinates cyber security research activities in support of national...

  6. Cyber security with radio frequency interferences mitigation study for satellite systems

    NASA Astrophysics Data System (ADS)

    Wang, Gang; Wei, Sixiao; Chen, Genshe; Tian, Xin; Shen, Dan; Pham, Khanh; Nguyen, Tien M.; Blasch, Erik

    2016-05-01

    Satellite systems including the Global Navigation Satellite System (GNSS) and the satellite communications (SATCOM) system provide great convenience and utility to human life including emergency response, wide area efficient communications, and effective transportation. Elements of satellite systems incorporate technologies such as navigation with the global positioning system (GPS), satellite digital video broadcasting, and information transmission with a very small aperture terminal (VSAT), etc. The satellite systems importance is growing in prominence with end users' requirement for globally high data rate transmissions; the cost reduction of launching satellites; development of smaller sized satellites including cubesat, nanosat, picosat, and femtosat; and integrating internet services with satellite networks. However, with the promising benefits, challenges remain to fully develop secure and robust satellite systems with pervasive computing and communications. In this paper, we investigate both cyber security and radio frequency (RF) interferences mitigation for satellite systems, and demonstrate that they are not isolated. The action space for both cyber security and RF interferences are firstly summarized for satellite systems, based on which the mitigation schemes for both cyber security and RF interferences are given. A multi-layered satellite systems structure is provided with cross-layer design considering multi-path routing and channel coding, to provide great security and diversity gains for secure and robust satellite systems.

  7. Improving Cyber-Security of Smart Grid Systems via Anomaly Detection and Linguistic Domain Knowledge

    SciTech Connect

    Ondrej Linda; Todd Vollmer; Milos Manic

    2012-08-01

    The planned large scale deployment of smart grid network devices will generate a large amount of information exchanged over various types of communication networks. The implementation of these critical systems will require appropriate cyber-security measures. A network anomaly detection solution is considered in this work. In common network architectures multiple communications streams are simultaneously present, making it difficult to build an anomaly detection solution for the entire system. In addition, common anomaly detection algorithms require specification of a sensitivity threshold, which inevitably leads to a tradeoff between false positives and false negatives rates. In order to alleviate these issues, this paper proposes a novel anomaly detection architecture. The designed system applies the previously developed network security cyber-sensor method to individual selected communication streams allowing for learning accurate normal network behavior models. Furthermore, the developed system dynamically adjusts the sensitivity threshold of each anomaly detection algorithm based on domain knowledge about the specific network system. It is proposed to model this domain knowledge using Interval Type-2 Fuzzy Logic rules, which linguistically describe the relationship between various features of the network communication and the possibility of a cyber attack. The proposed method was tested on experimental smart grid system demonstrating enhanced cyber-security.

  8. Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment.

    PubMed

    Ashok, Aditya; Hahn, Adam; Govindarasu, Manimaran

    2014-07-01

    Smart grid initiatives will produce a grid that is increasingly dependent on its cyber infrastructure in order to support the numerous power applications necessary to provide improved grid monitoring and control capabilities. However, recent findings documented in government reports and other literature, indicate the growing threat of cyber-based attacks in numbers and sophistication targeting the nation's electric grid and other critical infrastructures. Specifically, this paper discusses cyber-physical security of Wide-Area Monitoring, Protection and Control (WAMPAC) from a coordinated cyber attack perspective and introduces a game-theoretic approach to address the issue. Finally, the paper briefly describes how cyber-physical testbeds can be used to evaluate the security research and perform realistic attack-defense studies for smart grid type environments. PMID:25685516

  9. Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment.

    PubMed

    Ashok, Aditya; Hahn, Adam; Govindarasu, Manimaran

    2014-07-01

    Smart grid initiatives will produce a grid that is increasingly dependent on its cyber infrastructure in order to support the numerous power applications necessary to provide improved grid monitoring and control capabilities. However, recent findings documented in government reports and other literature, indicate the growing threat of cyber-based attacks in numbers and sophistication targeting the nation's electric grid and other critical infrastructures. Specifically, this paper discusses cyber-physical security of Wide-Area Monitoring, Protection and Control (WAMPAC) from a coordinated cyber attack perspective and introduces a game-theoretic approach to address the issue. Finally, the paper briefly describes how cyber-physical testbeds can be used to evaluate the security research and perform realistic attack-defense studies for smart grid type environments.

  10. Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment

    PubMed Central

    Ashok, Aditya; Hahn, Adam; Govindarasu, Manimaran

    2013-01-01

    Smart grid initiatives will produce a grid that is increasingly dependent on its cyber infrastructure in order to support the numerous power applications necessary to provide improved grid monitoring and control capabilities. However, recent findings documented in government reports and other literature, indicate the growing threat of cyber-based attacks in numbers and sophistication targeting the nation’s electric grid and other critical infrastructures. Specifically, this paper discusses cyber-physical security of Wide-Area Monitoring, Protection and Control (WAMPAC) from a coordinated cyber attack perspective and introduces a game-theoretic approach to address the issue. Finally, the paper briefly describes how cyber-physical testbeds can be used to evaluate the security research and perform realistic attack-defense studies for smart grid type environments. PMID:25685516

  11. 76 FR 43696 - Nationwide Cyber Security Review (NCSR) Assessment

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-21

    ... Homeland Security, Office of Civil Rights and Civil Liberties. Comments must be identified by DHS-2011-0012... 111-298 and Senate Report 111-31, Department of Homeland Security Appropriations Bill, NPPD,...

  12. GridStat – Cyber Security and Regional Deployment Project Report

    SciTech Connect

    Clements, Samuel L.

    2009-02-18

    GridStat is a developing communication technology to provide real-time data delivery services to the electric power grid. It is being developed in a collaborative effort between the Electrical Power Engineering and Distributed Computing Science Departments at Washington State University. Improving the cyber security of GridStat was the principle focus of this project. A regional network was established to test GridStat’s cyber security mechanisms in a realistic environment. The network consists of nodes at Pacific Northwest National Laboratory, Idaho National Laboratory, and Washington State University. Idaho National Laboratory (INL) was tasked with performing the security assessment, the results of which detailed a number or easily resolvable and previously unknown issues, as well as a number of difficult and previously known issues. Going forward we recommend additional development prior to commercialization of GridStat. The development plan is structured into three domains: Core Development, Cyber Security and Pilot Projects. Each domain contains a number of phased subtasks that build upon each other to increase the robustness and maturity of GridStat.

  13. Defining and Computing a Valued Based Cyber-Security Measure

    SciTech Connect

    Aissa, Anis Ben; Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2012-01-01

    In earlier work, we presented a value based measure of cybersecurity that quantifies the security of a system in concrete terms, specifically, in terms of how much each system stakeholder stands to lose (in dollars per hour of operation) as a result of security threats and system vulnerabilities; our metric varies according to the stakes that each stakeholder has in meeting each security requirement. In this paper, we discuss the specification and design of a system that collects, updates, and maintains all the information that pertains to estimating our cybersecurity measure, and offers stakeholders quantitative means to make security-related decisions.

  14. Defining and Computing a Value Based Cyber-Security Measure

    SciTech Connect

    Aissa, Anis Ben; Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2011-01-01

    In past work, we presented a value based measure of cybersecurity that quantifies the security of a system in concrete terms, specifically, in terms of how much each system stakeholder stands to lose (in dollars per hour of operation) as a result of security threats and system vulnerabilities\\; our metric varies according to the stakes that each stakeholder has in meeting each security requirement. In this paper we discuss the specification and design of a system that collects, updates and maintains all the information that pertains to estimating our cybersecurity measure, and offers stakeholders quantitative means to make security-related decisions.

  15. Cyber crimes.

    PubMed

    Nuzback, Kara

    2014-07-01

    Since it began offering cyber liability coverage in December 2011, the Texas Medical Liability Trust has received more than 150 cyber liability claims, most of which involved breaches of electronic protected health information. TMLT's cyber liability insurance will protect practices financially should a breach occur. The insurance covers a breach notification to customers and business partners, expenses for legal counsel, information security and forensic data services, public relations support, call center and website support, credit monitoring, and identity theft restoration services. PMID:25023560

  16. Cyber crimes.

    PubMed

    Nuzback, Kara

    2014-07-01

    Since it began offering cyber liability coverage in December 2011, the Texas Medical Liability Trust has received more than 150 cyber liability claims, most of which involved breaches of electronic protected health information. TMLT's cyber liability insurance will protect practices financially should a breach occur. The insurance covers a breach notification to customers and business partners, expenses for legal counsel, information security and forensic data services, public relations support, call center and website support, credit monitoring, and identity theft restoration services.

  17. Applications for cyber security - System and application monitoring

    SciTech Connect

    Marron, J. E.

    2006-07-01

    Standard network security measures are adequate for defense against external attacks. However, many experts agree that the greater threat is from internal sources. Insiders with malicious intentions can change controller instructions, change alarm thresholds, and issue commands to equipment which can damage equipment and compromise control system integrity. In addition to strict physical security the state of the system must be continually monitored. System and application monitoring goes beyond the capabilities of network security appliances. It will include active processes, operating system services, files, network adapters and IP addresses. The generation of alarms is a crucial feature of system and application monitoring. The alarms should be integrated to avoid the burden on operators of checking multiple locations for security violations. Tools for system and application monitoring include commercial software, free software, and ad-hoc tools that can be easily created. System and application monitoring is part of a 'defense-in-depth' approach to a control network security plan. Layered security measures prevent an individual security measure failure from being exploited into a successful security breach. Alarming of individual failures is essential for rapid isolation and correction of single failures. System and application monitoring is the innermost layer of this defense strategy. (authors)

  18. Sandia Cyber Omni Tracker

    SciTech Connect

    Nick Peterson, Todd Bruner

    2014-07-02

    SCOT cyber security team enhancement tool that coordinates activities, captures knowledge, and serves as a platform to automate time-consuming tasks that a cyber security team needs to perform in its daily operations.

  19. Towards a Relation Extraction Framework for Cyber-Security Concepts

    SciTech Connect

    Jones, Corinne L; Bridges, Robert A; Huffer, Kelly M; Goodall, John R

    2015-01-01

    In order to assist security analysts in obtaining information pertaining to their network, such as novel vulnerabilities, exploits, or patches, information retrieval methods tailored to the security domain are needed. As labeled text data is scarce and expensive, we follow developments in semi-supervised NLP and implement a bootstrapping algorithm for extracting security entities and their relationships from text. The algorithm requires little input data, specifically, a few relations or patterns (heuristics for identifying relations), and incorporates an active learning component which queries the user on the most important decisions to prevent drifting the desired relations. Preliminary testing on a small corpus shows promising results, obtaining precision of .82.

  20. LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS

    SciTech Connect

    Ray Fink

    2006-10-01

    The results from ten cyber security vulnerability assessments of process control, SCADA and energy management systems, or components of those systems were reviewed to identify common problem areas. The common vulnerabilities ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and ease with which an attacker could exploit the vulnerability. Suggested mitigations are identified in each category. Recommended mitigations having the highest impact on reducing vulnerability are listed for asset owners and system vendors.

  1. Defining and Computing a Valued Based Cyber Security Measure

    SciTech Connect

    Aissa, Anis Ben; Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2011-01-01

    In earlier works (Ben-Aissa et al. 2010; Abercrombie et al. 2008; Sheldon et al. 2009), we presented a value based measure of cybersecurity that quantifies the security of a system in concrete terms, specifically, in terms of how much each system stakeholder stands to lose (in dollars per hour of operation) as a result of security threats and system vulnerabilities; our metric varies according to the stakes that each stakeholder has in meeting each security requirement. In this paper, we discuss the specification and design of a system that collects, updates, and maintains all the information that pertains to estimating our cybersecurity measure, and offers stakeholders quantitative means to make security-related decisions.

  2. Cyber Security Threats to Safety-Critical, Space-Based Infrastructures

    NASA Astrophysics Data System (ADS)

    Johnson, C. W.; Atencia Yepez, A.

    2012-01-01

    Space-based systems play an important role within national critical infrastructures. They are being integrated into advanced air-traffic management applications, rail signalling systems, energy distribution software etc. Unfortunately, the end users of communications, location sensing and timing applications often fail to understand that these infrastructures are vulnerable to a wide range of security threats. The following pages focus on concerns associated with potential cyber-attacks. These are important because future attacks may invalidate many of the safety assumptions that support the provision of critical space-based services. These safety assumptions are based on standard forms of hazard analysis that ignore cyber-security considerations This is a significant limitation when, for instance, security attacks can simultaneously exploit multiple vulnerabilities in a manner that would never occur without a deliberate enemy seeking to damage space based systems and ground infrastructures. We address this concern through the development of a combined safety and security risk assessment methodology. The aim is to identify attack scenarios that justify the allocation of additional design resources so that safety barriers can be strengthened to increase our resilience against security threats.

  3. Towards an integrated defense system for cyber security situation awareness experiment

    NASA Astrophysics Data System (ADS)

    Zhang, Hanlin; Wei, Sixiao; Ge, Linqiang; Shen, Dan; Yu, Wei; Blasch, Erik P.; Pham, Khanh D.; Chen, Genshe

    2015-05-01

    In this paper, an implemented defense system is demonstrated to carry out cyber security situation awareness. The developed system consists of distributed passive and active network sensors designed to effectively capture suspicious information associated with cyber threats, effective detection schemes to accurately distinguish attacks, and network actors to rapidly mitigate attacks. Based on the collected data from network sensors, image-based and signals-based detection schemes are implemented to detect attacks. To further mitigate attacks, deployed dynamic firewalls on hosts dynamically update detection information reported from the detection schemes and block attacks. The experimental results show the effectiveness of the proposed system. A future plan to design an effective defense system is also discussed based on system theory.

  4. IEC 61850 and IEC 62351 Cyber Security Acceleration Workshop

    SciTech Connect

    Clements, Samuel L.; Edgar, Thomas W.; Manz, David O.

    2012-04-01

    The purpose of this workshop was to identify and discuss concerns with the use and adoption of IEC 62351 security standard for IEC 61850 compliant control system products. The industry participants discussed performance, interoperability, adoption, challenges, business cases, and future issues.

  5. Three tenets for secure cyber-physical system design and assessment

    NASA Astrophysics Data System (ADS)

    Hughes, Jeff; Cybenko, George

    2014-06-01

    This paper presents a threat-driven quantitative mathematical framework for secure cyber-physical system design and assessment. Called The Three Tenets, this originally empirical approach has been used by the US Air Force Research Laboratory (AFRL) for secure system research and development. The Tenets were first documented in 2005 as a teachable methodology. The Tenets are motivated by a system threat model that itself consists of three elements which must exist for successful attacks to occur: - system susceptibility; - threat accessibility and; - threat capability. The Three Tenets arise naturally by countering each threat element individually. Specifically, the tenets are: Tenet 1: Focus on What's Critical - systems should include only essential functions (to reduce susceptibility); Tenet 2: Move Key Assets Out-of-Band - make mission essential elements and security controls difficult for attackers to reach logically and physically (to reduce accessibility); Tenet 3: Detect, React, Adapt - confound the attacker by implementing sensing system elements with dynamic response technologies (to counteract the attackers' capabilities). As a design methodology, the Tenets mitigate reverse engineering and subsequent attacks on complex systems. Quantified by a Bayesian analysis and further justified by analytic properties of attack graph models, the Tenets suggest concrete cyber security metrics for system assessment.

  6. Cyber Security: Big Data Think II Working Group Meeting

    NASA Technical Reports Server (NTRS)

    Hinke, Thomas; Shaw, Derek

    2015-01-01

    This presentation focuses on approaches that could be used by a data computation center to identify attacks and ensure malicious code and backdoors are identified if planted in system. The goal is to identify actionable security information from the mountain of data that flows into and out of an organization. The approaches are applicable to big data computational center and some must also use big data techniques to extract the actionable security information from the mountain of data that flows into and out of a data computational center. The briefing covers the detection of malicious delivery sites and techniques for reducing the mountain of data so that intrusion detection information can be useful, and not hidden in a plethora of false alerts. It also looks at the identification of possible unauthorized data exfiltration.

  7. Cyber security: a critical examination of information sharing versus data sensitivity issues for organisations at risk of cyber attack.

    PubMed

    Mallinder, Jason; Drabwell, Peter

    Cyber threats are growing and evolving at an unprecedented rate.Consequently, it is becoming vitally important that organisations share information internally and externally before, during and after incidents they encounter so that lessons can be learned, good practice identified and new cyber resilience capabilities developed. Many organisations are reluctant to share such information for fear of divulging sensitive information or because it may be vague or incomplete. This provides organisations with a complex dilemma: how to share information as openly as possibly about cyber incidents, while protecting their confidentiality and focusing on service recovery from such incidents. This paper explores the dilemma of information sharing versus sensitivity and provides a practical overview of considerations every business continuity plan should address to plan effectively for information sharing in the event of a cyber incident. PMID:24457322

  8. Cyber security: a critical examination of information sharing versus data sensitivity issues for organisations at risk of cyber attack.

    PubMed

    Mallinder, Jason; Drabwell, Peter

    Cyber threats are growing and evolving at an unprecedented rate.Consequently, it is becoming vitally important that organisations share information internally and externally before, during and after incidents they encounter so that lessons can be learned, good practice identified and new cyber resilience capabilities developed. Many organisations are reluctant to share such information for fear of divulging sensitive information or because it may be vague or incomplete. This provides organisations with a complex dilemma: how to share information as openly as possibly about cyber incidents, while protecting their confidentiality and focusing on service recovery from such incidents. This paper explores the dilemma of information sharing versus sensitivity and provides a practical overview of considerations every business continuity plan should address to plan effectively for information sharing in the event of a cyber incident.

  9. Shopping For Danger: E-commerce techniques applied to collaboration in cyber security

    SciTech Connect

    Bruce, Joseph R.; Fink, Glenn A.

    2012-05-24

    Collaboration among cyber security analysts is essential to a successful protection strategy on the Internet today, but it is uncommonly practiced or encouraged in operating environments. Barriers to productive collaboration often include data sensitivity, time and effort to communicate, institutional policy, and protection of domain knowledge. We propose an ambient collaboration framework, Vulcan, designed to remove the barriers of time and effort and mitigate the others. Vulcan automated data collection, collaborative filtering, and asynchronous dissemination, eliminating the effort implied by explicit collaboration among peers. We instrumented two analytic applications and performed a mock analysis session to build a dataset and test the output of the system.

  10. Improving Control System Cyber-State Awareness using Known Secure Sensor Measurements

    SciTech Connect

    Ondrej Linda; Milos Manic; Miles McQueen

    2012-09-01

    Abstract—This paper presents design and simulation of a low cost and low false alarm rate method for improved cyber-state awareness of critical control systems - the Known Secure Sensor Measurements (KSSM) method. The KSSM concept relies on physical measurements to detect malicious falsification of the control systems state. The KSSM method can be incrementally integrated with already installed control systems for enhanced resilience. This paper reviews the previously developed theoretical KSSM concept and then describes a simulation of the KSSM system. A simulated control system network is integrated with the KSSM components. The effectiveness of detection of various intrusion scenarios is demonstrated on several control system network topologies.

  11. Cyber Security for the Spaceport Command and Control System: Vulnerability Management and Compliance Analysis

    NASA Technical Reports Server (NTRS)

    Gunawan, Ryan A.

    2016-01-01

    With the rapid development of the Internet, the number of malicious threats to organizations is continually increasing. In June of 2015, the United States Office of Personnel Management (OPM) had a data breach resulting in the compromise of millions of government employee records. The National Aeronautics and Space Administration (NASA) is not exempt from these attacks. Cyber security is becoming a critical facet to the discussion of moving forward with projects. The Spaceport Command and Control System (SCCS) project at the Kennedy Space Center (KSC) aims to develop the launch control system for the next generation launch vehicle in the coming decades. There are many ways to increase the security of the network it uses, from vulnerability management to ensuring operating system images are compliant with securely configured baselines recommended by the United States Government.

  12. PACE: Pattern Accurate Computationally Efficient Bootstrapping for Timely Discovery of Cyber-Security Concepts

    SciTech Connect

    McNeil, Nikki C; Bridges, Robert A; Iannacone, Michael D; Czejdo, Bogdan; Perez, Nicolas E; Goodall, John R

    2013-01-01

    Public disclosure of important security information, such as knowledge of vulnerabilities or exploits, often occurs in blogs, tweets, mailing lists, and other online sources significantly before proper classification into structured databases. In order to facilitate timely discovery of such knowledge, we propose a novel semi-supervised learning algorithm, PACE, for identifying and classifying relevant entities in text sources. The main contribution of this paper is an enhancement of the traditional bootstrapping method for entity extraction by employing a time-memory trade-off that simultaneously circumvents a costly corpus search while strengthening pattern nomination, which should increase accuracy. An implementation in the cyber-security domain is discussed as well as challenges to Natural Language Processing imposed by the security domain.

  13. Data-Intensive Visual Analysis for Cyber Security

    SciTech Connect

    Pike, William A.; Best, Daniel M.; Love, Douglas V.; Bohn, Shawn J.

    2013-01-29

    Protecting communications networks against attacks where the aim is to steal information, disrupt order, or harm critical infrastructure can require the collection and analysis of staggering amounts of data. The ability to detect and respond to threats quickly is a paramount concern across sectors, and especially for critical government, utility and financial networks. Yet detecting emerging or incipient threats in immense volumes of network traffic requires new computational and analytic approaches. Network security increasingly requires cooperation between human analysts able to spot suspicious events through means such as data visualization and automated systems that process streaming network data in near real-time to triage events so that human analysts are best able to focus their work.

  14. On detection and visualization techniques for cyber security situation awareness

    NASA Astrophysics Data System (ADS)

    Yu, Wei; Wei, Shixiao; Shen, Dan; Blowers, Misty; Blasch, Erik P.; Pham, Khanh D.; Chen, Genshe; Zhang, Hanlin; Lu, Chao

    2013-05-01

    Networking technologies are exponentially increasing to meet worldwide communication requirements. The rapid growth of network technologies and perversity of communications pose serious security issues. In this paper, we aim to developing an integrated network defense system with situation awareness capabilities to present the useful information for human analysts. In particular, we implement a prototypical system that includes both the distributed passive and active network sensors and traffic visualization features, such as 1D, 2D and 3D based network traffic displays. To effectively detect attacks, we also implement algorithms to transform real-world data of IP addresses into images and study the pattern of attacks and use both the discrete wavelet transform (DWT) based scheme and the statistical based scheme to detect attacks. Through an extensive simulation study, our data validate the effectiveness of our implemented defense system.

  15. Scenario-based approach to risk analysis in support of cyber security

    SciTech Connect

    Gertman, D. I.; Folkers, R.; Roberts, J.

    2006-07-01

    The US infrastructure is continually challenged by hostile nation states and others who would do us harm. Cyber vulnerabilities and weaknesses are potential targets and are the result of years of construction and technological improvement in a world less concerned with security than is currently the case. As a result, cyber attack presents a class of challenges for which we are just beginning to prepare. What has been done in the nuclear, chemical and energy sectors as a means of anticipating and preparing for randomly occurring accidents and off-normal events is to develop scenarios as a means by which to prioritize and quantify risk and to take action. However, the number of scenarios risk analysts can develop is almost limitless. How do we ascertain which scenario has the greatest merit? One of the more important contributions of probabilistic risk analysis (PRA) has been to quantify the initiating event probability associated with various classes of accidents; and to quantify the occurrence of various conditions, i.e., end-states, as a function of these important accident sequences. Typically, various classes of conditions are represented by scenarios and are quantified in terms of cut sets and binned into end states. For example, the nuclear industry has a well-defined set of initiating events that are studied in assessing risk. The maturation of risk analysis for cyber security from accounting for barriers or looking at conditions statically to one of ascertaining the probability associated with certain events is, in part, dependent upon the adoption of a scenario-based approach. For example, scenarios take into account threats to personnel and public safety; economic damage, and compromises to major operational and safety functions. Scenarios reflect system, equipment, and component configurations as well as key human-system interactions related to event detection, diagnosis, mitigation and restoration of systems. As part of a cyber attack directed toward

  16. Comprehensive, Multi-Source Cyber-Security Data Set

    DOE Data Explorer

    Kent, Alexander D. [Los Alamos National Laboratory

    2015-05-21

    This data set represents 58 consecutive days of de-identified event data collected from five sources within Los Alamos National Laboratory’s corporate, internal computer network. The data sources include Windows-based authentication events from both individual computers and centralized Active Directory domain controller servers; process start and stop events from individual Windows computers; Domain Name Service (DNS) lookups as collected on internal DNS servers; network flow data as collected on at several key router locations; and a set of well-defined red teaming events that present bad behavior within the 58 days. In total, the data set is approximately 12 gigabytes compressed across the five data elements and presents 1,648,275,307 events in total for 12,425 users, 17,684 computers, and 62,974 processes. Specific users that are well known system related (SYSTEM, Local Service) were not de-identified though any well-known administrators account were still de-identified. In the network flow data, well-known ports (e.g. 80, 443, etc) were not de-identified. All other users, computers, process, ports, times, and other details were de-identified as a unified set across all the data elements (e.g. U1 is the same U1 in all of the data). The specific timeframe used is not disclosed for security purposes. In addition, no data that allows association outside of LANL’s network is included. All data starts with a time epoch of 1 using a time resolution of 1 second. In the authentication data, failed authentication events are only included for users that had a successful authentication event somewhere within the data set.

  17. Mixed-Initiative Cyber Security: Putting humans in the right loop

    SciTech Connect

    Haack, Jereme N.; Fink, Glenn A.; Maiden, Wendy M.; McKinnon, Archibald D.; Fulp, Errin W.

    2009-05-11

    In recent years, organizations and their computer infrastructures have grown intertwined in complex relationships through mergers, acquisitions, reorganizations, and cooperative service delivery. Defensive actions and policy changes by one organization may have far-reaching negative consequences on its partner organizations. Human-only or machine-only approaches are insufficient. The former are slow but highly adaptable, while the latter are fast but highly specialized. In either case, humans retain the ultimate responsibility for the actions of their automated systems. Deploying automated defenses does not absolve humans of their inherent responsibility. We believe the solution lies in mixed-initiative defense unifying the complementary qualities of both human- and machine-based approaches. We describe the Cooperative Infrastructure Defense (CID), a new cyber-defense paradigm employing complex-adaptive swarm intelligence, logical rational agents, and human insight to enable collaborative cyber defense among cooperating organizations in an infrastructure setting. CID takes a mixed-initiative approach to infrastructure defense where teams of humans and software agents defend cooperating organizations in tandem, sharing insights and solutions without violating proprietary boundaries. CID will help create security policy via dialogue between humans and agents, foster a collaborative problem-solving environment, and increase human situational awareness and influence through visualization and shared control. CID will provide a foundation for building trust between humans and agents within and between organizations.

  18. Secure estimation, control and optimization of uncertain cyber-physical systems with applications to power networks

    NASA Astrophysics Data System (ADS)

    Taha, Ahmad Fayez

    Transportation networks, wearable devices, energy systems, and the book you are reading now are all ubiquitous cyber-physical systems (CPS). These inherently uncertain systems combine physical phenomena with communication, data processing, control and optimization. Many CPSs are controlled and monitored by real-time control systems that use communication networks to transmit and receive data from systems modeled by physical processes. Existing studies have addressed a breadth of challenges related to the design of CPSs. However, there is a lack of studies on uncertain CPSs subject to dynamic unknown inputs and cyber-attacks---an artifact of the insertion of communication networks and the growing complexity of CPSs. The objective of this dissertation is to create secure, computational foundations for uncertain CPSs by establishing a framework to control, estimate and optimize the operation of these systems. With major emphasis on power networks, the dissertation deals with the design of secure computational methods for uncertain CPSs, focusing on three crucial issues---(1) cyber-security and risk-mitigation, (2) network-induced time-delays and perturbations and (3) the encompassed extreme time-scales. The dissertation consists of four parts. In the first part, we investigate dynamic state estimation (DSE) methods and rigorously examine the strengths and weaknesses of the proposed routines under dynamic attack-vectors and unknown inputs. In the second part, and utilizing high-frequency measurements in smart grids and the developed DSE methods in the first part, we present a risk mitigation strategy that minimizes the encountered threat levels, while ensuring the continual observability of the system through available, safe measurements. The developed methods in the first two parts rely on the assumption that the uncertain CPS is not experiencing time-delays, an assumption that might fail under certain conditions. To overcome this challenge, networked unknown input

  19. NERSC Cyber Security Challenges That Require DOE Development andSupport

    SciTech Connect

    Draney, Brent; Campbell, Scott; Walter, Howard

    2007-01-16

    Traditional security approaches do not adequately addressall the requirements of open, scientific computing facilities. Many ofthe methods used for more restricted environments, including almost allcorporate/commercial systems, do not meet the needs of today's science.Use of only the available "state of the practice" commercial methods willhave adverse impact on the ability of DOE to accomplish its sciencegoals, and impacts the productivity of the DOE Science community. Inparticular, NERSC and other high performance computing (HPC) centers havespecial security challenges that are unlikely to be met unless DOE fundsdevelopment and support of reliable and effective tools designed to meetthe cyber security needs of High Performance Science. The securitychallenges facing NERSC can be collected into three basic problem sets:network performance and dynamics, application complexity and diversity,and a complex user community that can have transient affiliations withactual institutions. To address these problems, NERSC proposes thefollowing four general solutions: auditing user and system activityacross sites; firewall port configuration in real time;cross-site/virtual organization identity management and access control;and detecting security issues in application middleware. Solutions arealsoproposed for three general long term issues: data volume,application complexity, and information integration.

  20. Quantifying and measuring cyber resiliency

    NASA Astrophysics Data System (ADS)

    Cybenko, George

    2016-05-01

    Cyber resliency has become an increasingly attractive research and operational concept in cyber security. While several metrics have been proposed for quantifying cyber resiliency, a considerable gap remains between those metrics and operationally measurable and meaningful concepts that can be empirically determined in a scientific manner. This paper describes a concrete notion of cyber resiliency that can be tailored to meet specific needs of organizations that seek to introduce resiliency into their assessment of their cyber security posture.

  1. A macro-economic framework for evaluation of cyber security risks related to protection of intellectual property.

    PubMed

    Andrijcic, Eva; Horowitz, Barry

    2006-08-01

    The article is based on the premise that, from a macro-economic viewpoint, cyber attacks with long-lasting effects are the most economically significant, and as a result require more attention than attacks with short-lasting effects that have historically been more represented in literature. In particular, the article deals with evaluation of cyber security risks related to one type of attack with long-lasting effects, namely, theft of intellectual property (IP) by foreign perpetrators. An International Consequence Analysis Framework is presented to determine (1) the potential macro-economic consequences of cyber attacks that result in stolen IP from companies in the United States, and (2) the likely sources of such attacks. The framework presented focuses on IP theft that enables foreign companies to make economic gains that would have otherwise benefited the U.S. economy. Initial results are presented.

  2. A macro-economic framework for evaluation of cyber security risks related to protection of intellectual property.

    PubMed

    Andrijcic, Eva; Horowitz, Barry

    2006-08-01

    The article is based on the premise that, from a macro-economic viewpoint, cyber attacks with long-lasting effects are the most economically significant, and as a result require more attention than attacks with short-lasting effects that have historically been more represented in literature. In particular, the article deals with evaluation of cyber security risks related to one type of attack with long-lasting effects, namely, theft of intellectual property (IP) by foreign perpetrators. An International Consequence Analysis Framework is presented to determine (1) the potential macro-economic consequences of cyber attacks that result in stolen IP from companies in the United States, and (2) the likely sources of such attacks. The framework presented focuses on IP theft that enables foreign companies to make economic gains that would have otherwise benefited the U.S. economy. Initial results are presented. PMID:16948685

  3. Quantifying Availability in SCADA Environments Using the Cyber Security Metric MFC

    SciTech Connect

    Aissa, Anis Ben; Rabai, Latifa Ben Arfa; Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2014-01-01

    Supervisory Control and Data Acquisition (SCADA) systems are distributed networks dispersed over large geographic areas that aim to monitor and control industrial processes from remote areas and/or a centralized location. They are used in the management of critical infrastructures such as electric power generation, transmission and distribution, water and sewage, manufacturing/industrial manufacturing as well as oil and gas production. The availability of SCADA systems is tantamount to assuring safety, security and profitability. SCADA systems are the backbone of the national cyber-physical critical infrastructure. Herein, we explore the definition and quantification of an econometric measure of availability, as it applies to SCADA systems; our metric is a specialization of the generic measure of mean failure cost.

  4. Introducing cyber.

    PubMed

    Hult, Fredrik; Sivanesan, Giri

    In January 2012, the World Economic Forum made cyber attacks its fourth top global risk. In the 2013 risk report, cyber attacks were noted to be an even higher risk in absolute terms. The reliance of critical infrastructure on cyber working has never been higher; the frequency, intensity, impact and sophistication of attacks is growing. This trend looks likely to continue. It can be argued that it is no longer a question whether an organisation will be successfully hacked, but how long it will take to detect. In the ever-changing cyber environment, traditional protection techniques and reliance on preventive controls are not enough. A more agile approach is required to give assurance of a sufficiently secure digital society. Are we faced with a paradigm shift or a storm in a digital teacup? This paper offers an introduction to why cyber is important, a wider taxonomy on the topic and some historical context on how the discipline of cyber security has evolved, and an interpretation on what this means in the new normal of today. PMID:24457321

  5. Introducing cyber.

    PubMed

    Hult, Fredrik; Sivanesan, Giri

    In January 2012, the World Economic Forum made cyber attacks its fourth top global risk. In the 2013 risk report, cyber attacks were noted to be an even higher risk in absolute terms. The reliance of critical infrastructure on cyber working has never been higher; the frequency, intensity, impact and sophistication of attacks is growing. This trend looks likely to continue. It can be argued that it is no longer a question whether an organisation will be successfully hacked, but how long it will take to detect. In the ever-changing cyber environment, traditional protection techniques and reliance on preventive controls are not enough. A more agile approach is required to give assurance of a sufficiently secure digital society. Are we faced with a paradigm shift or a storm in a digital teacup? This paper offers an introduction to why cyber is important, a wider taxonomy on the topic and some historical context on how the discipline of cyber security has evolved, and an interpretation on what this means in the new normal of today.

  6. Cyber-Physical System Security With Deceptive Virtual Hosts for Industrial Control Networks

    SciTech Connect

    Vollmer, Todd; Manic, Milos

    2014-05-01

    A challenge facing industrial control network administrators is protecting the typically large number of connected assets for which they are responsible. These cyber devices may be tightly coupled with the physical processes they control and human induced failures risk dire real-world consequences. Dynamic virtual honeypots are effective tools for observing and attracting network intruder activity. This paper presents a design and implementation for self-configuring honeypots that passively examine control system network traffic and actively adapt to the observed environment. In contrast to prior work in the field, six tools were analyzed for suitability of network entity information gathering. Ettercap, an established network security tool not commonly used in this capacity, outperformed the other tools and was chosen for implementation. Utilizing Ettercap XML output, a novel four-step algorithm was developed for autonomous creation and update of a Honeyd configuration. This algorithm was tested on an existing small campus grid and sensor network by execution of a collaborative usage scenario. Automatically created virtual hosts were deployed in concert with an anomaly behavior (AB) system in an attack scenario. Virtual hosts were automatically configured with unique emulated network stack behaviors for 92% of the targeted devices. The AB system alerted on 100% of the monitored emulated devices.

  7. Cyber-Physical System Security With Deceptive Virtual Hosts for Industrial Control Networks

    DOE PAGESBeta

    Vollmer, Todd; Manic, Milos

    2014-05-01

    A challenge facing industrial control network administrators is protecting the typically large number of connected assets for which they are responsible. These cyber devices may be tightly coupled with the physical processes they control and human induced failures risk dire real-world consequences. Dynamic virtual honeypots are effective tools for observing and attracting network intruder activity. This paper presents a design and implementation for self-configuring honeypots that passively examine control system network traffic and actively adapt to the observed environment. In contrast to prior work in the field, six tools were analyzed for suitability of network entity information gathering. Ettercap, anmore » established network security tool not commonly used in this capacity, outperformed the other tools and was chosen for implementation. Utilizing Ettercap XML output, a novel four-step algorithm was developed for autonomous creation and update of a Honeyd configuration. This algorithm was tested on an existing small campus grid and sensor network by execution of a collaborative usage scenario. Automatically created virtual hosts were deployed in concert with an anomaly behavior (AB) system in an attack scenario. Virtual hosts were automatically configured with unique emulated network stack behaviors for 92% of the targeted devices. The AB system alerted on 100% of the monitored emulated devices.« less

  8. Enhancing the cyber-security of smart grids with applications to synchrophasor data

    NASA Astrophysics Data System (ADS)

    Pal, Seemita

    In the power grids, Supervisory Control and Data Acquisition (SCADA) systems are used as part of the Energy Management System (EMS) for enabling grid monitoring, control and protection. In recent times, with the ongoing installation of thousands of Phasor Measurement Units (PMUs), system operators are becoming increasingly reliant on PMU-generated synchrophasor measurements for executing wide-area monitoring and real-time control. The availability of PMU data facilitates dynamic state estimation of the system, thus improving the efficiency and resiliency of the grid. Since the SCADA and PMU data are used to make critical control decisions including actuation of physical systems, the timely availability and integrity of this networked data is of paramount importance. Absence or wrong control actions can potentially lead to disruption of operations, monetary loss, damage to equipments or surroundings or even blackout. This has posed new challenges to information security especially in this age of ever-increasing cyber-attacks. In this thesis, potential cyber-attacks on smart grids are presented and effective and implementable schemes are proposed for detecting them. The focus is mainly on three kinds of cyber-attacks and their detection: (i) gray-hole attacks on synchrophasor systems, (ii) PMU data manipulation attacks and (iii) data integrity attacks on SCADA systems. In the case of gray-hole attacks, also known as packet-drop attacks, the adversary may arbitrarily drop PMU data packets as they traverse the network, resulting in unavailability of time-sensitive data for the various critical power system applications. The fundamental challenge is to distinguish packets dropped by the adversary from those that occur naturally due to network congestion.The proposed gray-hole attack detection technique is based on exploiting the inherent timing information in the GPS time-stamped PMU data packets and using the temporal trends of the latencies to classify the cause of

  9. Infotech. Cyber security. Health care learns to share scares and solutions.

    PubMed

    Colias, Mike

    2004-05-01

    Health care information technology leaders and others are coming together to share scary experiences and develop best practices to guard against crippling computer viruses, scheming hackers and other cyber threats. PMID:15192882

  10. Infotech. Cyber security. Health care learns to share scares and solutions.

    PubMed

    Colias, Mike

    2004-05-01

    Health care information technology leaders and others are coming together to share scary experiences and develop best practices to guard against crippling computer viruses, scheming hackers and other cyber threats.

  11. Control Systems Security Center Comparison Study of Industrial Control System Standards against the Control Systems Protection Framework Cyber-Security Requirements

    SciTech Connect

    Robert P. Evans

    2005-09-01

    Cyber security standards, guidelines, and best practices for control systems are critical requirements that have been delineated and formally recognized by industry and government entities. Cyber security standards provide a common language within the industrial control system community, both national and international, to facilitate understanding of security awareness issues but, ultimately, they are intended to strengthen cyber security for control systems. This study and the preliminary findings outlined in this report are an initial attempt by the Control Systems Security Center (CSSC) Standard Awareness Team to better understand how existing and emerging industry standards, guidelines, and best practices address cyber security for industrial control systems. The Standard Awareness Team comprised subject matter experts in control systems and cyber security technologies and standards from several Department of Energy (DOE) National Laboratories, including Argonne National Laboratory, Idaho National Laboratory, Pacific Northwest National Laboratory, and Sandia National Laboratories. This study was conducted in two parts: a standard identification effort and a comparison analysis effort. During the standard identification effort, the Standard Awareness Team conducted a comprehensive open-source survey of existing control systems security standards, regulations, and guidelines in several of the critical infrastructure (CI) sectors, including the telecommunication, water, chemical, energy (electric power, petroleum and oil, natural gas), and transportation--rail sectors and sub-sectors. During the comparison analysis effort, the team compared the requirements contained in selected, identified, industry standards with the cyber security requirements in ''Cyber Security Protection Framework'', Version 0.9 (hereafter referred to as the ''Framework''). For each of the seven sector/sub-sectors listed above, one standard was selected from the list of standards identified

  12. 78 FR 38949 - Computer Security Incident Coordination (CSIC): Providing Timely Cyber Incident Response

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-28

    ... National Institute of Standards and Technology Computer Security Incident Coordination (CSIC): Providing... Technology (NIST) is seeking information relating to Computer Security Incident Coordination (CSIC). NIST is... Computer Security Incident Response Teams (CSIRTs) to coordinate effectively when responding to...

  13. 78 FR 6807 - Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi Arabia and Kuwait...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-31

    ... business size. The dual pricing reflects the Commercial Service's user fee schedule that became effective... designed for ] representatives from U.S. safety and security businesses and trade associations that have... in the safety and security industries, including Information Communications Technology...

  14. Management self assessment plan

    SciTech Connect

    Debban, B.L.

    1998-01-30

    Duke Engineering and Services Hanford Inc., Spent Nuclear Fuel Project is responsible for the operation of fuel storage facilities. The SNF project mission includes the safe removal, processing and transportation of Spent Nuclear Fuel from 100 K Area fuel storage basins to a new Storage facility in the Hanford 200 East Area. Its mission is the modification of the 100 K area fuel storage facilities and the construction of two new facilities: the 100 K Area Cold Vacuum Drying Facility, and the 200 East Area Canister Storage Building. The management self assessment plan described in this document is scheduled to begin in April of 1999 and be complete in May of 1999. The management self assessment plan describes line management preparations for declaring that line management is ready to commence operations.

  15. Self-assessment toolkit.

    PubMed

    2016-09-01

    A new health and integration toolkit has been launched by NHS Clinical Commissioners, in partnership with the Local Government Association, NHS Confederation and the Association of Directors of Adult Services. The self-assessment tool is designed to help local health and care leaders, through health and well-being boards, to assess their ambition, capability, capacity and readiness to integrate local health and social care services. PMID:27581897

  16. Index of cyber integrity

    NASA Astrophysics Data System (ADS)

    Anderson, Gustave

    2014-05-01

    Unfortunately, there is no metric, nor set of metrics, that are both general enough to encompass all possible types of applications yet specific enough to capture the application and attack specific details. As a result we are left with ad-hoc methods for generating evaluations of the security of our systems. Current state of the art methods for evaluating the security of systems include penetration testing and cyber evaluation tests. For these evaluations, security professionals simulate an attack from malicious outsiders and malicious insiders. These evaluations are very productive and are able to discover potential vulnerabilities resulting from improper system configuration, hardware and software flaws, or operational weaknesses. We therefore propose the index of cyber integrity (ICI), which is modeled after the index of biological integrity (IBI) to provide a holistic measure of the health of a system under test in a cyber-environment. The ICI provides a broad base measure through a collection of application and system specific metrics. In this paper, following the example of the IBI, we demonstrate how a multi-metric index may be used as a holistic measure of the health of a system under test in a cyber-environment.

  17. Gestalt Effect of Self Assessment

    ERIC Educational Resources Information Center

    McDonald, Betty

    2012-01-01

    Defining self assessment as the involvement of students in identifying standards and/or criteria to apply to their work and making judgements about the extent to which they have met these criteria and standards, this paper seeks to highlight the gestalt effect of self assessment. The total effect of self assessment on the learner is greater than…

  18. 78 FR 62430 - Department of Defense (DoD)-Defense Industrial Base (DIB) Voluntary Cyber Security and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-22

    ... of the Secretary 32 CFR Part 236 RIN 0790-AI60 Department of Defense (DoD)--Defense Industrial Base... interim final rule on May 11, 2012 (77 FR 27615). Fifty comments from twelve respondents were received and... Industrial Base from cyber events. No additional oversight is warranted at this time. No change is made...

  19. The cyber threat, trophy information and the fortress mentality.

    PubMed

    Scully, Tim

    2011-10-01

    'It won't happen to me' is a prevalent mindset among senior executives in the private and public sectors when considering targeted cyber intrusions. This is exacerbated by the long-term adoption of a 'fortress mentality' towards cyber security, and by the attitude of many of our cyber-security professionals, who speak a different language when it comes to communicating cyber-security events to senior executives. The prevailing approaches to cyber security have clearly failed. Almost every week another serious, targeted cyber intrusion is reported, but reported intrusions are only the tip of the iceberg. Why have we got it so wrong? It must be acknowledged that cyber security is no longer the domain of cyber-security experts alone. Many more of us at various levels of leadership must understand, and be more deeply engaged in, the cyber-security challenge if we are to deal with the threat holistically and effectively. Governments cannot combat the cyber threat alone, particularly the so-called advanced persistent threat; they must work closely with industry as trusted partners. Industry will be the 'boots on the ground' in cyber security, but there are challenges to building this relationship, which must be based on sound principles. PMID:22130338

  20. The cyber threat, trophy information and the fortress mentality.

    PubMed

    Scully, Tim

    2011-10-01

    'It won't happen to me' is a prevalent mindset among senior executives in the private and public sectors when considering targeted cyber intrusions. This is exacerbated by the long-term adoption of a 'fortress mentality' towards cyber security, and by the attitude of many of our cyber-security professionals, who speak a different language when it comes to communicating cyber-security events to senior executives. The prevailing approaches to cyber security have clearly failed. Almost every week another serious, targeted cyber intrusion is reported, but reported intrusions are only the tip of the iceberg. Why have we got it so wrong? It must be acknowledged that cyber security is no longer the domain of cyber-security experts alone. Many more of us at various levels of leadership must understand, and be more deeply engaged in, the cyber-security challenge if we are to deal with the threat holistically and effectively. Governments cannot combat the cyber threat alone, particularly the so-called advanced persistent threat; they must work closely with industry as trusted partners. Industry will be the 'boots on the ground' in cyber security, but there are challenges to building this relationship, which must be based on sound principles.

  1. Cyber security risk management: public policy implications of correlated risk, imperfect ability to prove loss, and observability of self-protection.

    PubMed

    Oğüt, Hulisi; Raghunathan, Srinivasan; Menon, Nirup

    2011-03-01

    The correlated nature of security breach risks, the imperfect ability to prove loss from a breach to an insurer, and the inability of insurers and external agents to observe firms' self-protection efforts have posed significant challenges to cyber security risk management. Our analysis finds that a firm invests less than the social optimal levels in self-protection and in insurance when risks are correlated and the ability to prove loss is imperfect. We find that the appropriate social intervention policy to induce a firm to invest at socially optimal levels depends on whether insurers can verify a firm's self-protection levels. If self-protection of a firm is observable to an insurer so that it can design a contract that is contingent on the self-protection level, then self-protection and insurance behave as complements. In this case, a social planner can induce a firm to choose the socially optimal self-protection and insurance levels by offering a subsidy on self-protection. We also find that providing a subsidy on insurance does not provide a similar inducement to a firm. If self-protection of a firm is not observable to an insurer, then self-protection and insurance behave as substitutes. In this case, a social planner should tax the insurance premium to achieve socially optimal results. The results of our analysis hold regardless of whether the insurance market is perfectly competitive or not, implying that solely reforming the currently imperfect insurance market is insufficient to achieve the efficient outcome in cyber security risk management. PMID:20807381

  2. Cyber security risk management: public policy implications of correlated risk, imperfect ability to prove loss, and observability of self-protection.

    PubMed

    Oğüt, Hulisi; Raghunathan, Srinivasan; Menon, Nirup

    2011-03-01

    The correlated nature of security breach risks, the imperfect ability to prove loss from a breach to an insurer, and the inability of insurers and external agents to observe firms' self-protection efforts have posed significant challenges to cyber security risk management. Our analysis finds that a firm invests less than the social optimal levels in self-protection and in insurance when risks are correlated and the ability to prove loss is imperfect. We find that the appropriate social intervention policy to induce a firm to invest at socially optimal levels depends on whether insurers can verify a firm's self-protection levels. If self-protection of a firm is observable to an insurer so that it can design a contract that is contingent on the self-protection level, then self-protection and insurance behave as complements. In this case, a social planner can induce a firm to choose the socially optimal self-protection and insurance levels by offering a subsidy on self-protection. We also find that providing a subsidy on insurance does not provide a similar inducement to a firm. If self-protection of a firm is not observable to an insurer, then self-protection and insurance behave as substitutes. In this case, a social planner should tax the insurance premium to achieve socially optimal results. The results of our analysis hold regardless of whether the insurance market is perfectly competitive or not, implying that solely reforming the currently imperfect insurance market is insufficient to achieve the efficient outcome in cyber security risk management.

  3. Cyber Forensics Ontology for Cyber Criminal Investigation

    NASA Astrophysics Data System (ADS)

    Park, Heum; Cho, Sunho; Kwon, Hyuk-Chul

    We developed Cyber Forensics Ontology for the criminal investigation in cyber space. Cyber crime is classified into cyber terror and general cyber crime, and those two classes are connected with each other. The investigation of cyber terror requires high technology, system environment and experts, and general cyber crime is connected with general crime by evidence from digital data and cyber space. Accordingly, it is difficult to determine relational crime types and collect evidence. Therefore, we considered the classifications of cyber crime, the collection of evidence in cyber space and the application of laws to cyber crime. In order to efficiently investigate cyber crime, it is necessary to integrate those concepts for each cyber crime-case. Thus, we constructed a cyber forensics domain ontology for criminal investigation in cyber space, according to the categories of cyber crime, laws, evidence and information of criminals. This ontology can be used in the process of investigating of cyber crime-cases, and for data mining of cyber crime; classification, clustering, association and detection of crime types, crime cases, evidences and criminals.

  4. Cyber Friendly Fire

    SciTech Connect

    Greitzer, Frank L.; Carroll, Thomas E.; Roberts, Adam D.

    2011-09-01

    Cyber friendly fire (FF) is a new concept that has been brought to the attention of Department of Defense (DoD) stakeholders through two workshops that were planned and conducted by the Air Force Research Laboratory (AFRL) and research conducted for AFRL by the Pacific Northwest National Laboratory. With this previous work in mind, we offer a definition of cyber FF as intentional offensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintentionally harms the mission effectiveness of friendly or neutral forces. Just as with combat friendly fire, a fundamental need in avoiding cyber FF is to maintain situation awareness (SA). We suggest that cyber SA concerns knowledge of a system's topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system (and that populate the nodes), the nature of the activities or work performed, and the available defensive (and offensive) countermeasures that may be applied to thwart network attacks. A training implication is to raise awareness and understanding of these critical knowledge units; an approach to decision aids and/or visualizations is to focus on supporting these critical knowledge units. To study cyber FF, we developed an unclassified security test range comprising a combination of virtual and physical devices that present a closed network for testing, simulation, and evaluation. This network offers services found on a production network without the associated costs of a real production network. Containing enough detail to appear realistic, this virtual and physical environment can be customized to represent different configurations. For our purposes, the test range was configured to appear as an Internet-connected Managed Service Provider (MSP) offering specialized web applications to the general public. The

  5. 7 Key Challenges for Visualization in Cyber Network Defense

    SciTech Connect

    Best, Daniel M.; Endert, Alexander; Kidwell, Dan

    2014-12-02

    In this paper we present seven challenges, informed by two user studies, to be considered when developing a visualization for cyber security purposes. Cyber security visualizations must go beyond isolated solutions and “pretty picture” visualizations in order to make impact to users. We provide an example prototype that addresses the challenges with a description of how they are met. Our aim is to assist in increasing utility and adoption rates for visualization capabilities in cyber security.

  6. The self-assessment process.

    PubMed

    Haywood, B G

    1993-05-01

    The entire job or career search can best be illustrated as a ladder. With the bottom rung as the beginning of the job or career search process, the next rung in the self-assessment process is the preparation of an effective resume, and ultimately the top rung of the ladder, or the final objective, is securing the appropriate position. The goal in each step of the process is to understand yourself and to present yourself as positively as possible, to overcome any negative aspects that would inhibit a competitive job offer, and to be ultimately successful in the interview process. All of this must be achieved using the most effective, efficient method in the shortest possible time while still facing serious and aggressive competition. The long road ahead can be made easier and can make you stand out from the crowd if the sometimes difficult and time-consuming groundwork provides your ladder with the foundation necessary to reach that top rung as a winner. PMID:10125280

  7. Deception used for Cyber Defense of Control Systems

    SciTech Connect

    Wayne F. Boyer; Miles A. McQueen

    2009-05-01

    Control system cyber security defense mechanisms may employ deception to make it more difficult for attackers to plan and execute successful attacks. These deceptive defense mechanisms are organized and initially explored according to a specific deception taxonomy and the seven abstract dimensions of security previously proposed as a framework for the cyber security of control systems.

  8. Cyber Threats to Nuclear Infrastructures

    SciTech Connect

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  9. Cyber Incidents Involving Control Systems

    SciTech Connect

    Robert J. Turk

    2005-10-01

    The Analysis Function of the US-CERT Control Systems Security Center (CSSC) at the Idaho National Laboratory (INL) has prepared this report to document cyber security incidents for use by the CSSC. The description and analysis of incidents reported herein support three CSSC tasks: establishing a business case; increasing security awareness and private and corporate participation related to enhanced cyber security of control systems; and providing informational material to support model development and prioritize activities for CSSC. The stated mission of CSSC is to reduce vulnerability of critical infrastructure to cyber attack on control systems. As stated in the Incident Management Tool Requirements (August 2005) ''Vulnerability reduction is promoted by risk analysis that tracks actual risk, emphasizes high risk, determines risk reduction as a function of countermeasures, tracks increase of risk due to external influence, and measures success of the vulnerability reduction program''. Process control and Supervisory Control and Data Acquisition (SCADA) systems, with their reliance on proprietary networks and hardware, have long been considered immune to the network attacks that have wreaked so much havoc on corporate information systems. New research indicates this confidence is misplaced--the move to open standards such as Ethernet, Transmission Control Protocol/Internet Protocol, and Web technologies is allowing hackers to take advantage of the control industry's unawareness. Much of the available information about cyber incidents represents a characterization as opposed to an analysis of events. The lack of good analyses reflects an overall weakness in reporting requirements as well as the fact that to date there have been very few serious cyber attacks on control systems. Most companies prefer not to share cyber attack incident data because of potential financial repercussions. Uniform reporting requirements will do much to make this information available to

  10. Cyber threats within civil aviation

    NASA Astrophysics Data System (ADS)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  11. Self Assessment and Discovery Learning

    ERIC Educational Resources Information Center

    McDonald, Betty

    2011-01-01

    Discovery learning in higher education has been reported to be effective in assisting learners to understand difficult concepts and retain long term information. This paper seeks to illustrate how one self assessment model may be used to demonstrate discovery learning in a collaborative atmosphere of students sharing and getting to know each…

  12. Protecting water and wastewater infrastructure from cyber attacks

    NASA Astrophysics Data System (ADS)

    Panguluri, Srinivas; Phillips, William; Cusimano, John

    2011-12-01

    Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion: cyber attacks are real and can cause significant damages. This paper presents some recent statistics on cyber attacks and resulting damages. Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks. Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are: 1) the increasing interconnection of their business and control system networks, 2) large variation of proprietary industrial control equipment utilized, 3) multitude of cross-sector cyber-security standards, and 4) the differences in the equipment vendor's approaches to meet these security standards. The utilities can meet these challenges by voluntarily selecting and adopting security standards, conducting a gap analysis, performing vulnerability/risk analysis, and undertaking countermeasures that best meets their security and organizational requirements. Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years. Implementing cyber security does not necessarily have to be expensive, substantial improvements can be accomplished through policy, procedure, training and awareness. Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.

  13. Toward improved software security training using a cyber warfare opposing force (CW OPFOR): the knowledge base design

    NASA Astrophysics Data System (ADS)

    Stytz, Martin R.; Banks, Sheila B.

    2005-03-01

    "Train the way you will fight" has been a guiding principle for military training and has served the warfighter well as evidenced by numerous successful operations over the last decade. This need for realistic training for all combatants has been recognized and proven by the warfighter and continues to guide military training. However, to date, this key training principle has not been applied fully in the arena of cyberwarfare due to the lack of realistic, cost effective, reasonable, and formidable cyberwarfare opponents. Recent technological advances, improvements in the capability of computer-generated forces (CGFs) to emulate human behavior, and current results in research in information assurance and software protection, coupled with increasing dependence upon information superiority, indicate that the cyberbattlespace will be a key aspect of future conflict and that it is time to address the cyberwarfare training shortfall. To address the need for a cyberwarfare training and defensive testing capability, we propose research and development to yield a prototype computerized, semi-autonomous (SAF) red team capability. We term this capability the Cyber Warfare Opposing Force (CW OPFOR). There are several technologies that are now mature enough to enable, for the first time, the development of this powerful, effective, high fidelity CW OPFOR. These include improved knowledge about cyberwarfare attack and defense, improved techniques for assembling CGFs, improved techniques for capturing and expressing knowledge, software technologies that permit effective rapid prototyping to be effectively used on large projects, and the capability for effective hybrid reasoning systems. Our development approach for the CW OPFOR lays out several phases in order to address these requirements in an orderly manner and to enable us to test the capabilities of the CW OPFOR and exploit them as they are developed. We have completed the first phase of the research project, which

  14. Los Alamos National Laboratory 1995 self assessment report

    SciTech Connect

    1995-06-30

    The Los Alamos National Laboratory (LANL) Safeguards and Security (S and S) Assurance Program (AP) is designed to ensure the adequacy and effectiveness of the LANL S and S program. The Assurance Program provides a mechanism for discovering deficiencies, determining causes, conducting risk assessments, implementing corrective actions, and documenting the assessment process. Selection of organizations for self assessments is based on the criteria established in the LANL S and S Assurance Program. For FY 1995, 12 organizations were selected for self assessments, these organizations are identified fin the schedule at Appendix A. The S and S topical areas selected for review in each organization varied depending on their security interests and included: Program Planning and Management (PPM); Protection Program Operations (PPO); Material Control and Accountability (MC and A); Computer and Communications Security (COMPSEC and COMSEC); Information Security (INFOSEC); Personnel Security (PERSEC); and Operational Security (OPSEC). The objective was to ascertain the effectiveness of S and S programs in each organization, its formality of operations, and its integration with the overall Laboratory S and S program. The goal was to meet both the DOE self-assessment requirements and the UC performance criteria and document the results.

  15. Cyber attack analysis on cyber-physical systems: Detectability, severity, and attenuation strategy

    NASA Astrophysics Data System (ADS)

    Kwon, Cheolhyeon

    Security of Cyber-Physical Systems (CPS) against malicious cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is usually intractable to describe and diagnose them systematically. Motivated by such difficulties, this thesis presents a set of theories and algorithms for a cyber-secure architecture of the CPS within the control theoretic perspective. Here, instead of identifying a specific cyber attack model, we are focused on analyzing the system's response during cyber attacks. Firstly, we investigate the detectability of the cyber attacks from the system's behavior under cyber attacks. Specifically, we conduct a study on the vulnerabilities in the CPS's monitoring system against the stealthy cyber attack that is carefully designed to avoid being detected by its detection scheme. After classifying three kinds of cyber attacks according to the attacker's ability to compromise the system, we derive the necessary and sufficient conditions under which such stealthy cyber attacks can be designed to cause the unbounded estimation error while not being detected. Then, the analytical design method of the optimal stealthy cyber attack that maximizes the estimation error is developed. The proposed stealthy cyber attack analysis is demonstrated with illustrative examples on Air Traffic Control (ATC) system and Unmanned Aerial Vehicle (UAV) navigation system applications. Secondly, in an attempt to study the CPSs' vulnerabilities in more detail, we further discuss a methodology to identify potential cyber threats inherent in the given CPSs and quantify the attack severity accordingly. We then develop an analytical algorithm to test the behavior of the CPS under various cyber attack combinations. Compared to a numerical approach, the analytical algorithm enables the prediction of the most effective cyber attack combinations without computing the severity of all possible attack combinations, thereby greatly reducing the

  16. Analysis of operations and cyber security policies for a system of cooperating Flexible Alternating Current Transmission System (FACTS) devices.

    SciTech Connect

    Phillips, Laurence R.; Tejani, Bankim; Margulies, Jonathan; Hills, Jason L.; Richardson, Bryan T.; Baca, Micheal J.; Weiland, Laura

    2005-12-01

    Flexible Alternating Current Transmission Systems (FACTS) devices are installed on electric power transmission lines to stabilize and regulate power flow. Power lines protected by FACTS devices can increase power flow and better respond to contingencies. The University of Missouri Rolla (UMR) is currently working on a multi-year project to examine the potential use of multiple FACTS devices distributed over a large power system region in a cooperative arrangement in which the FACTS devices work together to optimize and stabilize the regional power system. The report describes operational and security challenges that need to be addressed to employ FACTS devices in this way and recommends references, processes, technologies, and policies to address these challenges.

  17. Using Self-Assessments in Elementary Classrooms

    ERIC Educational Resources Information Center

    Bingham, Gary; Holbrook, Teri; Meyers, Laura E.

    2010-01-01

    Self-assessments can play a powerful role in developing a child's motivation and achievement. Self-assessments require students to think carefully about what they have learned and how they learn and to develop critical-thinking and problem-solving skills. Students who engage in the productive practice of self-assessment, inevitably strengthen…

  18. What good cyber resilience looks like.

    PubMed

    Hult, Fredrik; Sivanesan, Giri

    In January 2012, the World Economic Forum made cyber attacks its fourth top global risk. In the 2013 risk report, cyber attacks were noted to be an even higher risk in absolute terms. The reliance of critical infrastructure on cyber working has never been higher; the frequency, intensity, impact and sophistication of attacks is growing. This trend looks likely to continue. It can be argued that it is no longer a question whether an organisation will be successfully hacked, but how long it will take to detect. In the ever-changing cyber environment, traditional protection techniques and reliance on preventive controls are not enough. A more agile approach is required to give assurance of a sufficiently secure digital society. Are we faced with a paradigm shift or a storm in a digital teacup? This paper offers an introduction to why cyber is important, a wider taxonomy on the topic and some historical context on how the discipline of cyber security has evolved, and an interpretation on what this means in the new normal of today. PMID:24457323

  19. What good cyber resilience looks like.

    PubMed

    Hult, Fredrik; Sivanesan, Giri

    In January 2012, the World Economic Forum made cyber attacks its fourth top global risk. In the 2013 risk report, cyber attacks were noted to be an even higher risk in absolute terms. The reliance of critical infrastructure on cyber working has never been higher; the frequency, intensity, impact and sophistication of attacks is growing. This trend looks likely to continue. It can be argued that it is no longer a question whether an organisation will be successfully hacked, but how long it will take to detect. In the ever-changing cyber environment, traditional protection techniques and reliance on preventive controls are not enough. A more agile approach is required to give assurance of a sufficiently secure digital society. Are we faced with a paradigm shift or a storm in a digital teacup? This paper offers an introduction to why cyber is important, a wider taxonomy on the topic and some historical context on how the discipline of cyber security has evolved, and an interpretation on what this means in the new normal of today.

  20. A Game Theoretic Approach to Cyber Attack Prediction

    SciTech Connect

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  1. CYBER-205 Devectorizer

    NASA Technical Reports Server (NTRS)

    Lakeotes, Christopher D.

    1990-01-01

    DEVECT (CYBER-205 Devectorizer) is CYBER-205 FORTRAN source-language-preprocessor computer program reducing vector statements to standard FORTRAN. In addition, DEVECT has many other standard and optional features simplifying conversion of vector-processor programs for CYBER 200 to other computers. Written in FORTRAN IV.

  2. Contract 98 Self-Assessment

    SciTech Connect

    Not Available

    1993-04-01

    This report documents the results of LBL`s Self-Assessment required by Appendix F to Contract DE ACOO3765F00098. This self assessment covers the performance measures set forth in Appendix F except those requiring an external audit. The performance measures for LBL are in the areas of ES&H Finance, Human Services and Procurement and Property. LBL is a multi-program laboratory operated by the University of California (UC) for DOE. The mission of LBL includes performing research in energy, general, and life sciences. LBL facilities include the main site on 130 acres located in the cities of Berkeley and Oakland; laboratories and offices located in buildings on the UC Berkeley Campus; and three leased buildings in the cities of Berkeley and Emeryville. 1. Involvement of Line Management in the assessment process to provide awareness and ownership. 2. Using existing assessments, audits and appraisals in lieu of a new assessment wherever possible. 3. Conduct of the assessments by individuals with functional responsibility and knowledge of the areas being assessed. 4. Interaction with individuals performing assessments at other Laboratories to enhance our learning process. As anticipated, a number of findings will require corrective action. General corrective actions are identified for key findings in this report. In early May 1993, this Laboratory will begin the development of detailed formal corrective action plans which will be entered into a laboratory automated corrective action tracking system.

  3. Data Intensive Architecture for Scalable Cyber Analytics

    SciTech Connect

    Olsen, Bryan K.; Johnson, John R.; Critchlow, Terence J.

    2011-12-19

    Cyber analysts are tasked with the identification and mitigation of network exploits and threats. These compromises are difficult to identify due to the characteristics of cyber communication, the volume of traffic, and the duration of possible attack. In this paper, we describe a prototype implementation designed to provide cyber analysts an environment where they can interactively explore a month’s worth of cyber security data. This prototype utilized On-Line Analytical Processing (OLAP) techniques to present a data cube to the analysts. The cube provides a summary of the data, allowing trends to be easily identified as well as the ability to easily pull up the original records comprising an event of interest. The cube was built using SQL Server Analysis Services (SSAS), with the interface to the cube provided by Tableau. This software infrastructure was supported by a novel hardware architecture comprising a Netezza TwinFin® for the underlying data warehouse and a cube server with a FusionIO drive hosting the data cube. We evaluated this environment on a month’s worth of artificial, but realistic, data using multiple queries provided by our cyber analysts. As our results indicate, OLAP technology has progressed to the point where it is in a unique position to provide novel insights to cyber analysts, as long as it is supported by an appropriate data intensive architecture.

  4. Cross-Layer Damage Assessment for Cyber Situational Awareness

    NASA Astrophysics Data System (ADS)

    Liu, Peng; Jia, Xiaoqi; Zhang, Shengzhi; Xiong, Xi; Jhi, Yoon-Chan; Bai, Kun; Li, Jason

    Damage assessment plays a very important role in securing enterprise networks and systems. Gaining good awareness about the effects and impact of cyber attack actions would enable security officers to make the right cyber defense decisions and take the right cyber defense actions. A good number of damage assessment techniques have been proposed in the literature, but they typically focus on a single abstraction level (of the software system in concern). As a result, existing damage assessment techniques and tools are still very limited in satisfying the needs of comprehensive damage assessment which should not result in any “blind spots”.

  5. Cyber Crime Protection Security Act

    THOMAS, 112th Congress

    Sen. Leahy, Patrick J. [D-VT

    2012-02-15

    02/16/2012 Read the second time. Placed on Senate Legislative Calendar under General Orders. Calendar No. 324. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  6. Cyber Security Domestic Preparedness Act

    THOMAS, 111th Congress

    Rep. Rodriguez, Ciro D. [D-TX-23

    2010-01-26

    01/28/2010 Referred to the Subcommittee on Emergency Communications, Preparedness, and Response. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  7. Student Self-Assessment: Processes and Consequences

    ERIC Educational Resources Information Center

    Taras, Maddalena

    2010-01-01

    Empirical research signals that self-assessment is an important factor supporting and engaging students with learning. Despite this, there has been no explicit comparison or evaluation of recent models used across educational sectors or within them. To the uninitiated, self-assessment often appears as an amorphous, unique process. This paper…

  8. Making Self-Assessment More Effective

    ERIC Educational Resources Information Center

    Galbraith, Robert M.; Hawkins, Richard E.; Holmboe, Eric S.

    2008-01-01

    Self-assessment has been held out as an important mechanism for lifelong learning and self-improvement for health care professionals. However, there is growing concern that individual learners often interpret the results inaccurately. This idea has led to skepticism that self-assessment in its current form can ever be truly useful for lifelong…

  9. 77 FR 33227 - Assessment Questionnaire-IP Sector Specific Agency Risk Self Assessment Tool (IP-SSARSAT)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-05

    ... SECURITY Assessment Questionnaire--IP Sector Specific Agency Risk Self Assessment Tool (IP-SSARSAT) AGENCY... Protection and Programs Directorate (NPPD), Office of Infrastructure Protection (IP), Sector Outreach and...--Assessment Questionnaire--IP Sector Specific Agency Risk Self Assessment Tool (IP-SSARSAT). DHS...

  10. Toward a theoretical framework for trustworthy cyber sensing

    NASA Astrophysics Data System (ADS)

    Xu, Shouhuai

    2010-04-01

    Cyberspace is an indispensable part of the economy and society, but has been "polluted" with many compromised computers that can be abused to launch further attacks against the others. Since it is likely that there always are compromised computers, it is important to be aware of the (dynamic) cyber security-related situation, which is however challenging because cyberspace is an extremely large-scale complex system. Our project aims to investigate a theoretical framework for trustworthy cyber sensing. With the perspective of treating cyberspace as a large-scale complex system, the core question we aim to address is: What would be a competent theoretical (mathematical and algorithmic) framework for designing, analyzing, deploying, managing, and adapting cyber sensor systems so as to provide trustworthy information or input to the higher layer of cyber situation-awareness management, even in the presence of sophisticated malicious attacks against the cyber sensor systems?

  11. An analytic approach to cyber adversarial dynamics

    NASA Astrophysics Data System (ADS)

    Sweeney, Patrick; Cybenko, George

    2012-06-01

    To date, cyber security investment by both the government and commercial sectors has been largely driven by the myopic best response of players to the actions of their adversaries and their perception of the adversarial environment. However, current work in applying traditional game theory to cyber operations typically assumes that games exist with prescribed moves, strategies, and payos. This paper presents an analytic approach to characterizing the more realistic cyber adversarial metagame that we believe is being played. Examples show that understanding the dynamic metagame provides opportunities to exploit an adversary's anticipated attack strategy. A dynamic version of a graph-based attack-defend game is introduced, and a simulation shows how an optimal strategy can be selected for success in the dynamic environment.

  12. Impact modeling and prediction of attacks on cyber targets

    NASA Astrophysics Data System (ADS)

    Khalili, Aram; Michalk, Brian; Alford, Lee; Henney, Chris; Gilbert, Logan

    2010-04-01

    In most organizations, IT (information technology) infrastructure exists to support the organization's mission. The threat of cyber attacks poses risks to this mission. Current network security research focuses on the threat of cyber attacks to the organization's IT infrastructure; however, the risks to the overall mission are rarely analyzed or formalized. This connection of IT infrastructure to the organization's mission is often neglected or carried out ad-hoc. Our work bridges this gap and introduces analyses and formalisms to help organizations understand the mission risks they face from cyber attacks. Modeling an organization's mission vulnerability to cyber attacks requires a description of the IT infrastructure (network model), the organization mission (business model), and how the mission relies on IT resources (correlation model). With this information, proper analysis can show which cyber resources are of tactical importance in a cyber attack, i.e., controlling them enables a large range of cyber attacks. Such analysis also reveals which IT resources contribute most to the organization's mission, i.e., lack of control over them gravely affects the mission. These results can then be used to formulate IT security strategies and explore their trade-offs, which leads to better incident response. This paper presents our methodology for encoding IT infrastructure, organization mission and correlations, our analysis framework, as well as initial experimental results and conclusions.

  13. Self-assessment for maintenance of certification.

    PubMed

    Bosma, Jennifer; Laszakovits, David; Hattery, Robert R

    2007-01-01

    Self-assessment is paired with continuing medical education in the "lifelong learning " component of the American Board of Radiology's (ABR) Maintenance of Certification program. The literature on the use of self-assessment in higher education and the professions is instructive with regard to the distinctiveness of this form of adult learning. This article reviews pertinent literature, summarizes the findings, and applies the principles to the creation and use of "self-assessment modules" (SAMs) for the maintenance of certification. Data on the use of ABR-qualified SAMs are reported. On completion of this article, the reader should be able to describe the nature, role, and best practices of self-assessment; apply these concepts to the creation or use of a SAM; and identify future opportunities for SAM development and use that will enhance the lifelong learning of radiologists.

  14. A cognitive and economic decision theory for examining cyber defense strategies.

    SciTech Connect

    Bier, Asmeret Brooke

    2014-01-01

    Cyber attacks pose a major threat to modern organizations. Little is known about the social aspects of decision making among organizations that face cyber threats, nor do we have empirically-grounded models of the dynamics of cooperative behavior among vulnerable organizations. The effectiveness of cyber defense can likely be enhanced if information and resources are shared among organizations that face similar threats. Three models were created to begin to understand the cognitive and social aspects of cyber cooperation. The first simulated a cooperative cyber security program between two organizations. The second focused on a cyber security training program in which participants interact (and potentially cooperate) to solve problems. The third built upon the first two models and simulates cooperation between organizations in an information-sharing program.

  15. Timing of cyber conflict

    PubMed Central

    Axelrod, Robert; Iliev, Rumen

    2014-01-01

    Nations are accumulating cyber resources in the form of stockpiles of zero-day exploits as well as other novel methods of engaging in future cyber conflict against selected targets. This paper analyzes the optimal timing for the use of such cyber resources. A simple mathematical model is offered to clarify how the timing of such a choice can depend on the stakes involved in the present situation, as well as the characteristics of the resource for exploitation. The model deals with the question of when the resource should be used given that its use today may well prevent it from being available for use later. The analysis provides concepts, theory, applications, and distinctions to promote the understanding strategy aspects of cyber conflict. Case studies include the Stuxnet attack on Iran’s nuclear program, the Iranian cyber attack on the energy firm Saudi Aramco, the persistent cyber espionage carried out by the Chinese military, and an analogous case of economic coercion by China in a dispute with Japan. The effects of the rapidly expanding market for zero-day exploits are also analyzed. The goal of the paper is to promote the understanding of this domain of cyber conflict to mitigate the harm it can do, and harness the capabilities it can provide. PMID:24474752

  16. Timing of cyber conflict.

    PubMed

    Axelrod, Robert; Iliev, Rumen

    2014-01-28

    Nations are accumulating cyber resources in the form of stockpiles of zero-day exploits as well as other novel methods of engaging in future cyber conflict against selected targets. This paper analyzes the optimal timing for the use of such cyber resources. A simple mathematical model is offered to clarify how the timing of such a choice can depend on the stakes involved in the present situation, as well as the characteristics of the resource for exploitation. The model deals with the question of when the resource should be used given that its use today may well prevent it from being available for use later. The analysis provides concepts, theory, applications, and distinctions to promote the understanding strategy aspects of cyber conflict. Case studies include the Stuxnet attack on Iran's nuclear program, the Iranian cyber attack on the energy firm Saudi Aramco, the persistent cyber espionage carried out by the Chinese military, and an analogous case of economic coercion by China in a dispute with Japan. The effects of the rapidly expanding market for zero-day exploits are also analyzed. The goal of the paper is to promote the understanding of this domain of cyber conflict to mitigate the harm it can do, and harness the capabilities it can provide.

  17. Timing of cyber conflict.

    PubMed

    Axelrod, Robert; Iliev, Rumen

    2014-01-28

    Nations are accumulating cyber resources in the form of stockpiles of zero-day exploits as well as other novel methods of engaging in future cyber conflict against selected targets. This paper analyzes the optimal timing for the use of such cyber resources. A simple mathematical model is offered to clarify how the timing of such a choice can depend on the stakes involved in the present situation, as well as the characteristics of the resource for exploitation. The model deals with the question of when the resource should be used given that its use today may well prevent it from being available for use later. The analysis provides concepts, theory, applications, and distinctions to promote the understanding strategy aspects of cyber conflict. Case studies include the Stuxnet attack on Iran's nuclear program, the Iranian cyber attack on the energy firm Saudi Aramco, the persistent cyber espionage carried out by the Chinese military, and an analogous case of economic coercion by China in a dispute with Japan. The effects of the rapidly expanding market for zero-day exploits are also analyzed. The goal of the paper is to promote the understanding of this domain of cyber conflict to mitigate the harm it can do, and harness the capabilities it can provide. PMID:24474752

  18. CYBER 200 Applications Seminar

    NASA Technical Reports Server (NTRS)

    Gary, J. P. (Compiler)

    1984-01-01

    Applications suited for the CYBER 200 digital computer are discussed. Various areas of application including meteorology, algorithms, fluid dynamics, monte carlo methods, petroleum, electronic circuit simulation, biochemistry, lattice gauge theory, economics and ray tracing are discussed.

  19. Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    SciTech Connect

    Chatterjee, Samrat; Halappanavar, Mahantesh; Tipireddy, Ramakrishna; Oster, Matthew R.; Saha, Sudip

    2015-04-15

    Representation and propagation of uncertainty in cyber attacker payoffs is a key aspect of security games. Past research has primarily focused on representing the defender’s beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and intervals. Within cyber-settings, continuous probability distributions may still be appropriate for addressing statistical (aleatory) uncertainties where the defender may assume that the attacker’s payoffs differ over time. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as probability boxes with intervals. In this study, we explore the mathematical treatment of such mixed payoff uncertainties.

  20. Towards a Research Agenda for Cyber Friendly Fire

    SciTech Connect

    Greitzer, Frank L.; Clements, Samuel L.; Carroll, Thomas E.; Fluckiger, Jerry D.

    2009-11-18

    Historical assessments of combat fratricide reveal principal contributing factors in the effects of stress, degradation of skills due to continuous operations or sleep deprivation, poor situation awareness, and lack of training and discipline in offensive/defense response selection. While these problems are typically addressed in R&D focusing on traditional ground-based combat, there is also an emerging need for improving situation awareness and decision making on defensive/offensive response options in the cyber defense arena, where a mistaken response to an actual or perceived cyber attack could lead to destruction or compromise of friendly cyber assets. The purpose of this report is to examine cognitive factors that may affect cyber situation awareness and describe possible research needs to reduce the likelihood and effects of "friendly cyber fire" on cyber defenses, information infrastructures, and data. The approach is to examine concepts and methods that have been described in research applied to the more traditional problem of mitigating the occurrence of combat identification and fratricide. Application domains of interest include cyber security defense against external or internal (insider) threats.

  1. Cyber in the Cloud -- Lessons Learned from INL's Cloud E-Mail Acquisition

    SciTech Connect

    Troy Hiltbrand; Daniel Jones

    2012-12-01

    As we look at the cyber security ecosystem, are we planning to fight the battle as we did yesterday, with firewalls and intrusion detection systems (IDS), or are we sensing a change in how security is evolving and planning accordingly? With the technology enablement and possible financial benefits of cloud computing, the traditional tools for establishing and maintaining our cyber security ecosystems are being dramatically altered.

  2. Case study examples using self-assessment.

    PubMed

    Garstecki, D; Hutton, C L; Nerbonne, M A; Newman, C W; Smoski, W J

    1990-10-01

    The following case studies demonstrate the application of self-assessment techniques. The selection of procedures reported here is not meant to imply necessarily that these procedures are more or less effective or more widely used than other available self-assessment tests, but rather to illustrate the various purposes for which self-assessment tools may be employed. Case 1 illustrates the contribution of data obtained from the Hearing Performance Inventory (Giolas, Owens, Lamb, & Shubert, 1979) in the management and counseling of a severely hearing impaired adult. Case 2 involves the use of the Hearing Problem Inventory developed by Hutton in Atlanta (HPI-A, Hutton, 1987). Application of the Self-Assessment of Communication (SAC) and Significant Other Assessment of Communication (SOAC) (Schow and Nerbonne, 1982) is shown in Case 3, whereas Case 4 demonstrates the usefulness of the Hearing Handicap Inventory for the Elderly (HHIE, Ventry and Weinstein, 1982). Both the SAC/SOAC and HHIE batteries involve problem cases associated with hearing aid fitting and assessment of benefit. The final illustration (Case 5) is a report on the Children's Auditory Processing Performance Scale (CHAPPS), a new questionnaire developed by Smoski, Brunt, and Tannahill/ISHA (1987) for assessing parent's judgment of children's listening abilities (Appendix). The versatility of self-assessment applications across a broad assortment of impairment levels, age groups, and clinical settings is demonstrated in these cases. Hopefully the reader will see more clearly the application and value of these and other non-audiometric techniques and will be motivated to increase the use of self-assessment tools in the individual work setting. PMID:2269415

  3. Self-assessing target with automatic feedback

    DOEpatents

    Larkin, Stephen W.; Kramer, Robert L.

    2004-03-02

    A self assessing target with four quadrants and a method of use thereof. Each quadrant containing possible causes for why shots are going into that particular quadrant rather than the center mass of the target. Each possible cause is followed by a solution intended to help the marksman correct the problem causing the marksman to shoot in that particular area. In addition, the self assessing target contains possible causes for general shooting errors and solutions to the causes of the general shooting error. The automatic feedback with instant suggestions and corrections enables the shooter to improve their marksmanship.

  4. Constructing a Cyber Preparedness Framework (CPF): The Lockheed Martin Case Study

    ERIC Educational Resources Information Center

    Beyer, Dawn M.

    2014-01-01

    The protection of sensitive data and technologies is critical in preserving United States (U.S.) national security and minimizing economic losses. However, during a cyber attack, the operational capability to constrain the exfiltrations of sensitive data and technologies may not be available. A cyber preparedness methodology (CPM) can improve…

  5. Cyber Threat Assessment of Uplink and Commanding System for Mission Operation

    NASA Technical Reports Server (NTRS)

    Ko, Adans Y.; Tan, Kymie M. C.; Cilloniz-Bicchi, Ferner; Faris, Grant

    2014-01-01

    Most of today's Mission Operations Systems (MOS) rely on Ground Data System (GDS) segment to mitigate cyber security risks. Unfortunately, IT security design is done separately from the design of GDS' mission operational capabilities. This incoherent practice leaves many security vulnerabilities in the system without any notice. This paper describes a new way to system engineering MOS, to include cyber threat risk assessments throughout the MOS development cycle, without this, it is impossible to design a dependable and reliable MOS to meet today's rapid changing cyber threat environment.

  6. Situational awareness of a coordinated cyber attack

    NASA Astrophysics Data System (ADS)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  7. A Systematic Comprehensive Computational Model for Stake Estimation in Mission Assurance: Applying Cyber Security Econometrics System (CSES) to Mission Assurance Analysis Protocol (MAAP)

    SciTech Connect

    Abercrombie, Robert K; Sheldon, Frederick T; Grimaila, Michael R

    2010-01-01

    In earlier works, we presented a computational infrastructure that allows an analyst to estimate the security of a system in terms of the loss that each stakeholder stands to sustain as a result of security breakdowns. In this paper, we discuss how this infrastructure can be used in the subject domain of mission assurance as defined as the full life-cycle engineering process to identify and mitigate design, production, test, and field support deficiencies of mission success. We address the opportunity to apply the Cyberspace Security Econometrics System (CSES) to Carnegie Mellon University and Software Engineering Institute s Mission Assurance Analysis Protocol (MAAP) in this context.

  8. Towards Self-Assessing Colleges. FE Matters.

    ERIC Educational Resources Information Center

    Dixon, Stella

    1996-01-01

    This publication on self-assessment in British further education colleges is intended to help in streamlining existing systems and in creating new quality assurance systems. The first section makes suggestions for quality policies and definitions: define quality at the college level, devise a quality policy, break down college activities into key…

  9. Self Assessment and Student-Centred Learning

    ERIC Educational Resources Information Center

    McDonald, Betty

    2012-01-01

    This paper seeks to show how self assessment facilitates student-centred learning (SCL) and fills a gap in the literature. Two groups of students were selected from a single class in a tertiary educational institution. The control group of 25 was selected randomly by the tossing of an unbiased coin (heads = control group). They were trained in the…

  10. Self-Assessed Intelligence and Academic Performance

    ERIC Educational Resources Information Center

    Chamorro-Premuzic, Tomas; Furnham, Adrian

    2006-01-01

    This paper reports the results of a two-year longitudinal study of the relationship between self-assessed intelligence (SAI) and academic performance (AP) in a sample of 184 British undergraduate students. Results showed significant correlations between SAI (both before and after taking an IQ test) and academic exam marks obtained two years later,…

  11. Teachers' Self-Assessed Level of Preparation

    ERIC Educational Resources Information Center

    White, Susan

    2013-01-01

    We asked high school physics teachers to assess their level of preparation across a number of domains. Almost all (98%) reported feeling adequately or well prepared in terms of their basic physics knowledge. The chart presents teachers' responses to their self-assessed level of preparation in six different areas. Almost all feel at least…

  12. Rapid Training System Self-Assessment

    ERIC Educational Resources Information Center

    Flesher, Jeff

    2007-01-01

    A systematic self-assessment mirrors quality system and certification models, thus making a strong argument for high-quality design, control, and management of the training function. Accomplished for the ongoing betterment of the function, not as a summative judgment of conformance, it discovers strengths and weaknesses and results in a common…

  13. Evaluating the Trustworthiness of Self-Assessments.

    ERIC Educational Resources Information Center

    Long, James S.; Fransen, Steven C.

    A retrospective self-assessment used with 22 county Extension agents from western Washington who had participated in a three-day inservice education program in agronomy was evaluated. Each participant was asked to draw an S on a Likert-type scale to indicate where each person started at the beginning of the workshop and an N where they perceived…

  14. Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches

    SciTech Connect

    Meyers, C A; Powers, S S; Faissol, D M

    2009-10-08

    In this paper we construct taxonomies of cyber adversaries and methods of attack, drawing from a survey of the literature in the area of cyber crime. We begin by addressing the scope of cyber crime, noting its prevalence and effects on the US economy. We then survey the literature on cyber adversaries, presenting a taxonomy of the different types of adversaries and their corresponding methods, motivations, maliciousness, and skill levels. Subsequently we survey the literature on cyber attacks, giving a taxonomy of the different classes of attacks, subtypes, and threat descriptions. The goal of this paper is to inform future studies of cyber security on the shape and characteristics of the risk space and its associated adversaries.

  15. Cyber threat metrics.

    SciTech Connect

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  16. Cyber child sexual exploitation.

    PubMed

    Burgess, Ann Wolbert; Mahoney, Meghan; Visk, Julie; Morgenbesser, Leonard

    2008-09-01

    A 2-year review of 285 child cyber crime cases reported in the newspaper revealed how the Internet offenders were apprehended, the content of child pornography, and crime classification. A subsample of 100 cases with data on offender occupation revealed 73% of cases involved people in positions of authority. The dynamics of child cyber crime cases direct the implications for nursing practice in terms of evidence-based suspicion for reporting, categorizing the content of Internet images, referral of children for counseling, and treatment of offenders.

  17. Detection of complex cyber attacks

    NASA Astrophysics Data System (ADS)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  18. Uncertainty and Risk Management in Cyber Situational Awareness

    NASA Astrophysics Data System (ADS)

    Li, Jason; Ou, Xinming; Rajagopalan, Raj

    Handling cyber threats unavoidably needs to deal with both uncertain and imprecise information. What we can observe as potential malicious activities can seldom give us 100% confidence on important questions we care about, e.g. what machines are compromised and what damage has been incurred. In security planning, we need information on how likely a vulnerability can lead to a successful compromise to better balance security and functionality, performance, and ease of use. These information are at best qualitative and are often vague and imprecise. In cyber situational awareness, we have to rely on such imperfect information to detect real attacks and to prevent an attack from happening through appropriate risk management. This chapter surveys existing technologies in handling uncertainty and risk management in cyber situational awareness.

  19. What is the current state of the science of Cyber defense?

    SciTech Connect

    Hurd, Alan J.

    2015-10-09

    My overall sense of the cyber defense field is one of an adolescent discipline currently bogged down in a cloud of issues, the most iconic of which is the great diversity of approaches that are being aggregated to form a coherent field. Because my own expertise is complex systems and materials physics research, I have limited direct experience in cyber security sciences except as a user of secure networks and computing resources. However, in producing this report, I have found with certainty that there exists no calculus for cyber risk assessment, mitigation, and response, although some hopeful precepts toward this end are emerging.

  20. PACIFIC NORTHWEST CYBER SUMMIT

    SciTech Connect

    Lesperance, Ann M.; Matlock, Gordon W.; Becker-Dippmann, Angela S.; Smith, Karen S.

    2013-08-07

    On March 26, 2013, the Snohomish County Public Utility District (PUD) and the U.S. Department of Energy’s (DOE’s) Pacific Northwest National Laboratory (PNNL) jointly hosted the Pacific Northwest Cyber Summit with the DOE’s Office of Electricity Delivery and Energy Reliability, the White House, Washington State congressional delegation, Washington State National Guard, and regional energy companies.

  1. CyberEconomics.

    ERIC Educational Resources Information Center

    Schenk, Robert

    2003-01-01

    Describes CyberEconomics, a complete, free, two-semester principles of economics textbook available on the World Wide Web. Contains chapters, sections, a table of contents, a set of learning objectives, and links to chapter introductions and sections. Offers a CD-ROM version available for a fee that contains interactive review questions. (JEH)

  2. Measuring Human Performance within Computer Security Incident Response Teams

    SciTech Connect

    McClain, Jonathan T.; Silva, Austin Ray; Avina, Glory Emmanuel; Forsythe, James C.

    2015-09-01

    Human performance has become a pertinen t issue within cyber security. However, this research has been stymied by the limited availability of expert cyber security professionals. This is partly attributable to the ongoing workload faced by cyber security professionals, which is compound ed by the limited number of qualified personnel and turnover of p ersonnel across organizations. Additionally, it is difficult to conduct research, and particularly, openly published research, due to the sensitivity inherent to cyber ope rations at most orga nizations. As an alternative, the current research has focused on data collection during cyb er security training exercises. These events draw individuals with a range of knowledge and experience extending from seasoned professionals to recent college gradu ates to college students. The current paper describes research involving data collection at two separate cyber security exercises. This data collection involved multiple measures which included behavioral performance based on human - machine transactions and questionnaire - based assessments of cyber security experience.

  3. Simulating cyber warfare and cyber defenses: information value considerations

    NASA Astrophysics Data System (ADS)

    Stytz, Martin R.; Banks, Sheila B.

    2011-06-01

    Simulating cyber warfare is critical to the preparation of decision-makers for the challenges posed by cyber attacks. Simulation is the only means we have to prepare decision-makers for the inevitable cyber attacks upon the information they will need for decision-making and to develop cyber warfare strategies and tactics. Currently, there is no theory regarding the strategies that should be used to achieve objectives in offensive or defensive cyber warfare, and cyber warfare occurs too rarely to use real-world experience to develop effective strategies. To simulate cyber warfare by affecting the information used for decision-making, we modify the information content of the rings that are compromised during in a decision-making context. The number of rings affected and value of the information that is altered (i.e., the closeness of the ring to the center) is determined by the expertise of the decision-maker and the learning outcome(s) for the simulation exercise. We determine which information rings are compromised using the probability that the simulated cyber defenses that protect each ring can be compromised. These probabilities are based upon prior cyber attack activity in the simulation exercise as well as similar real-world cyber attacks. To determine which information in a compromised "ring" to alter, the simulation environment maintains a record of the cyber attacks that have succeeded in the simulation environment as well as the decision-making context. These two pieces of information are used to compute an estimate of the likelihood that the cyber attack can alter, destroy, or falsify each piece of information in a compromised ring. The unpredictability of information alteration in our approach adds greater realism to the cyber event. This paper suggests a new technique that can be used for cyber warfare simulation, the ring approach for modeling context-dependent information value, and our means for considering information value when assigning cyber

  4. Cyber threat model for tactical radio networks

    NASA Astrophysics Data System (ADS)

    Kurdziel, Michael T.

    2014-05-01

    The shift to a full information-centric paradigm in the battlefield has allowed ConOps to be developed that are only possible using modern network communications systems. Securing these Tactical Networks without impacting their capabilities has been a challenge. Tactical networks with fixed infrastructure have similar vulnerabilities to their commercial counterparts (although they need to be secure against adversaries with greater capabilities, resources and motivation). However, networks with mobile infrastructure components and Mobile Ad hoc Networks (MANets) have additional unique vulnerabilities that must be considered. It is useful to examine Tactical Network based ConOps and use them to construct a threat model and baseline cyber security requirements for Tactical Networks with fixed infrastructure, mobile infrastructure and/or ad hoc modes of operation. This paper will present an introduction to threat model assessment. A definition and detailed discussion of a Tactical Network threat model is also presented. Finally, the model is used to derive baseline requirements that can be used to design or evaluate a cyber security solution that can be scaled and adapted to the needs of specific deployments.

  5. Cyber-Surveillance: A Case Study in Policy and Development

    ERIC Educational Resources Information Center

    Kim, Richard S. Y.

    2010-01-01

    The dissertation examines the historical development of surveillance, electronic surveillance, and cyber-surveillance from colonial times in the United States to the present. It presents the surveillance laws, technologies and policies as a balance between national security and privacy. To examine more recent developments, the dissertation…

  6. Autonomic Intelligent Cyber Sensor (AICS) Version 1.0.1

    SciTech Connect

    2015-03-01

    The Autonomic Intelligent Cyber Sensor (AICS) provides cyber security and industrial network state awareness for Ethernet based control network implementations. The AICS utilizes collaborative mechanisms based on Autonomic Research and a Service Oriented Architecture (SOA) to: 1) identify anomalous network traffic; 2) discover network entity information; 3) deploy deceptive virtual hosts; and 4) implement self-configuring modules. AICS achieves these goals by dynamically reacting to the industrial human-digital ecosystem in which it resides. Information is transported internally and externally on a standards based, flexible two-level communication structure.

  7. Autonomic Intelligent Cyber Sensor (AICS) Version 1.0.1

    2015-03-01

    The Autonomic Intelligent Cyber Sensor (AICS) provides cyber security and industrial network state awareness for Ethernet based control network implementations. The AICS utilizes collaborative mechanisms based on Autonomic Research and a Service Oriented Architecture (SOA) to: 1) identify anomalous network traffic; 2) discover network entity information; 3) deploy deceptive virtual hosts; and 4) implement self-configuring modules. AICS achieves these goals by dynamically reacting to the industrial human-digital ecosystem in which it resides. Information is transportedmore » internally and externally on a standards based, flexible two-level communication structure.« less

  8. Cyber Asynchronous versus Blended Cyber Approach in Distance English Learning

    ERIC Educational Resources Information Center

    Ge, Zi-Gang

    2012-01-01

    This study aims to compare the single cyber asynchronous learning approach with the blended cyber learning approach in distance English education. Two classes of 70 students participated in this study, which lasted one semester of about four months, with one class using the blended approach for their English study and the other only using the…

  9. Risk assessment for physical and cyber attacks on critical infrastructures.

    SciTech Connect

    Smith, Bryan J.; Sholander, Peter E.; Phelan, James M.; Wyss, Gregory Dane; Varnado, G. Bruce; Depoy, Jennifer Mae

    2005-08-01

    Assessing the risk of malevolent attacks against large-scale critical infrastructures requires modifications to existing methodologies. Existing risk assessment methodologies consider physical security and cyber security separately. As such, they do not accurately model attacks that involve defeating both physical protection and cyber protection elements (e.g., hackers turning off alarm systems prior to forced entry). This paper presents a risk assessment methodology that accounts for both physical and cyber security. It also preserves the traditional security paradigm of detect, delay and respond, while accounting for the possibility that a facility may be able to recover from or mitigate the results of a successful attack before serious consequences occur. The methodology provides a means for ranking those assets most at risk from malevolent attacks. Because the methodology is automated the analyst can also play 'what if with mitigation measures to gain a better understanding of how to best expend resources towards securing the facilities. It is simple enough to be applied to large infrastructure facilities without developing highly complicated models. Finally, it is applicable to facilities with extensive security as well as those that are less well-protected.

  10. Integrated situational awareness for cyber attack detection, analysis, and mitigation

    NASA Astrophysics Data System (ADS)

    Cheng, Yi; Sagduyu, Yalin; Deng, Julia; Li, Jason; Liu, Peng

    2012-06-01

    Real-time cyberspace situational awareness is critical for securing and protecting today's enterprise networks from various cyber threats. When a security incident occurs, network administrators and security analysts need to know what exactly has happened in the network, why it happened, and what actions or countermeasures should be taken to quickly mitigate the potential impacts. In this paper, we propose an integrated cyberspace situational awareness system for efficient cyber attack detection, analysis and mitigation in large-scale enterprise networks. Essentially, a cyberspace common operational picture will be developed, which is a multi-layer graphical model and can efficiently capture and represent the statuses, relationships, and interdependencies of various entities and elements within and among different levels of a network. Once shared among authorized users, this cyberspace common operational picture can provide an integrated view of the logical, physical, and cyber domains, and a unique visualization of disparate data sets to support decision makers. In addition, advanced analyses, such as Bayesian Network analysis, will be explored to address the information uncertainty, dynamic and complex cyber attack detection, and optimal impact mitigation issues. All the developed technologies will be further integrated into an automatic software toolkit to achieve near real-time cyberspace situational awareness and impact mitigation in large-scale computer networks.

  11. Self-Assessment of Self-Assessment in a Process of Co-Teaching

    ERIC Educational Resources Information Center

    Wolffensperger, Yochie; Patkin, Dorit

    2013-01-01

    The present paper engages in a qualitative research of self-assessment of two lecturers and their students within the framework of a mathematics teaching seminar course (a course during which students submit a research final work) at a teachers' training college in Israel. Two lecturers co-teach in the course - one of them in the discipline of…

  12. Nuclear Instrumentation and Control Cyber Testbed Considerations – Lessons Learned

    SciTech Connect

    Jonathan Gray; Robert Anderson; Julio G. Rodriguez; Cheol-Kwon Lee

    2014-08-01

    Abstract: Identifying and understanding digital instrumentation and control (I&C) cyber vulnerabilities within nuclear power plants and other nuclear facilities, is critical if nation states desire to operate nuclear facilities safely, reliably, and securely. In order to demonstrate objective evidence that cyber vulnerabilities have been adequately identified and mitigated, a testbed representing a facility’s critical nuclear equipment must be replicated. Idaho National Laboratory (INL) has built and operated similar testbeds for common critical infrastructure I&C for over ten years. This experience developing, operating, and maintaining an I&C testbed in support of research identifying cyber vulnerabilities has led the Korean Atomic Energy Research Institute of the Republic of Korea to solicit the experiences of INL to help mitigate problems early in the design, development, operation, and maintenance of a similar testbed. The following information will discuss I&C testbed lessons learned and the impact of these experiences to KAERI.

  13. Lemnos Interoperable Security Program

    SciTech Connect

    Stewart, John; Halbgewachs, Ron; Chavez, Adrian; Smith, Rhett; Teumim, David

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock

  14. Process Security in Chemical Engineering Education

    ERIC Educational Resources Information Center

    Piluso, Cristina; Uygun, Korkut; Huang, Yinlun; Lou, Helen H.

    2005-01-01

    The threats of terrorism have greatly alerted the chemical process industries to assure plant security at all levels: infrastructure-improvement-focused physical security, information-protection-focused cyber security, and design-and-operation-improvement-focused process security. While developing effective plant security methods and technologies…

  15. Using self-assessments to enhance business continuity programmes.

    PubMed

    Trousdale, Lisa

    2015-01-01

    Self-assessments have limitations and are no substitute for independent audits of a business continuity programme. Nevertheless, they can be an economical way to identify gaps, enhance the programme and create awareness. Self- assessments can also help prepare the programme and team members for an independent audit. In a resource-constrained environment, self-assessments can provide an opportunity to obtain measurable outputs about current state that can be tracked over time to capture improvement and maturity or identify deficiencies. Self-assessments can have a valuable place in any business continuity programme.

  16. Using self-assessments to enhance business continuity programmes.

    PubMed

    Trousdale, Lisa

    2015-01-01

    Self-assessments have limitations and are no substitute for independent audits of a business continuity programme. Nevertheless, they can be an economical way to identify gaps, enhance the programme and create awareness. Self- assessments can also help prepare the programme and team members for an independent audit. In a resource-constrained environment, self-assessments can provide an opportunity to obtain measurable outputs about current state that can be tracked over time to capture improvement and maturity or identify deficiencies. Self-assessments can have a valuable place in any business continuity programme. PMID:26420389

  17. Using self-assessments to enhance business continuity programmes.

    PubMed

    Trousdale, Lisa

    2015-01-01

    Self-assessments have limitations and are no substitute for independent audits of a business continuity programme. Nevertheless, they can be an economical way to identify gaps, enhance the programme and create awareness. Self- assessments can also help prepare the programme and team members for an independent audit. In a resource-constrained environment, self-assessments can provide an opportunity to obtain measurable outputs about current state that can be tracked over time to capture improvement and maturity or identify deficiencies. Self-assessments can have a valuable place in any business continuity programme. PMID:26420399

  18. Vulnerability of water supply systems to cyber-physical attacks

    NASA Astrophysics Data System (ADS)

    Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi

    2016-04-01

    The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.

  19. Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture

    DOEpatents

    Muller, George; Perkins, Casey J.; Lancaster, Mary J.; MacDonald, Douglas G.; Clements, Samuel L.; Hutton, William J.; Patrick, Scott W.; Key, Bradley Robert

    2015-07-28

    Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture are described. According to one aspect, a computer-implemented security evaluation method includes accessing information regarding a physical architecture and a cyber architecture of a facility, building a model of the facility comprising a plurality of physical areas of the physical architecture, a plurality of cyber areas of the cyber architecture, and a plurality of pathways between the physical areas and the cyber areas, identifying a target within the facility, executing the model a plurality of times to simulate a plurality of attacks against the target by an adversary traversing at least one of the areas in the physical domain and at least one of the areas in the cyber domain, and using results of the executing, providing information regarding a security risk of the facility with respect to the target.

  20. Cyber and physical infrastructure interdependencies.

    SciTech Connect

    Phillips, Laurence R.; Kelic, Andjelka; Warren, Drake E.

    2008-09-01

    The goal of the work discussed in this document is to understand the risk to the nation of cyber attacks on critical infrastructures. The large body of research results on cyber attacks against physical infrastructure vulnerabilities has not resulted in clear understanding of the cascading effects a cyber-caused disruption can have on critical national infrastructures and the ability of these affected infrastructures to deliver services. This document discusses current research and methodologies aimed at assessing the translation of a cyber-based effect into a physical disruption of infrastructure and thence into quantification of the economic consequences of the resultant disruption and damage. The document discusses the deficiencies of the existing methods in correlating cyber attacks with physical consequences. The document then outlines a research plan to correct those deficiencies. When completed, the research plan will result in a fully supported methodology to quantify the economic consequences of events that begin with cyber effects, cascade into other physical infrastructure impacts, and result in degradation of the critical infrastructure's ability to deliver services and products. This methodology enables quantification of the risks to national critical infrastructure of cyber threats. The work addresses the electric power sector as an example of how the methodology can be applied.

  1. Students' perspectives on cyber bullying.

    PubMed

    Agatston, Patricia W; Kowalski, Robin; Limber, Susan

    2007-12-01

    The aim of this study was to gain a better understanding of the impact of cyber bullying on students and the possible need for prevention messages targeting students, educators, and parents. A total of 148 middle and high school students were interviewed during focus groups held at two middle and two high schools in a public school district. The focus groups were approximately 45 minutes in length. Students were divided by gender and asked a series of scripted questions by a same-gender student assistance counselor. We found that students' comments during the focus groups suggest that students-particularly females-view cyber bullying as a problem, but one rarely discussed at school, and that students do not see the school district personnel as helpful resources when dealing with cyber bullying. Students are currently experiencing the majority of cyber bullying instances outside of the school day; however there is some impact at school. Students were able to suggest some basic strategies for dealing with cyber bullying, but were less likely to be aware of strategies to request the removal of objectionable websites, as well as how to respond as a helpful bystander when witnessing cruel online behavior. We conclude that school districts should address cyber bullying through a combination of policies and information that are shared with students and parents. Schools should include cyber bullying as part of their bullying prevention strategies and include classroom lessons that address reporting and bystander behavior. PMID:18047946

  2. Students' perspectives on cyber bullying.

    PubMed

    Agatston, Patricia W; Kowalski, Robin; Limber, Susan

    2007-12-01

    The aim of this study was to gain a better understanding of the impact of cyber bullying on students and the possible need for prevention messages targeting students, educators, and parents. A total of 148 middle and high school students were interviewed during focus groups held at two middle and two high schools in a public school district. The focus groups were approximately 45 minutes in length. Students were divided by gender and asked a series of scripted questions by a same-gender student assistance counselor. We found that students' comments during the focus groups suggest that students-particularly females-view cyber bullying as a problem, but one rarely discussed at school, and that students do not see the school district personnel as helpful resources when dealing with cyber bullying. Students are currently experiencing the majority of cyber bullying instances outside of the school day; however there is some impact at school. Students were able to suggest some basic strategies for dealing with cyber bullying, but were less likely to be aware of strategies to request the removal of objectionable websites, as well as how to respond as a helpful bystander when witnessing cruel online behavior. We conclude that school districts should address cyber bullying through a combination of policies and information that are shared with students and parents. Schools should include cyber bullying as part of their bullying prevention strategies and include classroom lessons that address reporting and bystander behavior.

  3. 76 FR 81955 - Assessment Questionnaire-IP Sector Specific Agency Risk Self Assessment Tool (IP-SSARSAT)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-29

    ... SECURITY Assessment Questionnaire--IP Sector Specific Agency Risk Self Assessment Tool (IP-SSARSAT) AGENCY... Protection and Programs Directorate (NPPD), Office of Infrastructure Protection (IP), Sector Specific Agency.../IP/SSA EMO, 245 Murray Lane SW., Mail Stop 0640, Arlington, VA 20598-0630. Emailed requests should...

  4. Methodology for prioritizing cyber-vulnerable critical infrastructure equipment and mitigation strategies.

    SciTech Connect

    Dawson, Lon Andrew; Stinebaugh, Jennifer A.

    2010-04-01

    The Department of Homeland Security (DHS), National Cyber Security Division (NSCD), Control Systems Security Program (CSSP), contracted Sandia National Laboratories to develop a generic methodology for prioritizing cyber-vulnerable, critical infrastructure assets and the development of mitigation strategies for their loss or compromise. The initial project has been divided into three discrete deliverables: (1) A generic methodology report suitable to all Critical Infrastructure and Key Resource (CIKR) Sectors (this report); (2) a sector-specific report for Electrical Power Distribution; and (3) a sector-specific report for the water sector, including generation, water treatment, and wastewater systems. Specific reports for the water and electric sectors are available from Sandia National Laboratories.

  5. Recommended Practice: Creating Cyber Forensics Plans for Control Systems

    SciTech Connect

    Eric Cornelius; Mark Fabro

    2008-08-01

    Cyber forensics has been in the popular mainstream for some time, and has matured into an information-technology capability that is very common among modern information security programs. The goal of cyber forensics is to support the elements of troubleshooting, monitoring, recovery, and the protection of sensitive data. Moreover, in the event of a crime being committed, cyber forensics is also the approach to collecting, analyzing, and archiving data as evidence in a court of law. Although scalable to many information technology domains, especially modern corporate architectures, cyber forensics can be challenging when being applied to non-traditional environments, which are not comprised of current information technologies or are designed with technologies that do not provide adequate data storage or audit capabilities. In addition, further complexity is introduced if the environments are designed using proprietary solutions and protocols, thus limiting the ease of which modern forensic methods can be utilized. The legacy nature and somewhat diverse or disparate component aspects of control systems environments can often prohibit the smooth translation of modern forensics analysis into the control systems domain. Compounded by a wide variety of proprietary technologies and protocols, as well as critical system technologies with no capability to store significant amounts of event information, the task of creating a ubiquitous and unified strategy for technical cyber forensics on a control systems device or computing resource is far from trivial. To date, no direction regarding cyber forensics as it relates to control systems has been produced other than what might be privately available from commercial vendors. Current materials have been designed to support event recreation (event-based), and although important, these requirements do not always satisfy the needs associated with incident response or forensics that are driven by cyber incidents. To address these

  6. Preservice Teachers and Self-Assessing Digital Competence

    ERIC Educational Resources Information Center

    Maderick, Joseph A.; Zhang, Shaoan; Hartley, Kendall; Marchand, Gwen

    2016-01-01

    This study compares matched surveys of subjective self-assessment and objective assessment on seven domains of digital competence for preservice teachers at a large Southwest public university. The results, consistent with earlier studies, confirm that the participating preservice teachers inaccurately self-assessed their digital competence. The…

  7. Predictors of Self-Assessed Health among Elderly Post Hospitalization.

    ERIC Educational Resources Information Center

    Lurie, Elinore; And Others

    Self-assessment of health incorporates both objective and subjective elements into a general state with implications for health-related behavior. To examine the predictors of self-assessed health in an elderly, post-hospitalization population, 73 adults, 65 years of age or older, were asked to assess the status of the condition for which they were…

  8. Learner Self-Assessment: An Investigation into Teachers' Beliefs

    ERIC Educational Resources Information Center

    Bullock, Deborah

    2011-01-01

    This article looks at issues surrounding learner self-assessment and studies into teacher beliefs. It then goes on to present the findings of a study designed to explore teacher attitudes, beliefs, and behaviour with regard to learner self-assessment during the implementation of a revision of assessment procedures for teens aged 14-16 years.…

  9. eCPD in Action and Self-Assessment

    ERIC Educational Resources Information Center

    Butler, Steve

    2007-01-01

    Self-assessment is an integral component in the life of any education and training organisation so as to ensure quality improvement. This publication illustrates an individual self-assessment tool developed by the Learning and Skills Network (LSN) which gives feedback and support to assist staff to enhance their teaching and learning through the…

  10. Promoting Learning and Achievement through Self-Assessment

    ERIC Educational Resources Information Center

    Andrade, Heidi; Valtcheva, Anna

    2009-01-01

    Criteria-referenced self-assessment is a process during which students collect information about their own performance or progress; compare it to explicitly stated criteria, goals, or standards; and revise accordingly. The authors argue that self-assessment must be a formative type of assessment, done on drafts of works in progress: It should not…

  11. Using Self-Assessment to Chart Students' Paths

    ERIC Educational Resources Information Center

    Heritage, Margaret

    2009-01-01

    This article discusses the use of self-assessment to chart the course of students' learning. Rather than experiencing school as a journey on an unknown sea to an unknown destination, it is possible for students to use formative self-assessment as a navigational chart and compass--to know where they are going, how they are going to get there, and…

  12. 32 CFR 701.124 - PA self assessments/inspections.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false PA self assessments/inspections. 701.124 Section... OF THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.124 PA self assessments... PA program. This serves to identify strengths and weaknesses and to determine training needs...

  13. Contrasting Case Instruction Can Improve Self-Assessment of Writing

    ERIC Educational Resources Information Center

    Lin-Siegler, Xiaodong; Shaenfield, David; Elder, Anastasia D.

    2015-01-01

    Self-assessment is a process during which students evaluate the quality of their work in a given domain based on explicitly stated criteria. Accurate self-assessments improve students' academic achievement. Yet, students often have difficulties assessing their own work. It is possible that appropriate instructional supports will help students…

  14. The Benefits of Guided Facility Self-Assessments

    ERIC Educational Resources Information Center

    O'Leary, Keith

    2012-01-01

    A growing number of educational institutions have discovered that a guided self-assessment solution helps them to consistently and cost-effectively obtain facility condition information and make better-informed capital planning decisions. Facility self-assessment employs a consistent, repeatable process for internal staff to quickly assess assets…

  15. Living Language: Self-Assessment, Oral Production, and Domestic Immersion

    ERIC Educational Resources Information Center

    Dolosic, Haley N.; Brantmeier, Cindy; Strube, Michael; Hogrebe, Mark C.

    2016-01-01

    With 24 adolescent students enrolled in a French language summer camp, the present study examines the relationship between self-assessment and oral production in French, interpreting results through a framework of individual learning variables. Participants were surrounded by French inside and outside the classroom. Self-assessment was measured…

  16. Self-assessment program implementation plan. Revision A

    SciTech Connect

    Quets, A.L.

    1991-10-23

    This implementation plan identifies and describes the tasks that must be completed in order to successfully implement a Self-Assessment (SA) Program. The purpose of the Self-Assessment Program is to comply with applicable Department of Energy (DOE) directives and orders, Federal, State, and local regulations, operate the Pinellas Plant according to best management practices, and achieve excellence in all operating areas. The Self-Assessment Program will be applied to the Pinellas Plant facility which includes buildings, grounds, equipment, operations, and activities under the control of line management. Furthermore, all applicable disciplines under environmental protection, safety, health and management will be covered by the program. The Self-Assessment Program has been designed to accomplish the following tasks: define the scope of the Self-Assessment Program; assign organizational roles and responsibilities; address EH and S functional elements and management issues; develop a Self-Assessment program charter and policy; identify all applicable EH and S codes, regulations and standards; develop self-assessment procedures and instructions; generate a Self-Assessment Manual; develop a master schedule for facility appraisals and audits; design checklists and report formats for recording appraisal data; implement an assessment tracking and reporting system; implement a root cause analysis and corrective action system; implement a trend analysis and lessons learned system; and establish a formal training program.

  17. Using Self-Assessment to Support Individualized Learning

    ERIC Educational Resources Information Center

    MacDonald, Betty

    2012-01-01

    Self-assessment is frequently used to enable students to "reflect" on a learning experience. Often only the person involved in the "reflection" knows the criteria used to underpin the process. Here the author explains how, when the self-assessment is given some structure some tangible benefits can be observed. While the approach might not be a…

  18. Computer-Aided Self Assessment: The Intelligent Answer?

    ERIC Educational Resources Information Center

    Waite, Alice; Goodman, Linda M.

    1989-01-01

    Describes the development of a computer-assisted self assessment system in the United Kingdom that was designed to explore the use of artificial intelligence techniques in the area of self assessment for training applications. The expert systems used are explained, development of a pilot prototype is outlined, and field tests are described. (eight…

  19. International physical protection self-assessment tool for chemical facilities.

    SciTech Connect

    Tewell, Craig R.; Burdick, Brent A.; Stiles, Linda L.; Lindgren, Eric Richard

    2010-09-01

    This report is the final report for Laboratory Directed Research and Development (LDRD) Project No.130746, International Physical Protection Self-Assessment Tool for Chemical Facilities. The goal of the project was to develop an exportable, low-cost, computer-based risk assessment tool for small to medium size chemical facilities. The tool would assist facilities in improving their physical protection posture, while protecting their proprietary information. In FY2009, the project team proposed a comprehensive evaluation of safety and security regulations in the target geographical area, Southeast Asia. This approach was later modified and the team worked instead on developing a methodology for identifying potential targets at chemical facilities. Milestones proposed for FY2010 included characterizing the international/regional regulatory framework, finalizing the target identification and consequence analysis methodology, and developing, reviewing, and piloting the software tool. The project team accomplished the initial goal of developing potential target categories for chemical facilities; however, the additional milestones proposed for FY2010 were not pursued and the LDRD funding therefore was redirected.

  20. Human dimensions in cyber operations research and development priorities.

    SciTech Connect

    Forsythe, James Chris; Silva, Austin Ray; Stevens-Adams, Susan Marie; Bradshaw, Jeffrey

    2012-11-01

    Within cyber security, the human element represents one of the greatest untapped opportunities for increasing the effectiveness of network defenses. However, there has been little research to understand the human dimension in cyber operations. To better understand the needs and priorities for research and development to address these issues, a workshop was conducted August 28-29, 2012 in Washington DC. A synthesis was developed that captured the key issues and associated research questions. Research and development needs were identified that fell into three parallel paths: (1) human factors analysis and scientific studies to establish foundational knowledge concerning factors underlying the performance of cyber defenders; (2) development of models that capture key processes that mediate interactions between defenders, users, adversaries and the public; and (3) development of a multi-purpose test environment for conducting controlled experiments that enables systems and human performance measurement. These research and development investments would transform cyber operations from an art to a science, enabling systems solutions to be engineered to address a range of situations. Organizations would be able to move beyond the current state where key decisions (e.g. personnel assignment) are made on a largely ad hoc basis to a state in which there exist institutionalized processes for assuring the right people are doing the right jobs in the right way. These developments lay the groundwork for emergence of a professional class of cyber defenders with defined roles and career progressions, with higher levels of personnel commitment and retention. Finally, the operational impact would be evident in improved performance, accompanied by a shift to a more proactive response in which defenders have the capacity to exert greater control over the cyber battlespace.

  1. Evaluating the Accuracy of Pharmacy Students' Self-Assessment Skills

    PubMed Central

    Gregory, Paul A. M.

    2007-01-01

    Objectives To evaluate the accuracy of self-assessment skills of senior-level bachelor of science pharmacy students. Methods A method proposed by Kruger and Dunning involving comparisons of pharmacy students' self-assessment with weighted average assessments of peers, standardized patients, and pharmacist-instructors was used. Results Eighty students participated in the study. Differences between self-assessment and external assessments were found across all performance quartiles. These differences were particularly large and significant in the third and fourth (lowest) quartiles and particularly marked in the areas of empathy, and logic/focus/coherence of interviewing. Conclusions The quality and accuracy of pharmacy students' self-assessment skills were not as strong as expected, particularly given recent efforts to include self-assessment in the curriculum. Further work is necessary to ensure this important practice competency and life skill is at the level expected for professional practice and continuous professional development. PMID:17998986

  2. Stereotactic radiosurgery - CyberKnife

    MedlinePlus

    ... slides into a machine that delivers radiation. A robotic arm controlled by a computer moves around you. ... Accuray Incorporated. CyberKnife robotic radiosurgery system patient brochure. 2012. ... Accessed ...

  3. The Future of Self-Assessment in Classroom Practice: Reframing Self-Assessment as a Core Competency

    ERIC Educational Resources Information Center

    Brown, Gavin T. L.; Harris, Lois R.

    2014-01-01

    Formative assessment policies and self-regulation theories argue that student self-assessment of their own work and processes are useful for raising academic performance and self-regulatory skills. However, research into student self-evaluation raises serious doubts about the quality of self-assessment as an assessment process and identifies…

  4. Security

    ERIC Educational Resources Information Center

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  5. 78 FR 17219 - Homeland Security Science and Technology Advisory Committee Meeting Cancellation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-20

    ..., such as new developments in systems engineering, cyber-security, ] knowledge management and how best to... the Under Secretary on policies, management processes, and organizational constructs as needed....

  6. How is cyber threat evolving and what do organisations need to consider?

    PubMed

    Borrett, Martin; Carter, Roger; Wespi, Andreas

    Organisations and members of the public are becoming accustomed to the increasing velocity, frequency and variety of cyber-attacks that they have been facing over the last few years. In response to this challenge, it is important to explore what can be done to offer commercial and private users a reliable and functioning environment. This paper discusses how cyber threats might evolve in the future and seeks to explore these threats more fully. Attention is paid to the changing nature of cyber-attackers and their motivations and what this means for organisations. Finally, useful and actionable steps are provided, which practitioners can use to understand how they can start to address the future challenges of cyber security. PMID:24457327

  7. How is cyber threat evolving and what do organisations need to consider?

    PubMed

    Borrett, Martin; Carter, Roger; Wespi, Andreas

    Organisations and members of the public are becoming accustomed to the increasing velocity, frequency and variety of cyber-attacks that they have been facing over the last few years. In response to this challenge, it is important to explore what can be done to offer commercial and private users a reliable and functioning environment. This paper discusses how cyber threats might evolve in the future and seeks to explore these threats more fully. Attention is paid to the changing nature of cyber-attackers and their motivations and what this means for organisations. Finally, useful and actionable steps are provided, which practitioners can use to understand how they can start to address the future challenges of cyber security.

  8. Network systems security analysis

    NASA Astrophysics Data System (ADS)

    Yilmaz, Ä.°smail

    2015-05-01

    Network Systems Security Analysis has utmost importance in today's world. Many companies, like banks which give priority to data management, test their own data security systems with "Penetration Tests" by time to time. In this context, companies must also test their own network/server systems and take precautions, as the data security draws attention. Based on this idea, the study cyber-attacks are researched throughoutly and Penetration Test technics are examined. With these information on, classification is made for the cyber-attacks and later network systems' security is tested systematically. After the testing period, all data is reported and filed for future reference. Consequently, it is found out that human beings are the weakest circle of the chain and simple mistakes may unintentionally cause huge problems. Thus, it is clear that some precautions must be taken to avoid such threats like updating the security software.

  9. Cyber Children: What Parents Need to Know

    ERIC Educational Resources Information Center

    Roberts, Kevin J.

    2010-01-01

    Parents need to be aware of the dangers and the opportunities the cyber world offers. Video games are being used in the classroom. Commerce is increasingly taking place online and computers are indispensable in the workplace. A cyber-oriented child possesses some great advantages. The author urges parents to become experts in the cyber world so…

  10. Confronting the Pedagogical Challenge of Cyber Safety

    ERIC Educational Resources Information Center

    Hanewald, Ria

    2008-01-01

    Cyber violence and the antidote of cyber safety are fast becoming a global concern for governments, educational authorities, teachers, parents and children alike. Despite substantial funding for information dissemination on preventative strategies and the development of electronic responses to hinder perpetrators, the phenomenon of cyber violence…

  11. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    ERIC Educational Resources Information Center

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  12. Discussing Cyber Ethics with Students Is Critical

    ERIC Educational Resources Information Center

    Kruger, Robert

    2003-01-01

    As computers become a larger part of the curriculum, educators everywhere are being asked to take a stand for cyber ethics, the right and wrong of computer and Internet use. Teachers cannot always depend on parents to instill cyber ethics. Parents may not know or follow the rules, either. Once students understand cyber ethics, they may have a…

  13. 32 CFR 701.124 - PA self assessments/inspections.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECNAVINST 5210.8D). These reports shall be made available to PA program officials and to CNO (DNS-36)/CMC... until the next self-assessment is completed. Make these reports available, upon request, to CNO...

  14. 32 CFR 701.124 - PA self assessments/inspections.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... SECNAVINST 5210.8D). These reports shall be made available to PA program officials and to CNO (DNS-36)/CMC... until the next self-assessment is completed. Make these reports available, upon request, to CNO...

  15. 32 CFR 701.124 - PA self assessments/inspections.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECNAVINST 5210.8D). These reports shall be made available to PA program officials and to CNO (DNS-36)/CMC... until the next self-assessment is completed. Make these reports available, upon request, to CNO...

  16. 32 CFR 701.124 - PA self assessments/inspections.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECNAVINST 5210.8D). These reports shall be made available to PA program officials and to CNO (DNS-36)/CMC... until the next self-assessment is completed. Make these reports available, upon request, to CNO...

  17. Lawrence Berkeley Laboratory Self-Assessment Program: Implementation Plan

    SciTech Connect

    Not Available

    1992-06-01

    The Lawrence Berkeley Laboratory (LBL) Self-Assessment Program provides a formal process for assuring quality and regulatory compliance in all facets of Laboratory operations. The program, which integrates the ongoing self-assessment activities of the individual Divisions and Offices in a comprehensive, top-to-bottom process, provides assistance to the US Department of Energy (DOE), the University of California, and Laboratory management in their appraisals of Laboratory performance. This document describes the program goals, scope, responsibilities, elements, and implementation schedule. This document is also the implementation plan for the institutional level self-assessment program. Each Division is also required to develop a self-assessment program that contains the elements described in this document.

  18. Effect of self-assessment on test scores: student perceptions.

    PubMed

    Ramirez, Beatriz U

    2010-09-01

    After a sudden increase in most of the individual grades in a multiple-choice test, students were asked to rank the three most relevant factors responsible for this outcome. Among eight others, the availability of a test for self-assessment before the final test was by far the most frequently mentioned (82.4% of the students). Questions applied during different course activities did not have the same effect on student scores as the "online" self-assessment test.

  19. Self-assessed performance improves statistical fusion of image labels

    SciTech Connect

    Bryan, Frederick W. Xu, Zhoubing; Asman, Andrew J.; Allen, Wade M.; Reich, Daniel S.; Landman, Bennett A.

    2014-03-15

    Purpose: Expert manual labeling is the gold standard for image segmentation, but this process is difficult, time-consuming, and prone to inter-individual differences. While fully automated methods have successfully targeted many anatomies, automated methods have not yet been developed for numerous essential structures (e.g., the internal structure of the spinal cord as seen on magnetic resonance imaging). Collaborative labeling is a new paradigm that offers a robust alternative that may realize both the throughput of automation and the guidance of experts. Yet, distributing manual labeling expertise across individuals and sites introduces potential human factors concerns (e.g., training, software usability) and statistical considerations (e.g., fusion of information, assessment of confidence, bias) that must be further explored. During the labeling process, it is simple to ask raters to self-assess the confidence of their labels, but this is rarely done and has not been previously quantitatively studied. Herein, the authors explore the utility of self-assessment in relation to automated assessment of rater performance in the context of statistical fusion. Methods: The authors conducted a study of 66 volumes manually labeled by 75 minimally trained human raters recruited from the university undergraduate population. Raters were given 15 min of training during which they were shown examples of correct segmentation, and the online segmentation tool was demonstrated. The volumes were labeled 2D slice-wise, and the slices were unordered. A self-assessed quality metric was produced by raters for each slice by marking a confidence bar superimposed on the slice. Volumes produced by both voting and statistical fusion algorithms were compared against a set of expert segmentations of the same volumes. Results: Labels for 8825 distinct slices were obtained. Simple majority voting resulted in statistically poorer performance than voting weighted by self-assessed performance

  20. Self-assessed performance improves statistical fusion of image labels

    PubMed Central

    Bryan, Frederick W.; Xu, Zhoubing; Asman, Andrew J.; Allen, Wade M.; Reich, Daniel S.; Landman, Bennett A.

    2014-01-01

    Purpose: Expert manual labeling is the gold standard for image segmentation, but this process is difficult, time-consuming, and prone to inter-individual differences. While fully automated methods have successfully targeted many anatomies, automated methods have not yet been developed for numerous essential structures (e.g., the internal structure of the spinal cord as seen on magnetic resonance imaging). Collaborative labeling is a new paradigm that offers a robust alternative that may realize both the throughput of automation and the guidance of experts. Yet, distributing manual labeling expertise across individuals and sites introduces potential human factors concerns (e.g., training, software usability) and statistical considerations (e.g., fusion of information, assessment of confidence, bias) that must be further explored. During the labeling process, it is simple to ask raters to self-assess the confidence of their labels, but this is rarely done and has not been previously quantitatively studied. Herein, the authors explore the utility of self-assessment in relation to automated assessment of rater performance in the context of statistical fusion. Methods: The authors conducted a study of 66 volumes manually labeled by 75 minimally trained human raters recruited from the university undergraduate population. Raters were given 15 min of training during which they were shown examples of correct segmentation, and the online segmentation tool was demonstrated. The volumes were labeled 2D slice-wise, and the slices were unordered. A self-assessed quality metric was produced by raters for each slice by marking a confidence bar superimposed on the slice. Volumes produced by both voting and statistical fusion algorithms were compared against a set of expert segmentations of the same volumes. Results: Labels for 8825 distinct slices were obtained. Simple majority voting resulted in statistically poorer performance than voting weighted by self-assessed performance

  1. Cyber Astronomy: A Cyber University Course for School Students

    ERIC Educational Resources Information Center

    Chan, C. W.; Wong, K. Y. Michael

    2003-01-01

    Teaching university physics through the internet is not new, but a new course providing the same service for secondary school students is the first of its kind in Hong Kong. Taking advantage of the fast and affordable broadband internet in the region, some university courses have been converted to a cyber curriculum suitable for secondary school…

  2. VTAC: virtual terrain assisted impact assessment for cyber attacks

    NASA Astrophysics Data System (ADS)

    Argauer, Brian J.; Yang, Shanchieh J.

    2008-03-01

    Overwhelming intrusion alerts have made timely response to network security breaches a difficult task. Correlating alerts to produce a higher level view of intrusion state of a network, thus, becomes an essential element in network defense. This work proposes to analyze correlated or grouped alerts and determine their 'impact' to services and users of the network. A network is modeled as 'virtual terrain' where cyber attacks maneuver. Overlaying correlated attack tracks on virtual terrain exhibits the vulnerabilities exploited by each track and the relationships between them and different network entities. The proposed impact assessment algorithm utilizes the graph-based virtual terrain model and combines assessments of damages caused by the attacks. The combined impact scores allow to identify severely damaged network services and affected users. Several scenarios are examined to demonstrate the uses of the proposed Virtual Terrain Assisted Impact Assessment for Cyber Attacks (VTAC).

  3. Cyberspace security system

    DOEpatents

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  4. Student self-assessment in an interactive learning environment: Technological tools for scaffolding and understanding self-assessment practices

    NASA Astrophysics Data System (ADS)

    Eslinger, Eric Martin

    Metacognitive skills are a crucial component of a successful learning career. We define metacognition as the ability to plan, monitor progress toward a goal, reflect on the quality of work and process, and revise the work or plan accordingly. By explicitly addressing certain metacognitive practices in classrooms, researchers have observed improved learning outcomes in both science and mathematical problem solving. Although these efforts were successful, they were also limited in the range of skills that could be addressed at one time and the methods used to address them due to the static nature inherent in traditional pencil-and-paper format. We wished to address these skills in a more dynamic, continuous representation such as that afforded by a computerized learning environment. This paper outlines such an environment and describes pedagogical activities afforded by the system. The ThinkerTools group developed and tested a software scaffold for inquiry projects in a middle-school classroom. By analyzing student use of the software tool, three forms of self-assessment activity were noted: integrated, task and project self-assessment. Each assessment form was related to the degree of interleaving between assessment and work the students engaged in as they developed their inquiry products. I argue that the integrated forms of assessment are more beneficial to student learning, and show that there is a significant relationship between active self-assessment forms and measures of student achievement and product quality. Through the use of case studies including video analysis, I address specific student self-assessment activity that utilized the software as well as self-assessment that took place outside of the software. A model of student self-assessment activity was created, highlighting aspects of activity that afford more productive self-assessment episodes.

  5. Effective Management of Information Security and Privacy

    ERIC Educational Resources Information Center

    Anderson, Alicia

    2006-01-01

    No university seems immune to cyber attacks. For many universities, such events have served as wake-up calls to develop a comprehensive information security and privacy strategy. This is no simple task, however. It involves balancing a culture of openness with a need for security and privacy. Security and privacy are not the same, and the…

  6. Three Essays on Information Security Policies

    ERIC Educational Resources Information Center

    Yang, Yubao

    2011-01-01

    Information security breaches pose a significant and increasing threat to national security and economic well-being. In the Symantec Internet Security Threat Report (2003), companies surveyed experienced an average of about 30 attacks per week. Anecdotal evidence suggests that losses from cyber-attacks can run into millions of dollars. The CSI-FBI…

  7. Factors Affecting Teenager Cyber Delinquency

    ERIC Educational Resources Information Center

    Joo, Young Ju; Lim, Kyu Yon; Cho, Sun Yoo; Jung, Bo Kyung; Choi, Se Bin

    2013-01-01

    The study aims to investigate structural relationships among teenagers' peer attachment, self-control, academic stress, internet usage time, and cyber delinquency. The data source was the Korea Youth Panel Survey, and the responses from 920 teenagers in the 12th grade provided the study data. Structural equation modeling was used for the analysis.…

  8. Brookhaven National Laboratory's capabilities for advanced analyses of cyber threats

    SciTech Connect

    DePhillips, M. P.

    2014-01-01

    BNL has several ongoing, mature, and successful programs and areas of core scientific expertise that readily could be modified to address problems facing national security and efforts by the IC related to securing our nation’s computer networks. In supporting these programs, BNL houses an expansive, scalable infrastructure built exclusively for transporting, storing, and analyzing large disparate data-sets. Our ongoing research projects on various infrastructural issues in computer science undoubtedly would be relevant to national security. Furthermore, BNL frequently partners with researchers in academia and industry worldwide to foster unique and innovative ideas for expanding research opportunities and extending our insights. Because the basic science conducted at BNL is unique, such projects have led to advanced techniques, unlike any others, to support our mission of discovery. Many of them are modular techniques, thus making them ideal for abstraction and retrofitting to other uses including those facing national security, specifically the safety of the nation’s cyber space.

  9. PeerShield: determining control and resilience criticality of collaborative cyber assets in networks

    NASA Astrophysics Data System (ADS)

    Cam, Hasan

    2012-06-01

    As attackers get more coordinated and advanced in cyber attacks, cyber assets are required to have much more resilience, control effectiveness, and collaboration in networks. Such a requirement makes it essential to take a comprehensive and objective approach for measuring the individual and relative performances of cyber security assets in network nodes. To this end, this paper presents four techniques as to how the relative importance of cyber assets can be measured more comprehensively and objectively by considering together the main variables of risk assessment (e.g., threats, vulnerabilities), multiple attributes (e.g., resilience, control, and influence), network connectivity and controllability among collaborative cyber assets in networks. In the first technique, a Bayesian network is used to include the random variables for control, recovery, and resilience attributes of nodes, in addition to the random variables of threats, vulnerabilities, and risk. The second technique shows how graph matching and coloring can be utilized to form collaborative pairs of nodes to shield together against threats and vulnerabilities. The third technique ranks the security assets of nodes by incorporating multiple weights and thresholds of attributes into a decision-making algorithm. In the fourth technique, the hierarchically well-separated tree is enhanced to first identify critical nodes of a network with respect to their attributes and network connectivity, and then selecting some nodes as driver nodes for network controllability.

  10. Impact of self-assessment by students on their learning

    PubMed Central

    Sharma, Rajeev; Jain, Amit; Gupta, Naveenta; Garg, Sonia; Batta, Meenal; Dhir, Shashi Kant

    2016-01-01

    Context: Tutor assessment is sometimes also considered as an exercise of power by the assessor over assesses. Student self-assessment is the process by which the students gather information about and reflect on their own learning and is considered to be a very important component of learning. Aim: The primary objective of this study was to analyze the impact of self-assessment by undergraduate medical students on their subsequent academic performance. The secondary objective was to obtain the perception of students and faculty about self-assessment as a tool for enhanced learning. Materials and Methods: The study was based on the evaluation of two theory tests consisting of both essay type and short answer questions, administered to students of the 1st year MBBS (n = 89). They self-assessed their performance after 3 days of the first test followed by marking of faculty and feedback. Then, a nonidentical theory test on the same topic with the same difficulty level was conducted after 7 days and assessed by the teachers. The feedback about the perception of students and faculty about this intervention was obtained. Results: Significant improvement in the academic performance after the process of self-assessment was observed (P < 0.001). There was a significantly positive correlation between student and teacher marking (r = 0.79). Both students and faculty perceived it to be helpful for developing self-directed learning skills. Conclusions: Self-assessment can increase the interest and motivation level of students for the subjects leading to enhanced learning and better academic performance, helping them in development of critical skills for analysis of their own work. PMID:27563593

  11. Business continuity strategies for cyber defence: battling time and information overload.

    PubMed

    Streufert, John

    2010-11-01

    Can the same numbers and letters which are the life blood of modern business and government computer systems be harnessed to protect computers from attack against known information security risks? For the past seven years, Foreign Service officers and technicians of the US Government have sought to maintain diplomatic operations in the face of rising cyber attacks and test the hypothesis that an ounce of prevention is worth a pound of cure. As eight out of ten attacks leverage known computer security vulnerabilities or configuration setting weaknesses, a pound of cure would seem to be easy to come by. Yet modern security tools present an unusually consequential threat to business continuity - too much rather than too little information on cyber problems is presented, harking back to a phenomenon cited by social scientists in the 1960s called 'information overload'. Experience indicates that the longer the most serious cyber problems go untreated, the wider the attack surface adversaries can find. One technique used at the Department of State, called 'risk scoring', resulted in an 89 per cent overall reduction in measured risk over 12 months for the Department of State's servers and personal computers. Later refinements of risk scoring enabled technicians to correct unique security threats with unprecedented speed. This paper explores how the use of metrics, special care in presenting information to technicians and executives alike, as well as tactical use of organisational incentives can result in stronger cyber defences protecting modern organisations.

  12. Business continuity strategies for cyber defence: battling time and information overload.

    PubMed

    Streufert, John

    2010-11-01

    Can the same numbers and letters which are the life blood of modern business and government computer systems be harnessed to protect computers from attack against known information security risks? For the past seven years, Foreign Service officers and technicians of the US Government have sought to maintain diplomatic operations in the face of rising cyber attacks and test the hypothesis that an ounce of prevention is worth a pound of cure. As eight out of ten attacks leverage known computer security vulnerabilities or configuration setting weaknesses, a pound of cure would seem to be easy to come by. Yet modern security tools present an unusually consequential threat to business continuity - too much rather than too little information on cyber problems is presented, harking back to a phenomenon cited by social scientists in the 1960s called 'information overload'. Experience indicates that the longer the most serious cyber problems go untreated, the wider the attack surface adversaries can find. One technique used at the Department of State, called 'risk scoring', resulted in an 89 per cent overall reduction in measured risk over 12 months for the Department of State's servers and personal computers. Later refinements of risk scoring enabled technicians to correct unique security threats with unprecedented speed. This paper explores how the use of metrics, special care in presenting information to technicians and executives alike, as well as tactical use of organisational incentives can result in stronger cyber defences protecting modern organisations. PMID:21177217

  13. "Making Kind Cool": Parents' Suggestions for Preventing Cyber Bullying and Fostering Cyber Kindness

    ERIC Educational Resources Information Center

    Cassidy, Wanda; Brown, Karen; Jackson, Margaret

    2012-01-01

    Cyber bullying among youth is rapidly becoming a global phenomenon, as educators, parents and policymakers grapple with trying to curtail this negative and sometimes devastating behavior. Since most cyber bullying emanates from the home computer, parents can play an important role in preventing cyber bullying and in fostering a kinder online…

  14. A Probabilistic Framework for Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    SciTech Connect

    Chatterjee, Samrat; Tipireddy, Ramakrishna; Oster, Matthew R.; Halappanavar, Mahantesh

    2015-12-28

    Quantification and propagation of uncertainties in cyber attacker payoffs is a key aspect within multiplayer, stochastic security games. These payoffs may represent penalties or rewards associated with player actions and are subject to various sources of uncertainty, including: (1) cyber-system state, (2) attacker type, (3) choice of player actions, and (4) cyber-system state transitions over time. Past research has primarily focused on representing defender beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and mathematical intervals. For cyber-systems, probability distributions may help address statistical (aleatory) uncertainties where the defender may assume inherent variability or randomness in the factors contributing to the attacker payoffs. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as generalizations of probability boxes. This paper explores the mathematical treatment of such mixed payoff uncertainties. A conditional probabilistic reasoning approach is adopted to organize the dependencies between a cyber-system’s state, attacker type, player actions, and state transitions. This also enables the application of probabilistic theories to propagate various uncertainties in the attacker payoffs. An example implementation of this probabilistic framework and resulting attacker payoff distributions are discussed. A goal of this paper is also to highlight this uncertainty quantification problem space to the cyber security research community and encourage further advancements in this area.

  15. Mentoring and Tutoring Your Students through Self-Assessment

    ERIC Educational Resources Information Center

    McDonald, Betty

    2013-01-01

    This paper describes practical procedures in mentoring/tutoring students through self-assessment (SA) to establish and maintain partnership in learning. High school teachers ("n"?=?10) allow their students ("N"?=?515: 359 males) to engage in activities that help them identify standards and/or criteria to apply to their work and…

  16. Pedagogy, Self-Assessment, and Online Discussion Groups

    ERIC Educational Resources Information Center

    Kayler, Mary; Weller, Karen

    2007-01-01

    One Master's Program, Initiatives in Educational Transformation, has integrated a computer management system (WebCT) into a learner-centered (Weimer, 2002) community of K-12 practicing teachers. Online discussions were an extension of instructional practices that supported dialogue, reflection, and self-assessment for the purpose of continuous…

  17. Approaches to Self-Assessment in Foreign Language Learning.

    ERIC Educational Resources Information Center

    Oskarsson, Mats

    This study was designed to outline possible forms of guided self-assessment in adult language learning and to suggest steps that might be taken in order to further develop methods judged to be suitable for use within the European unit/credit scheme for foreign language learning by adults. The report includes a review of relevant literature and…

  18. Do Accounting Students Believe in Self-Assessment?

    ERIC Educational Resources Information Center

    Hill, Tanya

    2016-01-01

    In education, formal assessment focuses on summative assessment with the objective of allocating grades, limiting learning by students. Formative assessment, in the form of self-assessment, has been proposed as beneficial to student learning in various fields. This study explores the perceptions of accounting students of the self-assessment…

  19. Quality Management and Self Assessment Tools for Public Libraries.

    ERIC Educational Resources Information Center

    Evans, Margaret Kinnell

    This paper describes a two-year study by the British Library Research and Innovation Centre that examined the potential of self-assessment for public library services. The approaches that formed the basis for the investigation were the Business Excellence Model, the Quality Framework, and the Democratic Approach. Core values were identified by…

  20. Trouble in Paradise: Self-Assessment and the Tao

    ERIC Educational Resources Information Center

    Pinner, Richard

    2016-01-01

    In this article I outline how and why I have established a self-assessment system for class participation scores in an English-speaking skills course at a Japanese university. I explain how my experience with one particular student, who personally admitted to having abused the system, led me to realize that elements from Yin and Yang have been…

  1. Online Self-Assessment with Feedback and Metacognitive Knowledge

    ERIC Educational Resources Information Center

    Ibabe, Izaskun; Jauregizar, Joana

    2010-01-01

    The present work describes an experience of educational innovation in a university context. Its aim was to determine the relationship between students' frequency of use of online self-assessment with feedback and their final performance on the course, taking into account both learners' motivation and perceived usefulness of these resources for…

  2. Narrative, Self-Assessment, and Reflective Learners and Teachers.

    ERIC Educational Resources Information Center

    Kramp, Mary Kay; Humphreys, W. Lee

    1992-01-01

    A classroom research project investigated whether having students tell their own stories about learning might provide a mode and a context for self-assessment of their formal work in relation to their experience and growth as learners. Two courses involving sustained reading of major segments of the Hebrew Bible/Christian Old Testament taught at…

  3. Self-Assessments: Beneficial to Both Students and Schools.

    ERIC Educational Resources Information Center

    Koeppel, Mary Sue

    1984-01-01

    Self-assessments--voluntary, take-home, self-scoring, self-evaluating diagnostic tests in basic skills--tell new students if they are academically prepared to begin course work at the postsecondary level or if they need remediation. The development and use of self-diagnostic tools at Waukesha County Technical Institute is discussed. (MLW)

  4. Student Self-Assessment in Higher Education: Alone or Plus?

    ERIC Educational Resources Information Center

    El-Koumy, Abdel Salam Abdel Khalek

    2010-01-01

    Higher education in Egypt has recently shifted towards the constructivist theory that involves students in the learning process in all of its aspects. Therefore, the need for self-assessment has grown to engage learners in constructing their own knowledge and developing their thinking skills to succeed academically and in life. In response to this…

  5. Using Self-Assessment for Personal Fitness Evaluation

    ERIC Educational Resources Information Center

    Morgan, Charles F.; Beighle, Aaron; Pangrazi, Robert P.; Pangrazi, Debra

    2004-01-01

    Assessment and evaluation of children's physical fitness should be an educational process. This process is described as the "personalized self-testing" approach. This approach is a form of self-assessment that teaches children to assess their personal level of health-related physical fitness, interpret the results, and use the information (with…

  6. Self-Assessment of Competences in Management Education

    ERIC Educational Resources Information Center

    Hernández López, Lidia; de Saá Pérez, Petra; Ballesteros Rodríguez, Jose Luis; García Almeida, Desiderio

    2015-01-01

    Purpose: The purpose of this paper is to discuss the theoretical and practical need for research into the learning conditions that influence a student's self-assessment of their competences in management education. By means of a theoretical review, the paper introduces a model that integrates various learning conditions related to a student's…

  7. A Validation Study of Early Adolescents' Pubertal Self-Assessments

    ERIC Educational Resources Information Center

    Schmitz, Katharine E.; Hovell, Melbourne F.; Nichols, Jeanne F.; Irvin, Veronica L.; Keating, Kristen; Simon, Gayle M.; Gehrman, Christine; Jones, Kenneth Lee

    2004-01-01

    This study aimed to determine whether self-assessed puberty is sufficiently reliable and valid to substitute for physician examination when feasibility of physician examination is low (e.g., behavioral research). Adolescents (convenience sample N = 178 endocrinology patients and N = 125 from educational trial; mean age 12.7 and 11.3 years,…

  8. 77 FR 28894 - Maritime Vulnerability Self-Assessment Tool

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-16

    ... Self-Assessment Risk Module (TMSARM), developed to support the United States Coast Guard's (USCG...-1933, email TSA-OSCCommunications@tsa.dhs.gov . SUPPLEMENTARY INFORMATION: On December 5, 2003 (68 FR...-Assessment Risk Module (TMSARM). The TMSARM was developed to support the USCG regulatory efforts...

  9. 77 FR 1942 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-12

    ... as new developments in systems engineering, cyber- security, knowledge management and how best to...: Committee management; request for applicants for appointment to Homeland Security Science and Technology... also advises the Under Secretary on policies, management processes, and organizational constructs...

  10. Graph anomalies in cyber communications

    SciTech Connect

    Vander Wiel, Scott A; Storlie, Curtis B; Sandine, Gary; Hagberg, Aric A; Fisk, Michael

    2011-01-11

    Enterprises monitor cyber traffic for viruses, intruders and stolen information. Detection methods look for known signatures of malicious traffic or search for anomalies with respect to a nominal reference model. Traditional anomaly detection focuses on aggregate traffic at central nodes or on user-level monitoring. More recently, however, traffic is being viewed more holistically as a dynamic communication graph. Attention to the graph nature of the traffic has expanded the types of anomalies that are being sought. We give an overview of several cyber data streams collected at Los Alamos National Laboratory and discuss current work in modeling the graph dynamics of traffic over the network. We consider global properties and local properties within the communication graph. A method for monitoring relative entropy on multiple correlated properties is discussed in detail.

  11. Combating the Insider Cyber Threat

    SciTech Connect

    Greitzer, Frank L.; Moore, Andrew P.; Cappelli, Dawn M.; Andrews, Dee H.; Carroll, Lynn; Hull, Thomas D.

    2008-01-02

    This article represents a collaboration between PNNL, CERT/CMU, and AFRL that describes needs and related efforts by these institutions to develop technologies and approaches to counter cyber threats by insiders to informatin systems. The main focus of this article is on the need for effective training on insider threat to raise staff awareness and encourage organizations to adopt a more effective approach to identifying potential risks and take proactive steps to mitigate them.

  12. An Ontology for Identifying Cyber Intrusion Induced Faults in Process Control Systems

    NASA Astrophysics Data System (ADS)

    Hieb, Jeffrey; Graham, James; Guan, Jian

    This paper presents an ontological framework that permits formal representations of process control systems, including elements of the process being controlled and the control system itself. A fault diagnosis algorithm based on the ontological model is also presented. The algorithm can identify traditional process elements as well as control system elements (e.g., IP network and SCADA protocol) as fault sources. When these elements are identified as a likely fault source, the possibility exists that the process fault is induced by a cyber intrusion. A laboratory-scale distillation column is used to illustrate the model and the algorithm. Coupled with a well-defined statistical process model, this fault diagnosis approach provides cyber security enhanced fault diagnosis information to plant operators and can help identify that a cyber attack is underway before a major process failure is experienced.

  13. Assessment of current cybersecurity practices in the public domain : cyber indications and warnings domain.

    SciTech Connect

    Hamlet, Jason R.; Keliiaa, Curtis M.

    2010-09-01

    This report assesses current public domain cyber security practices with respect to cyber indications and warnings. It describes cybersecurity industry and government activities, including cybersecurity tools, methods, practices, and international and government-wide initiatives known to be impacting current practice. Of particular note are the U.S. Government's Trusted Internet Connection (TIC) and 'Einstein' programs, which are serving to consolidate the Government's internet access points and to provide some capability to monitor and mitigate cyber attacks. Next, this report catalogs activities undertaken by various industry and government entities. In addition, it assesses the benchmarks of HPC capability and other HPC attributes that may lend themselves to assist in the solution of this problem. This report draws few conclusions, as it is intended to assess current practice in preparation for future work, however, no explicit references to HPC usage for the purpose of analyzing cyber infrastructure in near-real-time were found in the current practice. This report and a related SAND2010-4766 National Cyber Defense High Performance Computing and Analysis: Concepts, Planning and Roadmap report are intended to provoke discussion throughout a broad audience about developing a cohesive HPC centric solution to wide-area cybersecurity problems.

  14. Cyber-Bullying: The Situation in Ireland

    ERIC Educational Resources Information Center

    O'Moore, Mona

    2012-01-01

    This paper reports on the first major survey of cyber-bullying undertaken in Ireland. While preliminary results have been published they were based on a smaller and incomplete sample of 12-16 year olds living in Ireland. The preliminary results addressed the incidence level of cyber-bullying and that of the different subcategories of…

  15. Cyber-Cops: Angels on the Net.

    ERIC Educational Resources Information Center

    Educom Review, 1996

    1996-01-01

    Curtis Sliwa, founder of the Guardian Angels citizens' safety patrol, discusses the development of the Cyber Angels, an online citizens' patrol group that monitors Internet communication. Cyber Angels voluntarily look for and report any illegal activity conducted over the Internet, such as pyramid scams, transmission of stolen credit card and…

  16. Health implications of cyber-terrorism.

    PubMed

    Clem, A; Galwankar, Sagar; Buck, George

    2003-01-01

    The world is becoming ever more interconnected via the Internet, creating both benefits and disadvantages for human communities. This article examines cyber-terrorism, one of the major negative consequences of the Internet. It also examines the potential impact of cyber-terrorism on the health of populations, its possible perpetrators, and its prevention and control. PMID:15141869

  17. Emotional Problems in Traditional and Cyber Victimization

    ERIC Educational Resources Information Center

    Sjursø, Ida Risanger; Fandrem, Hildegunn; Roland, Erling

    2016-01-01

    Previous studies show an association between traditional and cyber victimization. However, there seem to be differences in how these forms of being bullied relates to emotional problems in the victims. Few studies focus on symptoms of general anxiety and depression as separate variables when comparing traditional and cyber victimization.…

  18. Health implications of cyber-terrorism.

    PubMed

    Clem, A; Galwankar, Sagar; Buck, George

    2003-01-01

    The world is becoming ever more interconnected via the Internet, creating both benefits and disadvantages for human communities. This article examines cyber-terrorism, one of the major negative consequences of the Internet. It also examines the potential impact of cyber-terrorism on the health of populations, its possible perpetrators, and its prevention and control.

  19. Cyber Victimization and Depressive Symptoms in Sexual Minority College Students

    ERIC Educational Resources Information Center

    Ramsey, Jaimi L.; DiLalla, Lisabeth F.; McCrary, Megan K.

    2016-01-01

    This study investigated the relations between sexual orientation, cyber victimization, and depressive symptoms in college students. Study aims were to determine whether sexual minority college students are at greater risk for cyber victimization and to examine whether recent cyber victimization (self-reported cyber victimization over the last…

  20. Time series modeling of system self-assessment of survival

    SciTech Connect

    Lu, H.; Kolarik, W.J.

    1999-06-01

    Self-assessment of survival for a system, subsystem or component is implemented by assessing conditional performance reliability in real-time, which includes modeling and analysis of physical performance data. This paper proposes a time series analysis approach to system self-assessment (prediction) of survival. In the approach, physical performance data are modeled in a time series. The performance forecast is based on the model developed and is converted to the reliability of system survival. In contrast to a standard regression model, a time series model, using on-line data, is suitable for the real-time performance prediction. This paper illustrates an example of time series modeling and survival assessment, regarding an excessive tool edge wear failure mode for a twist drill operation.

  1. Crisis-management and the Security in the Internet

    NASA Astrophysics Data System (ADS)

    Harada, Izumi

    This paper discusses about the crisis-management and the security in the Internet. The crime that not is so far occurs during widespread to the society of the Internet, and a big social trouble. Moreover, the problem of a new security such as a cyber war and cyber terrorism appeared, too. It is necessary to recognize such a situation, and to do both correspondences corresponding to the environmental transformation by government and the people.

  2. Self-Assessments of Health among the Elderly.

    ERIC Educational Resources Information Center

    Benedict, Annette

    Self-assessments of health are important because they appear to be good predictors of future physical health. To examine age differences in self-reports of health, the self-ratings of 149 adults (53.8 percent over 65 years of age; 46.2 percent 64 or younger; average age 57.1) were compared. Subjects were elderly participants in a community…

  3. A Self-Assessment Guide for Resident Teaching Experiences.

    PubMed

    Engle, Janet P; Franks, Amy M; Ashjian, Emily; Bingham, Angela L; Burke, John M; Erstad, Brian L; Haines, Seena L; Hilaire, Michelle L; Rager, Michelle L; Wienbar, Rebecca

    2016-06-01

    The 2015 American College of Clinical Pharmacy (ACCP) Educational Affairs Committee was charged with developing a self-assessment guide for residency programs to quantitatively and qualitatively evaluate the outcomes of resident teaching curricula. After extensively reviewing the literature, the committee developed assessment rubrics modeled after the 2013 ACCP white paper titled "Guidelines for Resident Teaching Experiences" and the revised American Society of Health-System Pharmacists (ASHP) 2014 accreditation standards for PGY1 residencies, which place greater emphasis on the teaching and learning curriculum (TLC) than the previous accreditation standards. The self-assessment guide developed by the present committee can serve as an assessment tool for both basic and expanded TLCs. It provides the criteria for program goals, mentoring, directed readings with topic discussions, teaching experiences, and assessment methodology. For an expanded TLC, the committee has provided additional guidance on developing a teaching philosophy, becoming involved in interactive seminars, expanding teaching experiences, developing courses, and serving on academic committees. All the guidelines listed in the present paper use the measures "not present," "developing," and "well developed" so that residency program directors can self-assess along the continuum and identify areas of excellence and areas for improvement. Residency program directors should consider using this new assessment tool to measure program quality and outcomes of residency teaching experiences. Results of the assessment will help residency programs focus on areas within the TLC that will potentially benefit from additional attention and possible modification.

  4. The association between cyber victimization and subsequent cyber aggression: the moderating effect of peer rejection.

    PubMed

    Wright, Michelle F; Li, Yan

    2013-05-01

    Adolescents experience various forms of strain in their lives that may contribute jointly to their engagement in cyber aggression. However, little attention has been given to this idea. To address this gap in the literature, the present longitudinal study examined the moderating influence of peer rejection on the relationship between cyber victimization at Time 1 (T1) and subsequent cyber aggression at Time 2 (T2; 6 months later) among 261 (150 girls) 6th, 7th, and 8th graders. Our findings indicated that both peer rejection and cyber victimization were related to T2 peer-nominated and self-reported cyber aggression, both relational and verbal, after controlling for gender and T1 cyber aggression. Furthermore, T1 cyber victimization was related more strongly to T2 peer-nominated and self-reported cyber aggression at higher levels of T1 peer rejection. These results extend previous findings regarding the relationship between peer rejection and face-to-face aggressive behaviors to the cyber context. In addition, our findings underscore the importance of utilizing multiple methods, such as peer-nomination and self-report, to assess cyber aggression in a school setting.

  5. Imaging spectrum of bites, stings, and their complications: self-assessment module.

    PubMed

    Roberts, Catherine C; Young, Phillip M; Bancroft, Laura W; Liu, Patrick T; Peterson, Jeffrey J

    2009-09-01

    The educational objectives for this self-assessment module are for the participant to exercise, self-assess, and improve his or her understanding of the imaging spectrum of bites, stings, and their complications.

  6. Action Recommendation for Cyber Resilience

    SciTech Connect

    Choudhury, Sutanay; Rodriguez, Luke R.; Curtis, Darren S.; Oler, Kiri J.; Nordquist, Peter L.; Chen, Pin-Yu; Ray, Indrajit

    2015-09-01

    This paper presents an unifying graph-based model for representing the infrastructure, behavior and missions of an enterprise. We describe how the model can be used to achieve resiliency against a wide class of failures and attacks. We introduce an algorithm for recommending resilience establishing actions based on dynamic updates to the models. Without loss of generality, we show the effectiveness of the algorithm for preserving latency based quality of service (QoS). Our models and the recommendation algorithms are implemented in a software framework that we seek to release as an open source framework for simulating resilient cyber systems.

  7. Cyber Dynamic Impact Modeling Engine

    SciTech Connect

    2014-07-01

    As the rate, sophistication, and potential damage of cyber attacks continue to grow, the latency of human-speed analysis and response is becoming increasingly costly. Intelligent response to detected attacks and other malicious activity requires both knowledge of the characteristics of the attack as well as how resources involved in the attack related to the mission of the organization. Cydime fills this need by estimating a key component of intrusion detection and response automation: the relationship type and strength between the target organization and the potential attacker.

  8. Cyber Dynamic Impact Modeling Engine

    2014-07-01

    As the rate, sophistication, and potential damage of cyber attacks continue to grow, the latency of human-speed analysis and response is becoming increasingly costly. Intelligent response to detected attacks and other malicious activity requires both knowledge of the characteristics of the attack as well as how resources involved in the attack related to the mission of the organization. Cydime fills this need by estimating a key component of intrusion detection and response automation: the relationshipmore » type and strength between the target organization and the potential attacker.« less

  9. Multisource evidence fusion for cyber-situation assessment

    NASA Astrophysics Data System (ADS)

    Sabata, Bikash; Ornes, Chester

    2006-04-01

    Novel methods of detecting cyber attacks on networks have been developed that are able to detect an increasing diverse variety of malicious cyber-events. However, this has only resulted in additional information burden on the network analyst. The integration of the distributed evidence from multiple sources is missing or ad-hoc at best. Only with the fusion of the multi-source evidence can we reason at a higher semantic level to detect and identify attacks and attackers. Further, integration at a higher semantic level will reduce the cognitive load on the security offcer and will make it possible for reasonable responses. This paper presents an overview of the D-Force system that uses a Bayesian Evidential Framework for fusing the multi-source evidence in a network to detect and recognize attacks. Attack hypothesis are generated as a result of evidence at the different network and host sensors. The hypotheses are verified or denied with additional evidence. Based on our initial experiments and tests the D-Force system promises to be a powerful tool in the information security offcers arsenal.

  10. Trainees' Perspectives on the Assessment and Self-Assessment of Surgical Skills

    ERIC Educational Resources Information Center

    Evans, A. W.; McKenna, C.; Oliver, M.

    2005-01-01

    Self-assessment is argued to be valuable educationally and is being advocated through policies for wider adoption within medical practice. However, students are often reluctant to self-assess and little research has examined the reasons for this. This study explored the perceptions of trainees and postgraduates on assessment and self-assessment of…

  11. The Effects of Self-Assessment among Young Learners of English

    ERIC Educational Resources Information Center

    Butler, Yuko Goto; Lee, Jiyoon

    2010-01-01

    This study examined the effectiveness of self-assessment among 254 young learners of English as a foreign language. This study looked at 6th grade students in South Korea, who were asked to perform self-assessments on a regular basis for a semester during their English classes. The students improved their ability to self-assess their performance…

  12. Restricted Authentication and Encryption for Cyber-physical Systems

    SciTech Connect

    Kirkpatrick, Michael S; Bertino, Elisa; Sheldon, Frederick T

    2009-01-01

    Cyber-physical systems (CPS) are characterized by the close linkage of computational resources and physical devices. These systems can be deployed in a number of critical infrastructure settings. As a result, the security requirements of CPS are different than traditional computing architectures. For example, critical functions must be identified and isolated from interference by other functions. Similarly, lightweight schemes may be required, as CPS can include devices with limited computing power. One approach that offers promise for CPS security is the use of lightweight, hardware-based authentication. Specifically, we consider the use of Physically Unclonable Functions (PUFs) to bind an access request to specific hardware with device-specific keys. PUFs are implemented in hardware, such as SRAM, and can be used to uniquely identify the device. This technology could be used in CPS to ensure location-based access control and encryption, both of which would be desirable for CPS implementations.

  13. Realizing situation awareness within a cyber environment

    NASA Astrophysics Data System (ADS)

    Tadda, George; Salerno, John J.; Boulware, Douglas; Hinman, Michael; Gorton, Samuel

    2006-04-01

    Situation Awareness (SA) problems all require an understanding of current activities, an ability to anticipate what may happen next, and techniques to analyze the threat or impact of current activities and predictions. These processes of SA are common regardless of the domain and can be applied to the detection of cyber attacks. This paper will describe the application of a SA framework to implementing Cyber SA, describe some metrics for measuring and evaluating systems implementing Cyber SA, and discuss ongoing work in this area. We conclude with some ideas for future activities.

  14. 48 CFR 352.239-72 - Security requirements for Federal information technology resources.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., Security Self-Assessment Guide for Information Technology Systems and FIPS 200, on an annual basis. (C) HHS... security control testing and evaluation. (d) Personal identity verification. The Contractor shall...

  15. Era of the cyberROV

    SciTech Connect

    2000-04-01

    For years the kingdom of the ultradeep has been ruled by conventional, heavy and box-like ROVs, but smaller, faster and more streamlined opponents are challenging their hegemony. Hitec's HiROV series is one of the new breed, and with the addition of its Mark II working ROV, a new era could be under way--the era of the CyberROV. The paper describes the development of the CyberROV, its functionality, client feedback, and operator feedback.

  16. Cyber situational awareness and differential hardening

    NASA Astrophysics Data System (ADS)

    Dwivedi, Anurag; Tebben, Dan

    2012-06-01

    The advent of cyber threats has created a need for a new network planning, design, architecture, operations, control, situational awareness, management, and maintenance paradigms. Primary considerations include the ability to assess cyber attack resiliency of the network, and rapidly detect, isolate, and operate during deliberate simultaneous attacks against the network nodes and links. Legacy network planning relied on automatic protection of a network in the event of a single fault or a very few simultaneous faults in mesh networks, but in the future it must be augmented to include improved network resiliency and vulnerability awareness to cyber attacks. Ability to design a resilient network requires the development of methods to define, and quantify the network resiliency to attacks, and to be able to develop new optimization strategies for maintaining operations in the midst of these newly emerging cyber threats. Ways to quantify resiliency, and its use in visualizing cyber vulnerability awareness and in identifying node or link criticality, are presented in the current work, as well as a methodology of differential network hardening based on the criticality profile of cyber network components.

  17. Multiple hypothesis tracking for the cyber domain

    NASA Astrophysics Data System (ADS)

    Schwoegler, Stefan; Blackman, Sam; Holsopple, Jared; Hirsch, Michael J.

    2011-09-01

    This paper discusses how methods used for conventional multiple hypothesis tracking (MHT) can be extended to domain-agnostic tracking of entities from non-kinematic constraints such as those imposed by cyber attacks in a potentially dense false alarm background. MHT is widely recognized as the premier method to avoid corrupting tracks with spurious data in the kinematic domain but it has not been extensively applied to other problem domains. The traditional approach is to tightly couple track maintenance (prediction, gating, filtering, probabilistic pruning, and target confirmation) with hypothesis management (clustering, incompatibility maintenance, hypothesis formation, and Nassociation pruning). However, by separating the domain specific track maintenance portion from the domain agnostic hypothesis management piece, we can begin to apply the wealth of knowledge gained from ground and air tracking solutions to the cyber (and other) domains. These realizations led to the creation of Raytheon's Multiple Hypothesis Extensible Tracking Architecture (MHETA). In this paper, we showcase MHETA for the cyber domain, plugging in a well established method, CUBRC's INFormation Engine for Real-time Decision making, (INFERD), for the association portion of the MHT. The result is a CyberMHT. We demonstrate the power of MHETA-INFERD using simulated data. Using metrics from both the tracking and cyber domains, we show that while no tracker is perfect, by applying MHETA-INFERD, advanced nonkinematic tracks can be captured in an automated way, perform better than non-MHT approaches, and decrease analyst response time to cyber threats.

  18. Cyber Victimization and Perceived Stress: Linkages to Late Adolescents' Cyber Aggression and Psychological Functioning

    ERIC Educational Resources Information Center

    Wright, Michelle F.

    2015-01-01

    The present study examined multiple sources of strain, particular cyber victimization, and perceived stress from parents, peers, and academics, in relation to late adolescents' (ages 16-18; N = 423) cyber aggression, anxiety, and depression, each assessed 1 year later (Time 2). Three-way interactions revealed that the relationship between Time 1…

  19. On a simulation study of cyber attacks on vehicle-to-infrastructure communication (V2I) in Intelligent Transportation System (ITS)

    NASA Astrophysics Data System (ADS)

    Ekedebe, Nnanna; Yu, Wei; Song, Houbing; Lu, Chao

    2015-05-01

    An intelligent transportation system (ITS) is one typical cyber-physical system (CPS) that aims to provide efficient, effective, reliable, and safe driving experiences with minimal congestion and effective traffic flow management. In order to achieve these goals, various ITS technologies need to work synergistically. Nonetheless, ITS's reliance on wireless connectivity makes it vulnerable to cyber threats. Thus, it is critical to understand the impact of cyber threats on ITS. In this paper, using real-world transportation dataset, we evaluated the consequences of cyber threats - attacks against service availability by jamming the communication channel of ITS. In this way, we can have a better understanding of the importance of ensuring adequate security respecting safety and life-critical ITS applications before full and expensive real-world deployments. Our experimental data shows that cyber threats against service availability could adversely affect traffic efficiency and safety performances evidenced by exacerbated travel time, fuel consumed, and other evaluated performance metrics as the communication network is compromised. Finally, we discuss a framework to make ITS secure and more resilient against cyber threats.

  20. Approaches for scalable modeling and emulation of cyber systems : LDRD final report.

    SciTech Connect

    Mayo, Jackson R.; Minnich, Ronald G.; Armstrong, Robert C.; Rudish, Don W.

    2009-09-01

    The goal of this research was to combine theoretical and computational approaches to better understand the potential emergent behaviors of large-scale cyber systems, such as networks of {approx} 10{sup 6} computers. The scale and sophistication of modern computer software, hardware, and deployed networked systems have significantly exceeded the computational research community's ability to understand, model, and predict current and future behaviors. This predictive understanding, however, is critical to the development of new approaches for proactively designing new systems or enhancing existing systems with robustness to current and future cyber threats, including distributed malware such as botnets. We have developed preliminary theoretical and modeling capabilities that can ultimately answer questions such as: How would we reboot the Internet if it were taken down? Can we change network protocols to make them more secure without disrupting existing Internet connectivity and traffic flow? We have begun to address these issues by developing new capabilities for understanding and modeling Internet systems at scale. Specifically, we have addressed the need for scalable network simulation by carrying out emulations of a network with {approx} 10{sup 6} virtualized operating system instances on a high-performance computing cluster - a 'virtual Internet'. We have also explored mappings between previously studied emergent behaviors of complex systems and their potential cyber counterparts. Our results provide foundational capabilities for further research toward understanding the effects of complexity in cyber systems, to allow anticipating and thwarting hackers.

  1. Addressing the Challenges of Anomaly Detection for Cyber Physical Energy Grid Systems

    SciTech Connect

    Ferragut, Erik M; Laska, Jason A; Melin, Alexander M; Czejdo, Bogdan

    2013-01-01

    The consolidation of cyber communications networks and physical control systems within the energy smart grid introduces a number of new risks. Unfortunately, these risks are largely unknown and poorly understood, yet include very high impact losses from attack and component failures. One important aspect of risk management is the detection of anomalies and changes. However, anomaly detection within cyber security remains a difficult, open problem, with special challenges in dealing with false alert rates and heterogeneous data. Furthermore, the integration of cyber and physical dynamics is often intractable. And, because of their broad scope, energy grid cyber-physical systems must be analyzed at multiple scales, from individual components, up to network level dynamics. We describe an improved approach to anomaly detection that combines three important aspects. First, system dynamics are modeled using a reduced order model for greater computational tractability. Second, a probabilistic and principled approach to anomaly detection is adopted that allows for regulation of false alerts and comparison of anomalies across heterogeneous data sources. Third, a hierarchy of aggregations are constructed to support interactive and automated analyses of anomalies at multiple scales.

  2. A Non-Intrusive Approach to Enhance Legacy Embedded Control Systems with Cyber Protection Features

    NASA Astrophysics Data System (ADS)

    Ren, Shangping; Chen, Nianen; Yu, Yue; Poirot, Pierre; Kwiat, Kevin; Tsai, Jeffrey J. P.

    Trust is cast as a continuous re-evaluation: a system’s reliability and security are scrutinized, not just prior to, but during its deployment. This approach to maintaining trust is specifically applied to distributed and embedded control systems. Unlike general purpose systems, distributed and embedded control systems, such as power grid control systems and water treatment systems, etc., generally have a 24x7 availability requirement. Hence, upgrading or adding new cyber protection features into these systems in order to sustain them when faults caused by cyber attacks occur, is often difficult to achieve and inhibits the evolution of these systems into a cyber environment. In this chapter, we present a solution for extending the capabilities of existing systems while simultaneously maintaining the stability of the current systems. An externalized survivability management scheme based on the observe-reason-modify paradigm is applied, which decomposes the cyber attack protection process into three orthogonal subtasks: observation, evaluation and protection. This architecture provides greater flexibility and has a resolvability attribute- it can utilize emerging techniques; yet requires either minimal modifications or even no modifications whatsoever to the controlled infrastructures. The approach itself is general and can be applied to a broad class of observable systems.

  3. Defining the performance gap: Conducting a self-assessment

    NASA Technical Reports Server (NTRS)

    Braymer, Susan A.; Stoner, David L.; Powell, William C.

    1992-01-01

    This paper presents two different approaches to performing self-assessments of continuous improvement activities. Case Study 1 describes the activities performed by JSC to assess the implementation of continuous improvement efforts at the NASA Center. The JSC approach included surveys administered to randomly selected NASA personnel and personal interviews with NASA and contractor management personnel. Case Study 2 describes the continuous improvement survey performed by the JSC Safety, Reliability, and Quality Assurance (SR&QA) organization. This survey consisted of a short questionnaire (50 questions) administered to all NASA and contractor SR&QA personnel. The questionnaire is based on the eight categories of the President's Award for Quality and Productivity Improvement. It is designed to objectively determine placement on the TQ benchmark and identify a roadmap for improvement.

  4. Self Assessment in Insects: Honeybee Queens Know Their Own Strength

    PubMed Central

    Hepburn, Colleen; Hepburn, H. Randall; Jin, Shui-Hua; Crewe, Robin M.; Radloff, Sarah E.; Hu, Fu-Liang; Pirk, Christian W. W.

    2008-01-01

    Contests mediate access to reproductive opportunities in almost all species of animals. An important aspect of the evolution of contests is the reduction of the costs incurred during intra-specific encounters to a minimum. However, escalated fights are commonly lethal in some species like the honeybee, Apis mellifera. By experimentally reducing honeybee queens' fighting abilities, we demonstrate that they refrain from engaging in lethal contests that typically characterize their reproductive dominance behavior and coexist peacefully within a colony. This suggests that weak queens exploit an alternative reproductive strategy and provides an explanation for rare occurrences of queen cohabitation in nature. Our results further indicate that self-assessment, but not mutual assessment of fighting ability occurs prior to and during the agonistic encounters. PMID:18183293

  5. Can self assessment of communication predict hearing loss?

    PubMed

    Vij, S; Nagarkar, A N; Jindal, P

    2007-05-01

    A total of 120 subjects with hearing loss (75 men, 45 women), within the age range 18-70 years (mean, 38 years), and 15 normal subjects were administered a modified Hindi adaptation of the 'self assessment of communication' hearing loss inventory. The study aimed to determine whether there was any correlation between subjects' average pure tone thresholds and their inventory scores. Data was analysed using the Pearson coefficient of correlation and regression analysis. A negative correlation was obtained stating that the greater the hearing loss, the lower the inventory score. An equation could also be derived for the bilateral symmetrical sensorineural hearing loss group and the bilateral symmetrical conductive hearing loss group to enable calculation of patients' average hearing loss from their inventory scores, in the absence of an audiogram. This could aid rehabilitation in cases with either type of hearing loss (in which no medical intervention was required) when pure tone audiometry is not possible.

  6. Protecting Intelligent Distributed Power Grids against Cyber Attacks

    SciTech Connect

    Dong Wei; Yan Lu; Mohsen Jafari; Paul Skare; Kenneth Rohde

    2010-12-31

    Like other industrial sectors, the electrical power industry is facing challenges involved with the increasing demand for interconnected operations and control. The electrical industry has largely been restructured due to deregulation of the electrical market and the trend of the Smart Grid. This moves new automation systems from being proprietary and closed to the current state of Information Technology (IT) being highly interconnected and open. However, while gaining all of the scale and performance benefits of IT, existing IT security challenges are acquired as well. The power grid automation network has inherent security risks due to the fact that the systems and applications for the power grid were not originally designed for the general IT environment. In this paper, we propose a conceptual layered framework for protecting power grid automation systems against cyber attacks. The following factors are taken into account: (1) integration with existing, legacy systems in a non-intrusive fashion; (2) desirable performance in terms of modularity, scalability, extendibility, and manageability; (3) alignment to the 'Roadmap to Secure Control Systems in the Energy Sector' and the future smart grid. The on-site system test of the developed prototype security system is briefly presented as well.

  7. Psychological Impact of Cyber-Bullying: Implications for School Counsellors

    ERIC Educational Resources Information Center

    Nordahl, Jennifer; Beran, Tanya; Dittrick, Crystal J.

    2013-01-01

    Cyber-bullying is a significant problem for children today. This study provides evidence of the psychological impact of cyber-bullying among victimized children ages 10 to 17 years (M = 12.48, SD = 1.79) from 23 urban schools in a western province of Canada (N = 239). Students who were cyber-bullied reported high levels of anxious,…

  8. Utilization and outcomes of Missouri Medicaid's EHR: CyberAccess.

    PubMed

    Berringer, Robert A; Smith, Jeff C; Smith, Jeffrey Charles; Brokaw, Deborah K; Oestreich, George L

    2008-11-06

    CyberAccess is MO HealthNet's web-based electronic health record solution. Our objective is to characterize the utilization of CyberAccess by physicians caring for MO HealthNet recipients. Our results demonstrate that the CyberAccess EHR solution for MO HealthNet has been a highly utilized tool in the care of its recipients.

  9. Cyber High School Students' Transition to a Traditional University

    ERIC Educational Resources Information Center

    Gracey, Dorothy M.

    2010-01-01

    This mixed-method study identifies cyber high school graduates' perceptions of the effect of a cyber high school education on successful transition to a traditional university. The study examined students' perceptions of the advantages and disadvantages their cyber education experience contributed to their academic and social transition to…

  10. Middle School Students' Perceptions of and Responses to Cyber Bullying

    ERIC Educational Resources Information Center

    Holfeld, Brett; Grabe, Mark

    2012-01-01

    This study explored the nature and extent of middle school students' (n = 665) experiences with cyber bullying. Approximately one in five students reported being cyber bullied in the past year, with 55% of those students being repeatedly victimized within the past 30 days. Female students were more likely to be involved in cyber bullying (victim,…

  11. An Analysis of Pennsylvania's Cyber Charter Schools. Issue Brief

    ERIC Educational Resources Information Center

    Jack, James; Sludden, John; Schott, Adam

    2013-01-01

    Pennsylvania's first cyber charter school opened in 1998, enrolling 44 full-time students. From this modest beginning, Pennsylvania's cyber charter sector has grown to 16 schools enrolling 35,000 students from all but one school district in the Commonwealth. Pennsylvania has one of the nation's most extensive cyber charter sectors, and six…

  12. Peripheral doses in CyberKnife radiosurgery

    SciTech Connect

    Petti, Paula L.; Chuang, Cynthia F.; Smith, Vernon; Larson, David A.

    2006-06-15

    The purpose of this work is to measure the dose outside the treatment field for conformal CyberKnife treatments, to compare the results to those obtained for similar treatments delivered with gamma knife or intensity-modulated radiation therapy (IMRT), and to investigate the sources of peripheral dose in CyberKnife radiosurgery. CyberKnife treatment plans were developed for two hypothetical lesions in an anthropomorphic phantom, one in the thorax and another in the brain, and measurements were made with LiF thermoluminescent dosimeters (TLD-100 capsules) placed within the phantom at various depths and distances from the irradiated volume. For the brain lesion, gamma knife and 6-MV IMRT treatment plans were also developed, and peripheral doses were measured at the same locations as for the CyberKnife plan. The relative contribution to the CyberKnife peripheral dose from inferior- or superior-oblique beams entering or exiting through the body, internally scattered radiation, and leakage radiation was assessed through additional experiments using the single-isocenter option of the CyberKnife treatment-planning program with different size collimators. CyberKnife peripheral doses (in cGy) ranged from 0.16 to 0.041 % ({+-}0.003%) of the delivered number of monitor units (MU) at distances between 18 and 71 cm from the field edge. These values are two to five times larger than those measured for the comparable gamma knife brain treatment, and up to a factor of four times larger those measured in the IMRT experiment. Our results indicate that the CyberKnife peripheral dose is due largely to leakage radiation, however at distances less than 40 cm from the field edge, entrance, or exit dose from inferior- or superior-oblique beams can also contribute significantly. For distances larger than 40 cm from the field edge, the CyberKnife peripheral dose is directly related to the number of MU delivered, since leakage radiation is the dominant component.

  13. Quantifying the Impact of Unavailability in Cyber-Physical Environments

    SciTech Connect

    Aissa, Anis Ben; Abercrombie, Robert K; Sheldon, Federick T.; Mili, Ali

    2014-01-01

    The Supervisory Control and Data Acquisition (SCADA) system discussed in this work manages a distributed control network for the Tunisian Electric & Gas Utility. The network is dispersed over a large geographic area that monitors and controls the flow of electricity/gas from both remote and centralized locations. The availability of the SCADA system in this context is critical to ensuring the uninterrupted delivery of energy, including safety, security, continuity of operations and revenue. Such SCADA systems are the backbone of national critical cyber-physical infrastructures. Herein, we propose adapting the Mean Failure Cost (MFC) metric for quantifying the cost of unavailability. This new metric combines the classic availability formulation with MFC. The resulting metric, so-called Econometric Availability (EA), offers a computational basis to evaluate a system in terms of the gain/loss ($/hour of operation) that affects each stakeholder due to unavailability.

  14. The cyber threat landscape: Challenges and future research directions

    NASA Astrophysics Data System (ADS)

    Gil, Santiago; Kott, Alexander; Barabási, Albert-László

    2014-07-01

    While much attention has been paid to the vulnerability of computer networks to node and link failure, there is limited systematic understanding of the factors that determine the likelihood that a node (computer) is compromised. We therefore collect threat log data in a university network to study the patterns of threat activity for individual hosts. We relate this information to the properties of each host as observed through network-wide scans, establishing associations between the network services a host is running and the kinds of threats to which it is susceptible. We propose a methodology to associate services to threats inspired by the tools used in genetics to identify statistical associations between mutations and diseases. The proposed approach allows us to determine probabilities of infection directly from observation, offering an automated high-throughput strategy to develop comprehensive metrics for cyber-security.

  15. Correlates of cyber dating abuse among teens.

    PubMed

    Zweig, Janine M; Lachman, Pamela; Yahner, Jennifer; Dank, Meredith

    2014-08-01

    Recent advancements in technology (e.g., social networking, texting) have created new ways for dating youth to relate to one another, including in abusive ways via "cyber dating abuse." Cyber dating abuse is a form of teen dating violence that overlaps with other types of abuse (e.g., psychological) but also has several unique characteristics. Given the phenomenon's limited presence in dating violence literature, we focus on identifying how experiencing cyber dating abuse relates to youths' individual behaviors and experiences (e.g., substance use, sexual activity), psychosocial adjustment, school connection, family relationships, and partner relationships. A total of 3,745 youth (52% female, 74% White) in three northeastern states participated in the survey and reported currently being in a dating relationship or having been in one during the prior year. We found that experiences of cyber dating abuse were most significantly correlated with being female, committing a greater variety of delinquent behaviors, having had sexual activity in one's lifetime, having higher levels of depressive symptoms, and having higher levels of anger/hostility. Further, cyber dating abuse appeared somewhat more strongly related to depressive symptoms and delinquency than did other forms of teen dating violence and abuse.

  16. Cyber Bullying Prevention: Intervention in Taiwan

    PubMed Central

    Lee, Ming-Shinn; Zi-Pei, Wu; Svanström, Leif; Dalal, Koustuv

    2013-01-01

    Background This study aimed to explore the effectiveness of the cyber bullying prevention WebQuest course implementation. Methodology/Findings The study adopted the quasi-experimental design with two classes made up of a total of 61 junior high school students of seventh grade. The study subjects comprised of 30 students from the experimental group and 31 students from the control group. The experimental group received eight sessions (total 360 minutes) of the teaching intervention for four consecutive weeks, while the control group did not engage in any related courses. The self-compiled questionnaire for the student’s knowledge, attitudes, and intentions toward cyber bullying prevention was adopted. Data were analysed through generalized estimating equations to understand the immediate results on the student’s knowledge, attitudes, and intentions after the intervention. The results show that the WebQuest course immediately and effectively enhanced the knowledge of cyber bullying, reduced the intentions, and retained the effects after the learning. But it produced no significant impact on the attitude toward cyber bullying. Conclusions/Significance The intervention through this pilot study was effective and positive for cyber bulling prevention. It was with small number of students. Therefore, studies with large number of students and long experimental times, in different areas and countries are warranted. PMID:23724018

  17. Correlates of cyber dating abuse among teens.

    PubMed

    Zweig, Janine M; Lachman, Pamela; Yahner, Jennifer; Dank, Meredith

    2014-08-01

    Recent advancements in technology (e.g., social networking, texting) have created new ways for dating youth to relate to one another, including in abusive ways via "cyber dating abuse." Cyber dating abuse is a form of teen dating violence that overlaps with other types of abuse (e.g., psychological) but also has several unique characteristics. Given the phenomenon's limited presence in dating violence literature, we focus on identifying how experiencing cyber dating abuse relates to youths' individual behaviors and experiences (e.g., substance use, sexual activity), psychosocial adjustment, school connection, family relationships, and partner relationships. A total of 3,745 youth (52% female, 74% White) in three northeastern states participated in the survey and reported currently being in a dating relationship or having been in one during the prior year. We found that experiences of cyber dating abuse were most significantly correlated with being female, committing a greater variety of delinquent behaviors, having had sexual activity in one's lifetime, having higher levels of depressive symptoms, and having higher levels of anger/hostility. Further, cyber dating abuse appeared somewhat more strongly related to depressive symptoms and delinquency than did other forms of teen dating violence and abuse. PMID:24198083

  18. Investigating the effectiveness of many-core network processors for high performance cyber protection systems. Part I, FY2011.

    SciTech Connect

    Wheeler, Kyle Bruce; Naegle, John Hunt; Wright, Brian J.; Benner, Robert E., Jr.; Shelburg, Jeffrey Scott; Pearson, David Benjamin; Johnson, Joshua Alan; Onunkwo, Uzoma A.; Zage, David John; Patel, Jay S.

    2011-09-01

    This report documents our first year efforts to address the use of many-core processors for high performance cyber protection. As the demands grow for higher bandwidth (beyond 1 Gbits/sec) on network connections, the need to provide faster and more efficient solution to cyber security grows. Fortunately, in recent years, the development of many-core network processors have seen increased interest. Prior working experiences with many-core processors have led us to investigate its effectiveness for cyber protection tools, with particular emphasis on high performance firewalls. Although advanced algorithms for smarter cyber protection of high-speed network traffic are being developed, these advanced analysis techniques require significantly more computational capabilities than static techniques. Moreover, many locations where cyber protections are deployed have limited power, space and cooling resources. This makes the use of traditionally large computing systems impractical for the front-end systems that process large network streams; hence, the drive for this study which could potentially yield a highly reconfigurable and rapidly scalable solution.

  19. 78 FR 14101 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-04

    ... systems engineering, cyber-security, knowledge management and how best to leverage related technologies... Technology Directorate, DHS. ACTION: Committee Management; Notice of Federal Advisory Committee Meeting... policies, management processes, and organizational constructs as needed. Agenda: Members will meet with...

  20. 78 FR 45255 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-26

    ... engineering, cyber-security, knowledge management and how best to leverage related technologies funded by... Committee Management Secretariat, General Services Administration. ADDRESSES: If you desire to submit... policies, management processes, and organizational constructs as needed. Upon request, the...

  1. Cyber surveillance for flood disasters.

    PubMed

    Lo, Shi-Wei; Wu, Jyh-Horng; Lin, Fang-Pang; Hsu, Ching-Han

    2015-01-01

    Regional heavy rainfall is usually caused by the influence of extreme weather conditions. Instant heavy rainfall often results in the flooding of rivers and the neighboring low-lying areas, which is responsible for a large number of casualties and considerable property loss. The existing precipitation forecast systems mostly focus on the analysis and forecast of large-scale areas but do not provide precise instant automatic monitoring and alert feedback for individual river areas and sections. Therefore, in this paper, we propose an easy method to automatically monitor the flood object of a specific area, based on the currently widely used remote cyber surveillance systems and image processing methods, in order to obtain instant flooding and waterlogging event feedback. The intrusion detection mode of these surveillance systems is used in this study, wherein a flood is considered a possible invasion object. Through the detection and verification of flood objects, automatic flood risk-level monitoring of specific individual river segments, as well as the automatic urban inundation detection, has become possible. The proposed method can better meet the practical needs of disaster prevention than the method of large-area forecasting. It also has several other advantages, such as flexibility in location selection, no requirement of a standard water-level ruler, and a relatively large field of view, when compared with the traditional water-level measurements using video screens. The results can offer prompt reference for appropriate disaster warning actions in small areas, making them more accurate and effective. PMID:25621609

  2. Cyber Surveillance for Flood Disasters

    PubMed Central

    Lo, Shi-Wei; Wu, Jyh-Horng; Lin, Fang-Pang; Hsu, Ching-Han

    2015-01-01

    Regional heavy rainfall is usually caused by the influence of extreme weather conditions. Instant heavy rainfall often results in the flooding of rivers and the neighboring low-lying areas, which is responsible for a large number of casualties and considerable property loss. The existing precipitation forecast systems mostly focus on the analysis and forecast of large-scale areas but do not provide precise instant automatic monitoring and alert feedback for individual river areas and sections. Therefore, in this paper, we propose an easy method to automatically monitor the flood object of a specific area, based on the currently widely used remote cyber surveillance systems and image processing methods, in order to obtain instant flooding and waterlogging event feedback. The intrusion detection mode of these surveillance systems is used in this study, wherein a flood is considered a possible invasion object. Through the detection and verification of flood objects, automatic flood risk-level monitoring of specific individual river segments, as well as the automatic urban inundation detection, has become possible. The proposed method can better meet the practical needs of disaster prevention than the method of large-area forecasting. It also has several other advantages, such as flexibility in location selection, no requirement of a standard water-level ruler, and a relatively large field of view, when compared with the traditional water-level measurements using video screens. The results can offer prompt reference for appropriate disaster warning actions in small areas, making them more accurate and effective. PMID:25621609

  3. Introduction to Cyber Technologies exercise environment

    SciTech Connect

    2014-12-17

    Exercise environment for Introduction to Cyber Technologies class. This software is essentially a collection of short scripts, configuration files, and small executables that form the exercise component of the Sandia Cyber Technologies Academy’s Introduction to Cyber Technologies class. It builds upon other open-source technologies, such as Debian Linux and minimega, to provide comprehensive Linux and networking exercises that make learning these topics exciting and fun. Sample exercises: a pre-built set of home directories the student must navigate through to learn about privilege escalation, the creation of a virtual network playground designed to teach the student about the resiliency of the Internet, and a two-hour Capture the Flag challenge for the final lesson. There are approximately thirty (30) exercises included for the students to complete as part of the course.

  4. Introduction to Cyber Technologies exercise environment

    2014-12-17

    Exercise environment for Introduction to Cyber Technologies class. This software is essentially a collection of short scripts, configuration files, and small executables that form the exercise component of the Sandia Cyber Technologies Academy’s Introduction to Cyber Technologies class. It builds upon other open-source technologies, such as Debian Linux and minimega, to provide comprehensive Linux and networking exercises that make learning these topics exciting and fun. Sample exercises: a pre-built set of home directories the studentmore » must navigate through to learn about privilege escalation, the creation of a virtual network playground designed to teach the student about the resiliency of the Internet, and a two-hour Capture the Flag challenge for the final lesson. There are approximately thirty (30) exercises included for the students to complete as part of the course.« less

  5. The European cooperative approach to securing critical information infrastructure.

    PubMed

    Purser, Steve

    2011-10-01

    This paper provides an overview of the EU approach to securing critical information infrastructure, as defined in the Action Plan contained in the Commission Communication of March 2009, entitled 'Protecting Europe from large-scale cyber-attacks and disruptions: enhancing preparedness, security and resilience' and further elaborated by the Communication of May 2011 on critical Information infrastructure protection 'Achievements and next steps: towards global cyber-security'. After explaining the need for pan-European cooperation in this area, the CIIP Action Plan is explained in detail. Finally, the current state of progress is summarised together with the proposed next steps. PMID:22130342

  6. The European cooperative approach to securing critical information infrastructure.

    PubMed

    Purser, Steve

    2011-10-01

    This paper provides an overview of the EU approach to securing critical information infrastructure, as defined in the Action Plan contained in the Commission Communication of March 2009, entitled 'Protecting Europe from large-scale cyber-attacks and disruptions: enhancing preparedness, security and resilience' and further elaborated by the Communication of May 2011 on critical Information infrastructure protection 'Achievements and next steps: towards global cyber-security'. After explaining the need for pan-European cooperation in this area, the CIIP Action Plan is explained in detail. Finally, the current state of progress is summarised together with the proposed next steps.

  7. Has cyber technology produced a new group of peer aggressors?

    PubMed

    Dempsey, Allison G; Sulkowski, Michael L; Dempsey, Jack; Storch, Eric A

    2011-05-01

    Cyber technology provides a new venue for the expression of aggression. However, whether cyber technology has produced a new group of peer aggressors or simply allowed aggressive peers new tools to victimize others is unclear. This study sampled 1,672 adolescents to assess their engagement in cyber aggression. Although "cyber," "overt," and "relational" represent distinct subtypes of aggressive behavior, our results indicate that adolescents' behaviors clustered according to their frequency-not type-of aggression. Thus cyber technology provides new tools for youth who already engage in aggressive behaviors in the physical world to victimize peers in cyberspace. PMID:21162661

  8. Control Systems Security Test Center - FY 2004 Program Summary

    SciTech Connect

    Robert E. Polk; Alen M. Snyder

    2005-04-01

    In May 2004, the US-CERT Control Systems Security Center (CSSC) was established at Idaho National Laboratory to execute assessment activities to reduce the vulnerability of the nation’s critical infrastructure control systems to terrorist attack. The CSSC implements a program to accomplish the five goals presented in the US-CERT National Strategy for Control Systems Security. This report summarizes the first year funding of startup activities and program achievements that took place in FY 2004 and early FY 2005. This document was prepared for the US-CERT Control Systems Security Center of the National Cyber Security Division of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs federal departments to identify and prioritize the critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the National Cyber Security Division to address the control system security component addressed in the National Strategy to Secure Cyberspace and the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems.

  9. No-hardware-signature cybersecurity-crypto-module: a resilient cyber defense agent

    NASA Astrophysics Data System (ADS)

    Zaghloul, A. R. M.; Zaghloul, Y. A.

    2014-06-01

    We present an optical cybersecurity-crypto-module as a resilient cyber defense agent. It has no hardware signature since it is bitstream reconfigurable, where single hardware architecture functions as any selected device of all possible ones of the same number of inputs. For a two-input digital device, a 4-digit bitstream of 0s and 1s determines which device, of a total of 16 devices, the hardware performs as. Accordingly, the hardware itself is not physically reconfigured, but its performance is. Such a defense agent allows the attack to take place, rendering it harmless. On the other hand, if the system is already infected with malware sending out information, the defense agent allows the information to go out, rendering it meaningless. The hardware architecture is immune to side attacks since such an attack would reveal information on the attack itself and not on the hardware. This cyber defense agent can be used to secure a point-to-point, point-to-multipoint, a whole network, and/or a single entity in the cyberspace. Therefore, ensuring trust between cyber resources. It can provide secure communication in an insecure network. We provide the hardware design and explain how it works. Scalability of the design is briefly discussed. (Protected by United States Patents No.: US 8,004,734; US 8,325,404; and other National Patents worldwide.)

  10. A Mathematical Framework for the Analysis of Cyber-Resilient Control Systems

    SciTech Connect

    Melin, Alexander M; Ferragut, Erik M; Laska, Jason A; Fugate, David L; Kisner, Roger

    2013-01-01

    The increasingly recognized vulnerability of industrial control systems to cyber-attacks has inspired a considerable amount of research into techniques for cyber-resilient control systems. The majority of this effort involves the application of well known information security (IT) techniques to control system networks. While these efforts are important to protect the control systems that operate critical infrastructure, they are never perfectly effective. Little research has focused on the design of closed-loop dynamics that are resilient to cyber-attack. The majority of control system protection measures are concerned with how to prevent unauthorized access and protect data integrity. We believe that the ability to analyze how an attacker can effect the closed loop dynamics of a control system configuration once they have access is just as important to the overall security of a control system. To begin to analyze this problem, consistent mathematical definitions of concepts within resilient control need to be established so that a mathematical analysis of the vulnerabilities and resiliencies of a particular control system design methodology and configuration can be made. In this paper, we propose rigorous definitions for state awareness, operational normalcy, and resiliency as they relate to control systems. We will also discuss some mathematical consequences that arise from the proposed definitions. The goal is to begin to develop a mathematical framework and testable conditions for resiliency that can be used to build a sound theoretical foundation for resilient control research.

  11. Education and the Degree of Data Security

    ERIC Educational Resources Information Center

    Spears, Phillip Dewitt

    2013-01-01

    New technology development has researchers inundated with a plethora of data security issues linked to cyber attacks and hackers' ability to transmogrify their techniques. The present research focused on the information technology managing officers' (ITMOs') level of education, size of organization, organization's industry, and effect they have on…

  12. Anatomy of a Security Operations Center

    NASA Technical Reports Server (NTRS)

    Wang, John

    2010-01-01

    Many agencies and corporations are either contemplating or in the process of building a cyber Security Operations Center (SOC). Those Agencies that have established SOCs are most likely working on major revisions or enhancements to existing capabilities. As principle developers of the NASA SOC; this Presenters' goals are to provide the GFIRST community with examples of some of the key building blocks of an Agency scale cyber Security Operations Center. This presentation viII include the inputs and outputs, the facilities or shell, as well as the internal components and the processes necessary to maintain the SOC's subsistence - in other words, the anatomy of a SOC. Details to be presented include the SOC architecture and its key components: Tier 1 Call Center, data entry, and incident triage; Tier 2 monitoring, incident handling and tracking; Tier 3 computer forensics, malware analysis, and reverse engineering; Incident Management System; Threat Management System; SOC Portal; Log Aggregation and Security Incident Management (SIM) systems; flow monitoring; IDS; etc. Specific processes and methodologies discussed include Incident States and associated Work Elements; the Incident Management Workflow Process; Cyber Threat Risk Assessment methodology; and Incident Taxonomy. The Evolution of the Cyber Security Operations Center viII be discussed; starting from reactive, to proactive, and finally to proactive. Finally, the resources necessary to establish an Agency scale SOC as well as the lessons learned in the process of standing up a SOC viII be presented.

  13. What about Me?: Individual Self-Assessment by Skill and Level of Language Instruction

    ERIC Educational Resources Information Center

    Brantmeier, Cindy; Vanderplank, Robert; Strube, Michael

    2012-01-01

    In an investigation with advanced language learners, Brantmeier [Brantmeier, C., 2006. "Advanced L2 learners and reading placement: self-assessment, computer based testing, and subsequent performance." "System" 34 (1), 15-35.] reports that self-assessment (SA) of second language (L2) reading ability, when measured with self-rated scales, is not an…

  14. Self-Assessment for Campus Information Technology Services. Professional Paper Series, #12.

    ERIC Educational Resources Information Center

    Fleit, Linda H.

    This paper is a guide to self-assessment of campus information technology services and includes an assessment questionnaire and guidelines developed by CAUSE and EDUCOM. An introduction stresses the role of self-assessment in an overall quality improvement plan. The following section argues that pressures for higher education accountability and…

  15. Imaging popliteal artery disease in young adults with claudication: self-assessment module.

    PubMed

    Chew, Felix S; Bui-Mansfield, Liem T

    2007-09-01

    The educational objectives of this self-assessment module on imaging popliteal artery disease in young adults with intermittent claudication are for the participant to exercise, self-assess, and improve his or her knowledge of the imaging and clinical features of popliteal artery entrapment syndrome, cystic adventitial disease,and masses associated with popliteal artery obstruction.

  16. Summative Self-Assessment in Higher Education: Implications of Its Counting towards the Final Mark

    ERIC Educational Resources Information Center

    Tejeiro, Ricardo A.; Gomez-Vallecillo, Jorge L.; Romero, Antonio F.; Pelegrina, Manuel; Wallace, Agustin; Emberley, Enrique

    2012-01-01

    Introduction: Our study aims at assessing the validity of summative criteria-referenced self-assessment in higher education, and in particular, if that validity varies when the professor counts self-assessment toward the final mark. Method: One hundred and twenty-two first year students from two groups in Teacher Education at the Universidad de…

  17. Self-Assessment of Gerontology Teaching Practice: A First-Step in Enhancing Student Learning

    ERIC Educational Resources Information Center

    VonDras, Dean D.

    2008-01-01

    This article discusses self-assessment of gerontology teaching practice. Through a process of self-reflection one may find insight into their teaching and, concomitantly, develop best-practices for enhancing student learning in gerontology. A self-assessment framework is presented, illuminating best-practices in the areas of the lecture-discussion…

  18. Self-assessment report for fiscal year 1995. Contract 98, Appendix F

    SciTech Connect

    1995-12-31

    This report summarizes the FY 1995 self-assessment of the Lawrence Berkeley National Laboratory. The report is divided into administrative and operational support functions as set forth in the University`s contract with the Department of Energy; functional self-assessments; and independent evaluations.

  19. Self-Assessment of Oral Communication Presentations in Food Science and Nutrition

    ERIC Educational Resources Information Center

    Reitmeier, C. A.; Vrchota, D. A.

    2009-01-01

    Self-assessment allows learners to observe, analyze, and evaluate their own performances. Self-reflection allows the student to assess his or her communication skill level and progress against a standard. Additionally, the implementation of self-assessment through carefully prepared classroom experiences enables learners to manage their own…

  20. Evaluating the Effect of Learning Style and Student Background on Self-Assessment Accuracy

    ERIC Educational Resources Information Center

    Alaoutinen, Satu

    2012-01-01

    This study evaluates a new taxonomy-based self-assessment scale and examines factors that affect assessment accuracy and course performance. The scale is based on Bloom's Revised Taxonomy and is evaluated by comparing students' self-assessment results with course performance in a programming course. Correlation has been used to reveal possible…

  1. Student Online Self-Assessment: Structuring Individual-Level Learning in a New Venture Creation Course

    ERIC Educational Resources Information Center

    Human, Sherrie E.; Clark, Thomas; Baucus, Melissa S.

    2005-01-01

    The use of self-assessment instruments to determine students' entrepreneurial characteristics represents a well-accepted practice in entrepreneurship courses, and many professors are only now beginning to embrace Web-based instruments. We describe how we use a comprehensive array of online self-assessments in an undergraduate New Venture Creation…

  2. Self-Assessment and Development Planning for Adult and Community Learning Providers.

    ERIC Educational Resources Information Center

    Kenway, Mike; Reisenberger, Anna

    This document is designed to help adult and community learning (ACL) services across the United Kingdom complete the annual self-assessment reports (SARs). The guide begins with background information on the purposes of self-assessment, the new context of ACL and the elements and format of the new SARs. The remaining four sections examine the…

  3. What Is the Basis for Self-Assessment of Comprehension When Reading Mathematical Expository Texts?

    ERIC Educational Resources Information Center

    Österholm, Magnus

    2015-01-01

    The purpose of this study was to characterize students' self-assessments when reading mathematical texts, in particular regarding what students use as a basis for evaluations of their own reading comprehension. A total of 91 students read two mathematical texts, and for each text, they performed a self-assessment of their comprehension and…

  4. Online Self-Assessment Materials: Do These Make a Difference to Student Learning?

    ERIC Educational Resources Information Center

    Peat, Mary

    2000-01-01

    Examines the use of Web-based online self-assessment in a large first-year biology class at the University of Sydney (Australia). Discusses a more student-centered focus to aid lifelong learning; collaborative learning; suitable and timely feedback; the use of Bloom's taxonomy; and student evaluations of self-assessment modules. (LRW)

  5. Self-Oriented Perfectionism and Self-Assessment as Predictors of Adolescents? Subjective Well-Being

    ERIC Educational Resources Information Center

    Çelik, Eyüp

    2014-01-01

    The aim of the present study is to examine whether subjective well-being is predicted by self-oriented perfectionism and self-assessment. The self-oriented perfectionism scale, self-assessment scale and subjective well-being scale (SWB) were administrated to a sample of voluntary 272 eight-grade students from three secondary schools in Sultangazi,…

  6. Self-Assessment of Employability Skill Outcomes among Undergraduates and Alignment with Academic Ratings

    ERIC Educational Resources Information Center

    Jackson, Denise

    2014-01-01

    Despite acknowledgement of the benefits of self-assessment in higher education, disparity between student and academic assessments, with associated trends in overrating and underrating, plagues its meaningful use, particularly as a tool for formal assessment. This study examines self-assessment of capabilities in certain employability skills in…

  7. The Calibration of Student Judgement through Self-Assessment: Disruptive Effects of Assessment Patterns

    ERIC Educational Resources Information Center

    Boud, David; Lawson, Romy; Thompson, Darrall G.

    2015-01-01

    Can extended opportunities for self-assessment over time help students develop the capacity to make better judgements about their work? Using evidence gathered through students' voluntary self-assessment of their performance with respect to assessment tasks in two different disciplines at two Australian universities, the paper focuses on the…

  8. Accuracy in Student Self-Assessment: Directions and Cautions for Research

    ERIC Educational Resources Information Center

    Brown, Gavin T. L.; Andrade, Heidi L.; Chen, Fei

    2015-01-01

    Student self-assessment is a central component of current conceptions of formative and classroom assessment. The research on self-assessment has focused on its efficacy in promoting both academic achievement and self-regulated learning, with little concern for issues of validity. Because reliability of testing is considered a sine qua non for the…

  9. A Web-Based Environment for Facilitating Reflective Self Assessment of Choral Conducting Students

    ERIC Educational Resources Information Center

    Yoo, Hyesoo

    2016-01-01

    This case study explores ten undergraduate music education students' experiences with reflective self-assessment using web-hosted materials in a choral conducting course. To provide participants with opportunities to engage in reflective self-assessment in a web-based environment, these participants were given web-hosted materials in order for…

  10. Self-Assessment Processes: The Importance of Follow-up for Success

    ERIC Educational Resources Information Center

    Tari, Juan Jose

    2010-01-01

    Purpose: The purpose of this paper is to review the literature on self-assessment processes and to identify the difficulties, benefits and success factors of the European Foundation for Quality Management self-assessment model, analysing the importance of follow-up. Design/methodology/approach: First, the paper carries out a literature review on…

  11. Self-Assessment in a Technology-Supported Environment: The Case of Grade 9 Geography

    ERIC Educational Resources Information Center

    Ross, John A.; Starling, Michelle

    2008-01-01

    We investigated the impact of self-assessment training on student achievement and on computer self-efficacy in a technology-supported learning environment (grade 9 students using Global Information Systems software). We found that self-assessment had a positive effect on student achievement, accounting for 25% of the variance across three…

  12. "I'm Less Intolerant": Reflexive Self-Assessment in Religious Education

    ERIC Educational Resources Information Center

    Fancourt, Nigel

    2010-01-01

    This article describes practitioner research which shows how self-assessment as a form of assessment for learning can be aligned with all the educational goals of religious education in England, notably the self-assessment of attitudes and values, such as tolerance and respect. The background literature on assessment for learning is described, as…

  13. Employing Self-Assessment, Journaling, and Peer Sharing to Enhance Learning from an Online Course

    ERIC Educational Resources Information Center

    Hwang, Wu-Yuin; Hsu, Jung-Lung; Shadiev, Rustam; Chang, Chia-Ling; Huang, Yueh-Min

    2015-01-01

    This study explored the use of self-assessments, journaling, and peer sharing in an online computer programming course. We conducted an experiment using a pretest-intervention-posttest design in which 64 undergraduate first-year students participated. We aimed to investigate whether self-assessment, journaling, and peer sharing can facilitate…

  14. Self-Assessment in Generalist Preservice Kindergarten Teachers' Education: Insights on Training, Ability, Environments, and Policies

    ERIC Educational Resources Information Center

    Koutsoupidou, Theano

    2010-01-01

    Self-assessment can play an important role in teachers' personal and professional development and is encouraged by educational programs worldwide. This article reports on a Greek study that aimed to investigate generalist preservice kindergarten teachers' self-assessment of their music teaching ability. One hundred participants were asked to…

  15. Drawing Students' Attention to Relevant Assessment Criteria: Effects on Self-Assessment Skills and Performance

    ERIC Educational Resources Information Center

    Fastre, Greet M. J.; van der Klink, Marcel R.; Sluijsmans, Dominique; van Merrienboer, Jeroen J. G.

    2012-01-01

    We conducted a study among students in secondary vocational education programmes in nursing and care (N = 68). The students work on learning tasks, self-assess their task performance and formulate points for improvement. We compared two groups of students on self-assessment, identification of points of improvement and perceived effort for the…

  16. 78 FR 54956 - Agency Information Collection (Open Burn Pit Registry Airborne Hazard Self-Assessment...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-06

    ... AFFAIRS Agency Information Collection (Open Burn Pit Registry Airborne Hazard Self-Assessment....rennie@va.gov . Please refer to ``OMB Control No. 2900-NEW, Open Burn Pit Registry Airborne Hazard Self-Assessment Questionnaire.'' SUPPLEMENTARY INFORMATION: Title: Open Burn Pit Registry Airborne Hazard...

  17. "Directed" Self-Assessment: Practice and Feedback within a Social Context

    ERIC Educational Resources Information Center

    Sargeant, Joan; Mann, Karen; van der Vleuten, Cees; Metsemakers, Job

    2008-01-01

    Introduction: Accurate self-assessment appears to be difficult and, some would propose, even impossible. Recent reviews suggest that peer assessment may be more accurate and that multisource feedback (MSF) may inform self-assessment. We had conducted a series of studies of family physicians in an MSF program including assessments from patients,…

  18. Use of CYBER 203 and CYBER 205 computers for three-dimensional transonic flow calculations

    NASA Astrophysics Data System (ADS)

    Melson, N. D.; Keller, J. D.

    1983-04-01

    Experiences are discussed for modifying two three-dimensional transonic flow computer programs (FLO 22 and FLO 27) for use on the CDC CYBER 203 computer system. Both programs were originally written for use on serial machines. Several methods were attempted to optimize the execution of the two programs on the vector machine: leaving the program in a scalar form (i.e., serial computation) with compiler software used to optimize and vectorize the program, vectorizing parts of the existing algorithm in the program, and incorporating a vectorizable algorithm (ZEBRA I or ZEBRA II) in the program. Comparison runs of the programs were made on CDC CYBER 175. CYBER 203, and two pipe CDC CYBER 205 computer systems.

  19. Use of CYBER 203 and CYBER 205 computers for three-dimensional transonic flow calculations

    NASA Technical Reports Server (NTRS)

    Melson, N. D.; Keller, J. D.

    1983-01-01

    Experiences are discussed for modifying two three-dimensional transonic flow computer programs (FLO 22 and FLO 27) for use on the CDC CYBER 203 computer system. Both programs were originally written for use on serial machines. Several methods were attempted to optimize the execution of the two programs on the vector machine: leaving the program in a scalar form (i.e., serial computation) with compiler software used to optimize and vectorize the program, vectorizing parts of the existing algorithm in the program, and incorporating a vectorizable algorithm (ZEBRA I or ZEBRA II) in the program. Comparison runs of the programs were made on CDC CYBER 175. CYBER 203, and two pipe CDC CYBER 205 computer systems.

  20. Relationships Between Tobacco Abuse and Self-Assessment of Health.

    PubMed

    Gawlikowska-Sroka, A; Dzięciołowska-Baran, E; Szczurowski, J

    2016-01-01

    Smoking cigarettes negatively influences the functioning of the body. Among other effects, it has an important impact on the respiratory system, circulation, and behavior. It leads to morphological and physiological changes in organs and tissues, so it can change mood. The aim of this study was to assess the relationships between tobacco abuse and self-assessment of health. The survey was conducted among Polish (243) and foreign (80) medical students at the Pomeranian Medical University in Szczecin, Poland. The study was based on a survey questionnaire of the authors' own design, comprising open and multi-choice questions. Our questionnaire was based on the international standard questionnaire from the Health Behavior in School-Aged Children study (Currie et al. 2009). 80 % of students surveyed were free of any chronic diseases. The results showed that only 23 % of the women and 20 % of the men assessed their health as very good, over 60 % as good, and the remaining at lower levels. We did not observe significant differences between smokers and non-smokers. Physical activity in both groups was generally assessed as good or sufficient. We did not observe significant differences between groups in the incidence of headache, abdominal pain, or vertigo. Significant differences were found in the intake of painkillers. PMID:26801152

  1. Self-assessment of human performance errors in nuclear operations

    SciTech Connect

    Chambliss, K.V.

    1996-12-31

    One of the most important approaches to improving nuclear safety is to have an effective self-assessment process in place, whose cornerstone is the identification and improvement of human performance errors. Experience has shown that significant events usually have had precursors of human performance errors. If these precursors are left uncorrected or not understood, the symptoms recur and result in unanticipated events of greater safety significance. The Institute of Nuclear Power Operations (INPO) has been championing the cause of promoting excellence in human performance in the nuclear industry. INPO`s report, {open_quotes}Excellence in Human Performance,{close_quotes} emphasizes the importance of several factors that play a role in human performance. They include individual, supervisory, and organizational behaviors; real-time feedback that results in specific behavior to produce safe and reliable performance; and proactive measures that remove obstacles from excellent human performance. Zack Pate, chief executive officer and president of INPO, in his report, {open_quotes}The Control Room,{close_quotes} provides an excellent discussion of serious events in the nuclear industry since 1994 and compares them with the results from a recent study by the National Transportation Safety Board of airline accidents in the 12-yr period from 1978 to 1990 to draw some common themes that relate to human performance issues in the control room.

  2. Ames Laboratory integrated safety management self-assessment report

    SciTech Connect

    1997-10-01

    The implementation of Integrated Safety Management (ISM) at Ames Laboratory began with the signing of the ISM Implementation Charter on February 24, 1997 (see Appendix A). The first step toward implementation of ISM at Ames Laboratory is the performance of a Self-Assessment (SA). In preparation for the SA, a workshop on ISM was provided to the Laboratory`s Environment, Safety, and Health (ES&H) Coordinators, Safety Review Committee members, and the Environment, Safety, Health and Assurance (ESH&A) staff. In addition, a briefing was given to the Laboratory`s Executive Council and Program Directors. Next, an SA Team was organized. The Team was composed of four Ames Laboratory and four Department of Energy-Chicago Operations Office (DOE-CH) staff members. The purpose of this SA was to determine the current status of ES&H management within Ames Laboratory, as well as to identify areas which need to be improved during ISM implementation. The SA was conducted by reviewing documents, interviewing Ames Laboratory management and staff, and performing walkthroughs of Laboratory areas. At the conclusion of this SA, Ames Laboratory management was briefed on the strengths, weaknesses, and the areas of improvement which will assist in the implementation of ISM.

  3. Novel mechanism of network protection against the new generation of cyber attacks

    NASA Astrophysics Data System (ADS)

    Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit

    2012-06-01

    A new intelligent mechanism is presented to protect networks against the new generation of cyber attacks. This mechanism integrates TCP/UDP/IP protocol stack protection and attacker/intruder deception to eliminate existing TCP/UDP/IP protocol stack vulnerabilities. It allows to detect currently undetectable, highly distributed, low-frequency attacks such as distributed denial-of-service (DDoS) attacks, coordinated attacks, botnet, and stealth network reconnaissance. The mechanism also allows insulating attacker/intruder from the network and redirecting the attack to a simulated network acting as a decoy. As a result, network security personnel gain sufficient time to defend the network and collect the attack information. The presented approach can be incorporated into wireless or wired networks that require protection against known and the new generation of cyber attacks.

  4. Resilient control of cyber-physical systems against intelligent attacker: a hierarchal stackelberg game approach

    NASA Astrophysics Data System (ADS)

    Yuan, Yuan; Sun, Fuchun; Liu, Huaping

    2016-07-01

    This paper is concerned with the resilient control under denial-of-service attack launched by the intelligent attacker. The resilient control system is modelled as a multi-stage hierarchical game with a corresponding hierarchy of decisions made at cyber and physical layer, respectively. Specifically, the interaction in the cyber layer between different security agents is modelled as a static infinite Stackelberg game, while in the underlying physical layer the full-information H∞ minimax control with package drops is modelled as a different Stackelberg game. Both games are solved sequentially, which is consistent with the actual situations. Finally, the proposed method is applied to the load frequency control of the power system, which demonstrates its effectiveness.

  5. Psychological Needs as a Predictor of Cyber Bullying: A Preliminary Report on College Students

    ERIC Educational Resources Information Center

    Dilmac, Bulent

    2009-01-01

    Recent surveys show that cyber bullying is a pervasive problem in North America. Many news stories have reported cyber bullying incidents around the world. Reports on the prevalence of cyber bullying and victimization as a result of cyber bullying increase yearly. Although we know what cyber bullying is it is important that we learn more about the…

  6. On perceptions of the effectiveness of the self-assessment process in the nuclear power industry

    NASA Astrophysics Data System (ADS)

    Riha, Raymond J.

    The organizational self-assessment process came to maturity during the Total Quality Management (TQM) movement. Although varying forms of the process had been utilized for many years, the first mature self-assessments, known as self-appraisals, were performed as a criterion for the Malcolm Baldrige National Quality Award (MBNQA). One objective of this research was to assess whether self-assessments in the nuclear industry are driven more by regulatory requirements or business expectations. If driven by regulatory requirements, this may differentiate the process from other industries. Also, recent literature indicates that the existing models for conducting self-assessment for continuous improvement may be outdated (Williams, Bertsch, Van der Wiele, Van Iwaarden and Dale, 2006). In addition, these authors believe that each industry or organization should develop their own models or adapt the existing TQM model to optimize the benefits of self-assessments. Another objective of the research presented herein was to determine whether there are standard attributes that can be applied to the performance of self-assessments in the nuclear industry. This study, through use of a survey, identified attributes of the nuclear power industry that could be used in future research to construct a standard model to optimize the investments made by the industry in the use of self-assessments. Finally, the study determined the relationships between survey characteristics (e.g., participant level in the organization, those that believe that self-assessment improves performance, and the purpose of self-assessment). Keywords: self-assessment, nuclear, continuous improvement, process attributes

  7. Pennsylvania Cyber School Funding: Follow the Money

    ERIC Educational Resources Information Center

    Carr-Chellman, Alison A.; Marsh, Rose M.

    2009-01-01

    Cyber charter schools are public charter schools which are entirely online and typically serve all grades from pre-kindergarten through 12th grade. Pennsylvania implemented widespread charter school legislation as early as 1997. This has offered a great number of Pennsylvanians options in their public schooling. One of these options has been…

  8. CyberHunt: Head Off to Antarctica.

    ERIC Educational Resources Information Center

    Kloza, Brad

    2001-01-01

    Explains how to take an elementary class on a cyber visit to the continent of Antarctica, the highest, driest, and coldest continent on earth. A student reproducible page presents eight web sites to visit in this quest as well as questions to answer about each site. Answers to the questions are included. (SM)

  9. Phase-Space Detection of Cyber Events

    SciTech Connect

    Hernandez Jimenez, Jarilyn M; Ferber, Aaron E; Prowell, Stacy J; Hively, Lee M

    2015-01-01

    Energy Delivery Systems (EDS) are a network of processes that produce, transfer and distribute energy. EDS are increasingly dependent on networked computing assets, as are many Industrial Control Systems. Consequently, cyber-attacks pose a real and pertinent threat, as evidenced by Stuxnet, Shamoon and Dragonfly. Hence, there is a critical need for novel methods to detect, prevent, and mitigate effects of such attacks. To detect cyber-attacks in EDS, we developed a framework for gathering and analyzing timing data that involves establishing a baseline execution profile and then capturing the effect of perturbations in the state from injecting various malware. The data analysis was based on nonlinear dynamics and graph theory to improve detection of anomalous events in cyber applications. The goal was the extraction of changing dynamics or anomalous activity in the underlying computer system. Takens' theorem in nonlinear dynamics allows reconstruction of topologically invariant, time-delay-embedding states from the computer data in a sufficiently high-dimensional space. The resultant dynamical states were nodes, and the state-to-state transitions were links in a mathematical graph. Alternatively, sequential tabulation of executing instructions provides the nodes with corresponding instruction-to-instruction links. Graph theorems guarantee graph-invariant measures to quantify the dynamical changes in the running applications. Results showed a successful detection of cyber events.

  10. CyberArts: Exploring Art and Technology.

    ERIC Educational Resources Information Center

    Jacobson, Linda, Ed.

    This book takes the position that CyberArts(TM) is the new frontier in creativity, where the worlds of science and art meet. Computer technologies, visual design, music and sound, education and entertainment merge to form the new artistic territory of interactive multimedia. This diverse collection of essays, articles, and commentaries…

  11. DEMO: Action Recommendation for Cyber Resilience

    SciTech Connect

    Rodriguez, Luke R.; Curtis, Darren S.; Choudhury, Sutanay; Oler, Kiri J.; Nordquist, Peter L.; Chen, Pin-Yu; Ray, Indrajit

    2015-09-01

    In this demonstration we show the usefulness of our unifying graph-based model for the representation of infrastructure, behavior, and missions of cyber enterprise in both a software simulation and on an Amazon Web Services (AWS) instance. We show the effectiveness of our recommendation algorithm for preserving various system health metrics in both cases.

  12. Cyber Savvy: Embracing Digital Safety and Civility

    ERIC Educational Resources Information Center

    Willard, Nancy

    2012-01-01

    Concerns about children's online safety have evolved from protecting them to focusing on encouraging positive social norms, transmitting effective skills, and encouraging students to be helpful allies. In fact, federal law now requires schools that receive funding to educate students about cyber safety. Nancy Willard integrates her expertise in…

  13. Self-Assessment of Individual Differences in Language Switching

    PubMed Central

    Rodriguez-Fornells, Antoni; Krämer, Ulrike M.; Lorenzo-Seva, Urbano; Festman, Julia; Münte, Thomas F.

    2012-01-01

    Language switching is omnipresent in bilingual individuals. In fact, the ability to switch languages (code switching) is a very fast, efficient, and flexible process that seems to be a fundamental aspect of bilingual language processing. In this study, we aimed to characterize psychometrically self-perceived individual differences in language switching and to create a reliable measure of this behavioral pattern by introducing a bilingual switching questionnaire. As a working hypothesis based on the previous literature about code switching, we decomposed language switching into four constructs: (i) L1 switching tendencies (the tendency to switch to L1; L1-switch); (ii) L2 switching tendencies (L2-switch); (iii) contextual switch, which indexes the frequency of switches usually triggered by a particular situation, topic, or environment; and (iv) unintended switch, which measures the lack of intention and awareness of the language switches. A total of 582 Spanish–Catalan bilingual university students were studied. Twelve items were selected (three for each construct). The correlation matrix was factor-analyzed using minimum rank factor analysis followed by oblique direct oblimin rotation. The overall proportion of common variance explained by the four extracted factors was 0.86. Finally, to assess the external validity of the individual differences scored with the new questionnaire, we evaluated the correlations between these measures and several psychometric (language proficiency) and behavioral measures related to cognitive and attentional control. The present study highlights the importance of evaluating individual differences in language switching using self-assessment instruments when studying the interface between cognitive control and bilingualism. PMID:22291668

  14. Cyber Preparedness Act of 2016

    THOMAS, 113th Congress

    Rep. Donovan, Daniel M., Jr. [R-NY-11

    2016-06-13

    09/27/2016 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  15. Homeland Security Cyber and Physical Infrastructure Protection Act of 2011

    THOMAS, 112th Congress

    Rep. Thompson, Bennie G. [D-MS-2

    2011-01-05

    02/08/2011 Referred to the Subcommittee on Technology, Information Policy, Intergovernmental Relations and Procurement Reform . (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  16. Homeland Security Cyber and Physical Infrastructure Protection Act of 2010

    THOMAS, 111th Congress

    Rep. Thompson, Bennie G. [D-MS-2

    2010-11-17

    11/23/2010 Referred to the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  17. Cyber security and data collection approaches for smartphone sensor systems

    NASA Astrophysics Data System (ADS)

    Turner, Hamilton; White, Jules

    2012-06-01

    In recent years the ubiquity and resources provided by smartphone devices have encouraged scientists to explore using these devices as remote sensing nodes. In addition, the United States Department of Defense has stated a mission of increasing persistent intelligence, surveillance, and reconnaissance capabilities or U.S. units. This paper presents a method of enabling large-scale, long-term smartphone-powered data collection. Key solutions discussed include the ability to directly allow domain experts to define and refine smartphone applications for data collection, technical advancements that allow rapid dissemination of a smartphone data collection application, and an algorithm for preserving the locational privacy of participating users.

  18. 76 FR 81477 - Announcing an Open Meeting of the Information Security and Privacy Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-28

    ... public. The ISPAB was established by the Computer Security Act of 1987 (Pub. L. 100-235) and amended by... Commerce and the Director of NIST on security and privacy issues pertaining to federal computer systems... Discussion on cyber R&D Strategy, and --Update of NIST Computer Security Division. Note that agenda items...

  19. Lowering Entry Barriers for Multidisciplinary Cyber(e)-Infrastructures

    NASA Astrophysics Data System (ADS)

    Nativi, S.

    2012-04-01

    Multidisciplinarity is more and more important to study the Earth System and address Global Changes. To achieve that, multidisciplinary cyber(e)-infrastructures are an important instrument. In the last years, several European, US and international initiatives have been started to carry out multidisciplinary infrastructures, including: the Spatial Information in the European Community (INSPIRE), the Global Monitoring for Environment and Security (GMES), the Data Observation Network for Earth (DataOne), and the Global Earth Observation System of Systems (GEOSS). The majority of these initiatives are developing service-based digital infrastructures asking scientific Communities (i.e. disciplinary Users and data Producers) to implement a set of standards for information interoperability. For scientific Communities, this has represented an entry barrier which has proved to be high, in several cases. In fact, both data Producers and Users do not seem to be willing to invest precious resources to become expert on interoperability solutions -on the contrary, they are focused on developing disciplinary and thematic capacities. Therefore, an important research topic is lowering entry barriers for joining multidisciplinary cyber(e)-Infrastructures. This presentation will introduce a new approach to achieve multidisciplinary interoperability underpinning multidisciplinary infrastructures and lowering the present entry barriers for both Users and data Producers. This is called the Brokering approach: it extends the service-based paradigm by introducing a new a Brokering layer or cloud which is in charge of managing all the interoperability complexity (e.g. data discovery, access, and use) thus easing Users' and Producers' burden. This approach was successfully experimented in the framework of several European FP7 Projects and in GEOSS.

  20. Student Reports of Bullying and Cyber-Bullying: Results from the 2007 School Crime Supplement to the National Crime Victimization Survey. Web Tables. NCES 2011-316

    ERIC Educational Resources Information Center

    DeVoe, Jill; Murphy, Christina

    2011-01-01

    These Web Tables use data from the 2007 School Crime Supplement (SCS) to the National Crime Victimization Survey (NCVS) to show the relationship between bullying and cyber-bullying victimization and other variables of interest such as the reported presence of gangs, guns, drugs, and alcohol at school; select school security measures; student…

  1. Securing the United States' power infrastructure

    SciTech Connect

    Happenny, Sean F.

    2015-08-01

    The United States’ power infrastructure is aging, underfunded, and vulnerable to cyber attack. Emerging smart grid technologies may take some of the burden off of existing systems and make the grid as a whole more efficient, reliable, and secure. The Pacific Northwest National Laboratory (PNNL) is funding research into several aspects of smart grid technology and grid security, creating a software simulation tool that will allow researchers to test power distribution networks utilizing different smart grid technologies to determine how the grid and these technologies react under different circumstances. Demonstrating security in embedded systems is another research area PNNL is tackling. Many of the systems controlling the U.S. critical infrastructure, such as the power grid, lack integrated security and the networks protecting them are becoming easier to breach. Providing a virtual power substation network to each student team at the National Collegiate Cyber Defense Competition, thereby supporting the education of future cyber security professionals, is another way PNNL is helping to strengthen the security of the nation’s power infrastructure.

  2. Evaluating first-year nursing students' ability to self-assess psychomotor skills using videotape.

    PubMed

    Watts, Wilda Ellen; Rush, Kathy; Wright, Marjorie

    2009-01-01

    Developing confidence in self-assessment is an important skill in becoming a self-regulated learner. This article describes the process undertaken by a group of educators of incorporating self-assessment in combination with psychomotor skill development with freshman students. Students were videotaped performing a wound-dressing change; the videotaping was immediately followed by a self-assessment of their performance using a faculty-generated checklist. Comparison of faculty and student ratings revealed the tendency for students to overrate their performance and identified discordance between students and faculty on several steps of the procedure. These evaluation findings are discussed and future directions explored.

  3. NASA Self-Assessment of Space Radiation Research

    NASA Technical Reports Server (NTRS)

    Cucinotta, Francis A.

    2010-01-01

    Space exploration involves unavoidable exposures to high-energy galactic cosmic rays whose penetration power and associated secondary radiation makes radiation shielding ineffective and cost prohibitive. NASA recognizing the possible health dangers from cosmic rays notified the U.S. Congress as early as 1959 of the need for a dedicated heavy ion accelerator to study the largely unknown biological effects of galactic cosmic rays on astronauts. Information and scientific tools to study radiation health effects expanded over the new decades as NASA exploration programs to the moon and preparations for Mars exploration were carried out. In the 1970 s through the early 1990 s a more than 3-fold increase over earlier estimates of fatal cancer risks from gamma-rays, and new knowledge of the biological dangers of high LET radiation were obtained. Other research has increased concern for degenerative risks to the central nervous system and other tissues at lower doses compared to earlier estimates. In 1996 a review by the National Academy of Sciences Space Science Board re-iterated the need for a dedicated ground-based accelerator facility capable of providing up to 2000 research hours per year to reduce uncertainties in risks projections and develop effective mitigation measures. In 1998 NASA appropriated funds for construction of a dedicated research facility and the NASA Space Radiation Laboratory (NSRL) opened for research in October of 2003. This year marks the 8th year of NSRL research were about 1000 research hours per year have been utilized. In anticipation of the approaching ten year milestone, funded investigators and selected others are invited to participate in a critical self-assessment of NSRL research progress towards NASA s goals in space radiation research. A Blue and Red Team Assessment format has been integrated into meeting posters and special plenary sessions to allow for a critical debate on the progress of the research and major gaps areas. Blue

  4. Normative beliefs about aggression and cyber aggression among young adults: a longitudinal investigation.

    PubMed

    Wright, Michelle F; Li, Yan

    2013-01-01

    This longitudinal study examined normative beliefs about aggression (e.g., face-to-face, cyber) in relation to the engagement in cyber aggression 6 months later among 126 (69 women) young adults. Participants completed electronically administered measures assessing their normative beliefs, face-to-face and cyber aggression at Time 1, and cyber aggression 6 months later (Time 2). We found that men reported more cyber relational and verbal aggression when compared to women. After controlling for each other, Time 1 face-to-face relational aggression was positively related to Time 2 cyber relational aggression, whereas Time 1 face-to-face verbal aggression was positively related to Time 2 cyber verbal aggression. Normative beliefs regarding cyber aggression was positively related to both forms of cyber aggression 6 months later, after controlling for normative beliefs about face-to-face aggression. Furthermore, a significant two-way interaction between Time 1 cyber relational aggression and normative beliefs about cyber relational aggression was found. Follow-up analysis showed that Time 1 cyber relational aggression was more strongly related to Time 2 cyber relational aggression when young adults held higher normative beliefs about cyber relational aggression. A similar two-way interaction was found for cyber verbal aggression such that the association between Time 1 and Time 2 cyber verbal aggression was stronger at higher levels of normative beliefs about cyber verbal aggression. Results are discussed in terms of the social cognitive and behavioral mechanisms associated with the engagement of cyber aggression.

  5. Normative beliefs about aggression and cyber aggression among young adults: a longitudinal investigation.

    PubMed

    Wright, Michelle F; Li, Yan

    2013-01-01

    This longitudinal study examined normative beliefs about aggression (e.g., face-to-face, cyber) in relation to the engagement in cyber aggression 6 months later among 126 (69 women) young adults. Participants completed electronically administered measures assessing their normative beliefs, face-to-face and cyber aggression at Time 1, and cyber aggression 6 months later (Time 2). We found that men reported more cyber relational and verbal aggression when compared to women. After controlling for each other, Time 1 face-to-face relational aggression was positively related to Time 2 cyber relational aggression, whereas Time 1 face-to-face verbal aggression was positively related to Time 2 cyber verbal aggression. Normative beliefs regarding cyber aggression was positively related to both forms of cyber aggression 6 months later, after controlling for normative beliefs about face-to-face aggression. Furthermore, a significant two-way interaction between Time 1 cyber relational aggression and normative beliefs about cyber relational aggression was found. Follow-up analysis showed that Time 1 cyber relational aggression was more strongly related to Time 2 cyber relational aggression when young adults held higher normative beliefs about cyber relational aggression. A similar two-way interaction was found for cyber verbal aggression such that the association between Time 1 and Time 2 cyber verbal aggression was stronger at higher levels of normative beliefs about cyber verbal aggression. Results are discussed in terms of the social cognitive and behavioral mechanisms associated with the engagement of cyber aggression. PMID:23440595

  6. National cyber defense high performance computing and analysis : concepts, planning and roadmap.

    SciTech Connect

    Hamlet, Jason R.; Keliiaa, Curtis M.

    2010-09-01

    There is a national cyber dilemma that threatens the very fabric of government, commercial and private use operations worldwide. Much is written about 'what' the problem is, and though the basis for this paper is an assessment of the problem space, we target the 'how' solution space of the wide-area national information infrastructure through the advancement of science, technology, evaluation and analysis with actionable results intended to produce a more secure national information infrastructure and a comprehensive national cyber defense capability. This cybersecurity High Performance Computing (HPC) analysis concepts, planning and roadmap activity was conducted as an assessment of cybersecurity analysis as a fertile area of research and investment for high value cybersecurity wide-area solutions. This report and a related SAND2010-4765 Assessment of Current Cybersecurity Practices in the Public Domain: Cyber Indications and Warnings Domain report are intended to provoke discussion throughout a broad audience about developing a cohesive HPC centric solution to wide-area cybersecurity problems.

  7. Data-Aware Retrodiction for Asynchronous Harmonic Measurement in a Cyber-Physical Energy System.

    PubMed

    Liu, Youda; Wang, Xue; Liu, Yanchi; Cui, Sujin

    2016-08-18

    Cyber-physical energy systems provide a networked solution for safety, reliability and efficiency problems in smart grids. On the demand side, the secure and trustworthy energy supply requires real-time supervising and online power quality assessing. Harmonics measurement is necessary in power quality evaluation. However, under the large-scale distributed metering architecture, harmonic measurement faces the out-of-sequence measurement (OOSM) problem, which is the result of latencies in sensing or the communication process and brings deviations in data fusion. This paper depicts a distributed measurement network for large-scale asynchronous harmonic analysis and exploits a nonlinear autoregressive model with exogenous inputs (NARX) network to reorder the out-of-sequence measuring data. The NARX network gets the characteristics of the electrical harmonics from practical data rather than the kinematic equations. Thus, the data-aware network approximates the behavior of the practical electrical parameter with real-time data and improves the retrodiction accuracy. Theoretical analysis demonstrates that the data-aware method maintains a reasonable consumption of computing resources. Experiments on a practical testbed of a cyber-physical system are implemented, and harmonic measurement and analysis accuracy are adopted to evaluate the measuring mechanism under a distributed metering network. Results demonstrate an improvement of the harmonics analysis precision and validate the asynchronous measuring method in cyber-physical energy systems.

  8. Data-Aware Retrodiction for Asynchronous Harmonic Measurement in a Cyber-Physical Energy System.

    PubMed

    Liu, Youda; Wang, Xue; Liu, Yanchi; Cui, Sujin

    2016-01-01

    Cyber-physical energy systems provide a networked solution for safety, reliability and efficiency problems in smart grids. On the demand side, the secure and trustworthy energy supply requires real-time supervising and online power quality assessing. Harmonics measurement is necessary in power quality evaluation. However, under the large-scale distributed metering architecture, harmonic measurement faces the out-of-sequence measurement (OOSM) problem, which is the result of latencies in sensing or the communication process and brings deviations in data fusion. This paper depicts a distributed measurement network for large-scale asynchronous harmonic analysis and exploits a nonlinear autoregressive model with exogenous inputs (NARX) network to reorder the out-of-sequence measuring data. The NARX network gets the characteristics of the electrical harmonics from practical data rather than the kinematic equations. Thus, the data-aware network approximates the behavior of the practical electrical parameter with real-time data and improves the retrodiction accuracy. Theoretical analysis demonstrates that the data-aware method maintains a reasonable consumption of computing resources. Experiments on a practical testbed of a cyber-physical system are implemented, and harmonic measurement and analysis accuracy are adopted to evaluate the measuring mechanism under a distributed metering network. Results demonstrate an improvement of the harmonics analysis precision and validate the asynchronous measuring method in cyber-physical energy systems. PMID:27548171

  9. Data-Aware Retrodiction for Asynchronous Harmonic Measurement in a Cyber-Physical Energy System

    PubMed Central

    Liu, Youda; Wang, Xue; Liu, Yanchi; Cui, Sujin

    2016-01-01

    Cyber-physical energy systems provide a networked solution for safety, reliability and efficiency problems in smart grids. On the demand side, the secure and trustworthy energy supply requires real-time supervising and online power quality assessing. Harmonics measurement is necessary in power quality evaluation. However, under the large-scale distributed metering architecture, harmonic measurement faces the out-of-sequence measurement (OOSM) problem, which is the result of latencies in sensing or the communication process and brings deviations in data fusion. This paper depicts a distributed measurement network for large-scale asynchronous harmonic analysis and exploits a nonlinear autoregressive model with exogenous inputs (NARX) network to reorder the out-of-sequence measuring data. The NARX network gets the characteristics of the electrical harmonics from practical data rather than the kinematic equations. Thus, the data-aware network approximates the behavior of the practical electrical parameter with real-time data and improves the retrodiction accuracy. Theoretical analysis demonstrates that the data-aware method maintains a reasonable consumption of computing resources. Experiments on a practical testbed of a cyber-physical system are implemented, and harmonic measurement and analysis accuracy are adopted to evaluate the measuring mechanism under a distributed metering network. Results demonstrate an improvement of the harmonics analysis precision and validate the asynchronous measuring method in cyber-physical energy systems. PMID:27548171

  10. Identification and Ranking of Critical Assets within an Electrical Grid under Threat of Cyber Attack

    NASA Astrophysics Data System (ADS)

    Boyer, Blake R.

    This paper examines the ranking of critical assets within an electrical grid under threat of cyber attack.1 Critical to this analysis is the assumption of zero hour exploits namely, the threat of an immediate attack as soon as a vulnerability is discovered. Modeling shows that over time load fluctuations as well as other system variations will change the importance of each asset in the delivery of bulk power. As opposed to classic stability studies where risk can be shown to be greatest during high load periods, the zero hour exploit-cyber-risk assumes that vulnerabilities will be attacked as soon as they are discovered. The probability of attacks is made uniform over time to include any and all possible attacks. Examining the impact of an attack and how the grid reacts immediately following an attack will identify and determine the criticality of each asset. This work endeavors to fulfill the NERC Critical Infrastructure Protection Requirements CIP-001-1 through CIP-009-2, cyber security requirements for the reliable supply of bulk power to customers throughout North America. 1Critical assets will here refer to facilities, systems, and equipment, which, if destroyed, degraded, or otherwise rendered unavailable, would affect the reliability or operability of the Bulk Electric System, NERC Glossary of Terms Used in Reliability Standards, 2009

  11. SuperIdentity: Fusion of Identity across Real and Cyber Domains

    SciTech Connect

    Black, Sue; Creese, Sadie; Guest, Richard; Pike, William A.; Saxby, Steven; Stanton Fraser, Danae; Stevenage, Sarah; Whitty, Monica

    2012-04-23

    Under both benign and malign circumstances, people now manage a spectrum of identities across both real-world and cyber domains. Our belief, however, is that all these instances ultimately track back for an individual to reflect a single 'SuperIdentity'. This paper outlines the assumptions underpinning the SuperIdentity Project, describing the innovative use of data fusion to incorporate novel real-world and cyber cues into a rich framework appropriate for modern identity. The proposed combinatorial model will support a robust identification or authentication decision, with confidence indexed both by the level of trust in data provenance, and the diagnosticity of the identity factors being used. Additionally, the exploration of correlations between factors may underpin the more intelligent use of identity information so that known information may be used to predict previously hidden information. With modern living supporting the 'distribution of identity' across real and cyber domains, and with criminal elements operating in increasingly sophisticated ways in the hinterland between the two, this approach is suggested as a way forwards, and is discussed in terms of its impact on privacy, security, and the detection of threat.

  12. Increasing Student Metacognition and Learning through Classroom-Based Learning Communities and Self-Assessment

    PubMed Central

    Siegesmund, Amy

    2016-01-01

    Student overconfidence challenges success in introductory biology. This study examined the impact of classroom learning communities and self-assessment on student metacognition and subsequent impact on student epistemological beliefs, behaviors, and learning. Students wrote weekly self-assessments reflecting on the process of learning and received individual feedback. Students completed a learning strategies inventory focused on metacognition and study behaviors at the beginning and end of the semester and a Student Assessment of their Learning Gains (SALG) at the end of the semester. Results indicated significant changes in both metacognition and study behaviors over the course of the semester, with a positive impact on learning as determined by broad and singular measures. Self-assessments and SALG data demonstrated a change in student beliefs and behaviors. Taken together, these findings argue that classroom learning communities and self-assessment can increase student metacognition and change student epistemological beliefs and behaviors. PMID:27158301

  13. Increasing Student Metacognition and Learning through Classroom-Based Learning Communities and Self-Assessment.

    PubMed

    Siegesmund, Amy

    2016-05-01

    Student overconfidence challenges success in introductory biology. This study examined the impact of classroom learning communities and self-assessment on student metacognition and subsequent impact on student epistemological beliefs, behaviors, and learning. Students wrote weekly self-assessments reflecting on the process of learning and received individual feedback. Students completed a learning strategies inventory focused on metacognition and study behaviors at the beginning and end of the semester and a Student Assessment of their Learning Gains (SALG) at the end of the semester. Results indicated significant changes in both metacognition and study behaviors over the course of the semester, with a positive impact on learning as determined by broad and singular measures. Self-assessments and SALG data demonstrated a change in student beliefs and behaviors. Taken together, these findings argue that classroom learning communities and self-assessment can increase student metacognition and change student epistemological beliefs and behaviors.

  14. Comparison of student self-assessment with faculty assessment of clinical competence.

    PubMed

    Root Kustritz, Margaret V; Molgaard, Laura K; Rendahl, Aaron

    2011-01-01

    At the University of Minnesota, fourth-year veterinary students assessed their clinical competence after completion of a small-animal, internal-medicine clinical rotation using the same rotation assessment form used by supervising faculty. Grades were compared between the two groups. Students identified by faculty as low-performing were more likely to overestimate their competence in the areas of knowledge, clinical skill, and professionalism than were students identified by faculty as higher performing. This finding mirrors research results in human health professional training. Self-assessment should not be used as the primary or sole measure of clinical competence in veterinary medical training without the introduction of measures to ensure the accuracy of student self-assessment, measures that include active faculty mentoring of student self-assessment, student goal-setting and reflection, and availability of subsequent opportunities to practice additional self-assessment.

  15. Attitudes Toward Patient Management Problems as a Self-Assessment Technique in Dermatology

    ERIC Educational Resources Information Center

    Ramsay, David L.; And Others

    1977-01-01

    Patient management problems were found to be favorable methods of self-assessment by an overwhelming majority of practicing dermatologists and those in training, regardless of the type of practice or the number of years in practice. (LBH)

  16. A Systematic Review of the Use of Self-Assessment in Preclinical and Clinical Dental Education.

    PubMed

    Mays, Keith A; Branch-Mays, Grishondra L

    2016-08-01

    A desired outcome of dental and dental hygiene programs is the development of students' self-assessment skills. To that end, the Commission on Dental Accreditation states that "graduates must demonstrate the ability to self-assess." However, it is unclear that merely providing opportunity for self-assessment actually leads to the desired outcome. The aim of this study was to systematically review the literature on self-assessment in dental education. A search of English-language articles for the past 25 years (January 1, 1990, to June 30, 2015) was performed using MEDLINE Medical Subject Heading terms. Each abstract and/or article was validated for inclusion. The data collected included student classification, self-assessment environment, faculty assessment, training, faculty calibration, predictive value, and student perceptions. A qualitative analysis was also performed. From an initial list of 258 articles, 19 were selected for inclusion; exclusion criteria included studies that evaluated a non-preclinical or non-clinical exercise or whose subjects were not predoctoral dental or dental hygiene students. The results showed limited information regarding any kind of systematic training of students on how to perform a self-assessment. The majority of the studies also did not specify the impact of self-assessment on student performance. Self-assessment was primarily performed in the second year and in the preclinical environment. Students received feedback through a correlated faculty assessment in 73% of the studies, but 64% did not provide information regarding students' perceptions of self-assessment. There was a trend for students to be better self-assessors in studies in which a grade was connected to the process. In addition, there was a trend for better performing students to underrate themselves and for poorer performing students to overrate themselves and, overall, for students to score themselves higher than did their faculty evaluators. These findings

  17. Oxford CyberSEM: remote microscopy

    NASA Astrophysics Data System (ADS)

    Rahman, M.; Kirkland, A.; Cockayne, D.; Meyer, R.

    2008-08-01

    The Internet has enabled researchers to communicate over vast geographical distances, sharing ideas and documents. e-Science, underpinned by Grid [1] and Web Services, has enabled electronic communications to the next level where, in addition to document sharing, researchers can increasingly control high precision scientific instruments over the network. The Oxford CyberSEM project developed a simple Java applet via which samples placed in a JEOL 5510LV Scanning Electron Microscope (SEM) can be manipulated and examined collaboratively over the Internet. Designed with schoolchildren in mind, CyberSEM does not require any additional hardware or software other than a generic Java-enabled web browser. This paper reflects on both the technical and social challenges in designing real-time systems for controlling scientific equipments in collaborative environments. Furthermore, it proposes potential deployment beyond the classroom setting.

  18. Cyber warfare and electronic warfare integration in the operational environment of the future: cyber electronic warfare

    NASA Astrophysics Data System (ADS)

    Askin, Osman; Irmak, Riza; Avsever, Mustafa

    2015-05-01

    For the states with advanced technology, effective use of electronic warfare and cyber warfare will be the main determining factor of winning a war in the future's operational environment. The developed states will be able to finalize the struggles they have entered with a minimum of human casualties and minimum cost thanks to high-tech. Considering the increasing number of world economic problems, the development of human rights and humanitarian law it is easy to understand the importance of minimum cost and minimum loss of human. In this paper, cyber warfare and electronic warfare concepts are examined in conjunction with the historical development and the relationship between them is explained. Finally, assessments were carried out about the use of cyber electronic warfare in the coming years.

  19. Cyber anthropology or anthropology in cyberspace.

    PubMed

    Svilicić, Niksa

    2012-03-01

    As a variety of anthropology, cyber anthropology is considered to be the fastest growing sub branch in the science. It is based on synergic effects of multimedia systems and hypermedia, using their comparative advantages. One of the least researched fields of cyber anthropology is the relationship of individuals and social groups with a multimedia document in terms of their perception of such subject. This is because the foundation of social-informatics perception in the society is created based on the evidence of a real life, whereas here the perception is established at the level of virtual, i.e. online life. The rhetorical question here is whether an identical content causes the same or different user reactions, depending on whether it was perceived offline or online, i.e. to what extend does the medium (and not the information content) dictate the user perception. In this respect the research titled "Perception of online museum content creators and actual habits of Croatian online museum visitors" can be a "case study" for the impact of "cyber potential" on the classic anthropological paradigm.

  20. Cyber anthropology or anthropology in cyberspace.

    PubMed

    Svilicić, Niksa

    2012-03-01

    As a variety of anthropology, cyber anthropology is considered to be the fastest growing sub branch in the science. It is based on synergic effects of multimedia systems and hypermedia, using their comparative advantages. One of the least researched fields of cyber anthropology is the relationship of individuals and social groups with a multimedia document in terms of their perception of such subject. This is because the foundation of social-informatics perception in the society is created based on the evidence of a real life, whereas here the perception is established at the level of virtual, i.e. online life. The rhetorical question here is whether an identical content causes the same or different user reactions, depending on whether it was perceived offline or online, i.e. to what extend does the medium (and not the information content) dictate the user perception. In this respect the research titled "Perception of online museum content creators and actual habits of Croatian online museum visitors" can be a "case study" for the impact of "cyber potential" on the classic anthropological paradigm. PMID:22816231

  1. Effectiveness and sustainability of the ViSC Social Competence Program to prevent cyberbullying and cyber-victimization: Class and individual level moderators.

    PubMed

    Gradinger, Petra; Yanagida, Takuya; Strohmeier, Dagmar; Spiel, Christiane

    2016-01-01

    We investigated whether the general anti-bullying program ViSC sustainably prevents cyberbullying and cyber-victimization. A longitudinal randomized control group design was used to examine (i) program effectiveness immediately after a 1 year implementation phase and (ii) sustainable program effects 6 months later taking several moderators on the class level (class climate and ethnic diversity) and on the individual level (gender, age, internet usage, traditional bullying/victimization) into account. Effectiveness (e.g., the change between waves 2 and 1) was examined in 2,042 students (47.6% girls), aged 11.7 years (SD = 0.88) enrolled in 18 schools and 103 classes. Sustainability (e.g., the change between waves 3 and 2) was examined in a sub-sample of 6 schools and 35 classes comprising 659 students. The self-assessment multiple-item scales showed longitudinal and multiple group invariance. Factor scores were extracted to compute difference scores for effectiveness (Posttest minus Pretest) and sustainability (Follow-up test minus Posttest) for cyberbullying and cyber-victimization. Multilevel Modeling was applied to examine (i) the effectiveness and (ii) the sustainability of the ViSC intervention controlling for several individual and class level variables. Controlling for covariates, it was demonstrated that the ViSC program is effective in preventing cyberbullying and cyber-victimization and that the effects are sustainable after 6 months. The consequences for cyberbullying prevention are discussed. PMID:26879896

  2. Effectiveness and sustainability of the ViSC Social Competence Program to prevent cyberbullying and cyber-victimization: Class and individual level moderators.

    PubMed

    Gradinger, Petra; Yanagida, Takuya; Strohmeier, Dagmar; Spiel, Christiane

    2016-01-01

    We investigated whether the general anti-bullying program ViSC sustainably prevents cyberbullying and cyber-victimization. A longitudinal randomized control group design was used to examine (i) program effectiveness immediately after a 1 year implementation phase and (ii) sustainable program effects 6 months later taking several moderators on the class level (class climate and ethnic diversity) and on the individual level (gender, age, internet usage, traditional bullying/victimization) into account. Effectiveness (e.g., the change between waves 2 and 1) was examined in 2,042 students (47.6% girls), aged 11.7 years (SD = 0.88) enrolled in 18 schools and 103 classes. Sustainability (e.g., the change between waves 3 and 2) was examined in a sub-sample of 6 schools and 35 classes comprising 659 students. The self-assessment multiple-item scales showed longitudinal and multiple group invariance. Factor scores were extracted to compute difference scores for effectiveness (Posttest minus Pretest) and sustainability (Follow-up test minus Posttest) for cyberbullying and cyber-victimization. Multilevel Modeling was applied to examine (i) the effectiveness and (ii) the sustainability of the ViSC intervention controlling for several individual and class level variables. Controlling for covariates, it was demonstrated that the ViSC program is effective in preventing cyberbullying and cyber-victimization and that the effects are sustainable after 6 months. The consequences for cyberbullying prevention are discussed.

  3. Adolescents and Cyber Bullying: The Precaution Adoption Process Model

    ERIC Educational Resources Information Center

    Chapin, John

    2016-01-01

    A survey of adolescents (N = 1,488) documented Facebook use and experience with cyber bullying. The study found that 84% of adolescents (middle school through college undergraduates) use Facebook, and that most users log on daily. While 30% of the sample reported being cyber bullied, only 12.5% quit using the site, and only 18% told a parent or…

  4. Hurtful Cyber-Teasing and Violence: Who's Laughing out Loud?

    ERIC Educational Resources Information Center

    Madlock, Paul E.; Westerman, David

    2011-01-01

    The current study sought to specifically examine the affect of teasing by way of technology (cyber-teasing) and the importance of the redressive component of a tease. A triangulated approach was used here to gain better insight into the concept of "hurtful" cyber-teasing between romantic partners. A pretheoretical model was developed highlighting…

  5. Cyber Charter Schools: Can Accountability Keep Pace with Innovation?

    ERIC Educational Resources Information Center

    Huerta, Luis A.; d'Entremont, Chad; Gonzalez, Maria-Fernanda

    2006-01-01

    The rapid growth of charter schools has encouraged innovation and led to new models of schooling. Foremost among these are cyber charter schools where students learn from computer-based lessons beyond the walls of the traditional schoolhouse setting. The authors present the case of cyber charter schools in Pennsylvania. They describe how cyber…

  6. Cyber Bullying @ Schools: What Do Turkish Adolescents Think?

    ERIC Educational Resources Information Center

    Topcu, Cigdem; Yildirim, Ali; Erdur-Baker, Ozgur

    2013-01-01

    Cyber bullying is an emerging form of peer bullying, becoming prominent especially over the past decade. The aim of this study was to investigate through interviews the perceptions of Turkish high school students about cyber bullying. The sample consisted of six male and one female high school students all aged 15 years who identified as being…

  7. Cyber Bullying in ADHD and Asperger Syndrome Populations

    ERIC Educational Resources Information Center

    Kowalski, Robin M.; Fedina, Cristin

    2011-01-01

    Cyber bullying or electronic bullying refers to bullying that occurs through the Internet or cellular phones. With the rise of technology, researchers have shown a keen interest in the topic of cyber bullying. However, that interest has not extended to individuals with special needs. To address this gap in the literature, the current study…

  8. Exploring the divergence between self-assessment and self-monitoring.

    PubMed

    Eva, Kevin W; Regehr, Glenn

    2011-08-01

    Many models of professional self-regulation call upon individual practitioners to take responsibility both for identifying the limits of their own skills and for redressing their identified limits through continuing professional development activities. Despite these expectations, a considerable literature in the domain of self-assessment has questioned the ability of the self-regulating professional to enact this process effectively. In response, authors have recently suggested that the construction of self-assessment as represented in the self-regulation literature is, itself, problematic. In this paper we report a pair of studies that examine the relationship between self-assessment (a global judgment of one's ability in a particular domain) and self-monitoring (a moment-by-moment awareness of the likelihood that one maintains the skill/knowledge to act in a particular situation). These studies reveal that, despite poor correlations between performance and self-assessments (consistent with what is typically seen in the self-assessment literature), participant performance was strongly related to several measures of self-monitoring including: the decision to answer or defer responding to a question, the amount of time required to make that decision to answer or defer, and the confidence expressed in an answer when provided. This apparent divergence between poor overall self-assessment and effective self-monitoring is considered in terms of how the findings might inform our understanding of the cognitive mechanisms yielding both self-monitoring judgments and self-assessments and how that understanding might be used to better direct education and learning efforts.

  9. Cyber Bullying: Overview and Strategies for School Counsellors, Guidance Officers, and All School Personnel

    ERIC Educational Resources Information Center

    Bhat, Christine Suniti

    2008-01-01

    Cyber bullying or bullying via information and communications technology tools such as the internet and mobile phones is a problem of growing concern with school-aged students. Cyber bullying actions may not take place on school premises, but detrimental effects are experienced by victims of cyber bullying in schools. Tools used by cyber bullies…

  10. Hurtful cyber-teasing and violence: who's laughing out loud?

    PubMed

    Madlock, Paul E; Westerman, David

    2011-11-01

    The current study sought to specifically examine the affect of teasing by way of technology (cyber-teasing) and the importance of the redressive component of a tease. A triangulated approach was used here to gain better insight into the concept of "hurtful" cyber-teasing between romantic partners. A pretheoretical model was developed highlighting the possible associations between teasing via technology and relational outcomes. Findings provide researchers with the prevalence of hurtful cyber-teasing and the associated personal and relational outcomes. In addition, the relationship between hurtful cyber-teasing and the reasons why certain messages escalated into face-to-face verbal aggression and physical violence were also revealed. These results are discussed in light of the inability of technology to fully transmit the redressive nonverbal component of a cyber-tease.

  11. ABEL description and implementation of cyber net system

    NASA Astrophysics Data System (ADS)

    Lu, Jiyuan; Jing, Liang

    2013-03-01

    Cyber net system is a subclass of Petri Nets. It has more powerful description capability and more complex properties compared with P/T system. Due to its nonlinear relation, it can't use analysis techniques of other net systems directly. This influences the research on cyber net system. In this paper, the author uses hardware description language to describe cyber net system. Simulation analysis is carried out through EDA software tools to disclose properties of the system. This method is introduced in detail through cyber net system model of computing Fibonacci series. ABEL source codes and simulation wave are also presented. The source codes are compiled, optimized, fit design and downloaded to the Programmable Logic Device. Thus ASIC of computing Fibonacci series is obtained. It will break a new path for the analysis and application study of cyber net system.

  12. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models.

    PubMed

    Rao, Nageswara S V; Poole, Stephen W; Ma, Chris Y T; He, Fei; Zhuang, Jun; Yau, David K Y

    2016-04-01

    The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities, expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical subinfrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein their components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures, are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. The analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures.

  13. The Association between Cyber Victimization and Subsequent Cyber Aggression: The Moderating Effect of Peer Rejection

    ERIC Educational Resources Information Center

    Wright, Michelle F.; Li, Yan

    2013-01-01

    Adolescents experience various forms of strain in their lives that may contribute jointly to their engagement in cyber aggression. However, little attention has been given to this idea. To address this gap in the literature, the present longitudinal study examined the moderating influence of peer rejection on the relationship between cyber…

  14. A Cyber-ITS Framework for Massive Traffic Data Analysis Using Cyber Infrastructure

    PubMed Central

    Fontaine, Michael D.

    2013-01-01

    Traffic data is commonly collected from widely deployed sensors in urban areas. This brings up a new research topic, data-driven intelligent transportation systems (ITSs), which means to integrate heterogeneous traffic data from different kinds of sensors and apply it for ITS applications. This research, taking into consideration the significant increase in the amount of traffic data and the complexity of data analysis, focuses mainly on the challenge of solving data-intensive and computation-intensive problems. As a solution to the problems, this paper proposes a Cyber-ITS framework to perform data analysis on Cyber Infrastructure (CI), by nature parallel-computing hardware and software systems, in the context of ITS. The techniques of the framework include data representation, domain decomposition, resource allocation, and parallel processing. All these techniques are based on data-driven and application-oriented models and are organized as a component-and-workflow-based model in order to achieve technical interoperability and data reusability. A case study of the Cyber-ITS framework is presented later based on a traffic state estimation application that uses the fusion of massive Sydney Coordinated Adaptive Traffic System (SCATS) data and GPS data. The results prove that the Cyber-ITS-based implementation can achieve a high accuracy rate of traffic state estimation and provide a significant computational speedup for the data fusion by parallel computing. PMID:23766690

  15. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models.

    PubMed

    Rao, Nageswara S V; Poole, Stephen W; Ma, Chris Y T; He, Fei; Zhuang, Jun; Yau, David K Y

    2016-04-01

    The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities, expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical subinfrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein their components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures, are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. The analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures. PMID:25847370

  16. Adolescents' Cyber Aggression Perpetration and Cyber Victimization: The Longitudinal Associations with School Functioning

    ERIC Educational Resources Information Center

    Wright, Michelle F.

    2015-01-01

    The literature on cyber aggression is advancing, revealing many risk factors associated with the involvement in these behaviors. Academic correlates, particularly academic performance, have received some attention, with few studies utilizing longitudinal designs. The present study examined these associations among 673 8th graders (51% female) from…

  17. A Cyber-ITS framework for massive traffic data analysis using cyber infrastructure.

    PubMed

    Xia, Yingjie; Hu, Jia; Fontaine, Michael D

    2013-01-01

    Traffic data is commonly collected from widely deployed sensors in urban areas. This brings up a new research topic, data-driven intelligent transportation systems (ITSs), which means to integrate heterogeneous traffic data from different kinds of sensors and apply it for ITS applications. This research, taking into consideration the significant increase in the amount of traffic data and the complexity of data analysis, focuses mainly on the challenge of solving data-intensive and computation-intensive problems. As a solution to the problems, this paper proposes a Cyber-ITS framework to perform data analysis on Cyber Infrastructure (CI), by nature parallel-computing hardware and software systems, in the context of ITS. The techniques of the framework include data representation, domain decomposition, resource allocation, and parallel processing. All these techniques are based on data-driven and application-oriented models and are organized as a component-and-workflow-based model in order to achieve technical interoperability and data reusability. A case study of the Cyber-ITS framework is presented later based on a traffic state estimation application that uses the fusion of massive Sydney Coordinated Adaptive Traffic System (SCATS) data and GPS data. The results prove that the Cyber-ITS-based implementation can achieve a high accuracy rate of traffic state estimation and provide a significant computational speedup for the data fusion by parallel computing.

  18. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models

    DOE PAGESBeta

    Rao, Nageswara S. V.; Poole, Stephen W.; Ma, Chris Y. T.; He, Fei; Zhuang, Jun; Yau, David K. Y.

    2015-04-06

    The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical sub-infrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein theirmore » components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. In conclusion, the analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures.« less

  19. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models

    SciTech Connect

    Rao, Nageswara S. V.; Poole, Stephen W.; Ma, Chris Y. T.; He, Fei; Zhuang, Jun; Yau, David K. Y.

    2015-04-06

    The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical sub-infrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein their components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. In conclusion, the analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures.

  20. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    SciTech Connect

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

  1. Cyber Warfare as a Form of Conflict: Evaluation of Models of Cyber Conflict as a Prototype to Conceptual Analysis

    ERIC Educational Resources Information Center

    Liles, Samuel P.

    2012-01-01

    In April 2007, what has been incorrectly called the first cyber war and since then referred more correctly as a cyber riot, an attack on the domain name systems and the various servers of Estonia occurred. It was perpetrated by ethnic Russians living in Estonia who were incensed by the movement of a bronze war memorial for Russian soldiers to a…

  2. Environment, Safety and Health Self-Assessment Report Fiscal Year 2010

    SciTech Connect

    Robinson, Scott

    2011-03-23

    The Lawrence Berkeley National Laboratory (LBNL) Environment, Safety, and Health (ES&H) Self-Assessment Program was established to ensure that Integrated Safety Management (ISM) is implemented institutionally and by all divisions. The ES&H Self-Assessment Program, managed by the Office of Contractor Assurance (OCA), provides for an internal evaluation of all ES&H programs and systems at LBNL. The primary objective of the program is to ensure that work is conducted safely and with minimal negative impact to workers, the public, and the environment. Self-assessment follows the five core functions and guiding principles of ISM. Self-assessment is the mechanism used to promote the continuous improvement of the Laboratory's ES&H programs. The process is described in the Environment, Safety, and Health Assurance Plan (PUB-5344) and is composed of three types of self-assessments: Division ES&H Self-Assessment, ES&H Technical Assurance Program Assessment, and Division ES&H Peer Review. The Division ES&H Self-Assessment Manual (PUB-3105) provides the framework by which divisions conduct formal ES&H self-assessments to systematically identify program deficiencies. Issue-specific assessments are designed and implemented by the divisions and focus on areas of interest to division management. They may be conducted by teams and involve advance planning to ensure that appropriate resources are available. The ES&H Technical Assurance Program Manual (PUB-913E) provides the framework for systematic reviews of ES&H programs and processes. The ES&H Technical Assurance Program Assessment is designed to evaluate whether ES&H programs and processes are compliant with guiding regulations, are effective, and are properly implemented by LBNL divisions. The Division ES&H Peer Review Manual provides the framework by which division ISM systems are evaluated and improved. Peer Reviews are conducted by teams under the direction of senior division management and focus on higher-level management

  3. Student self-assessment and its impact on learning - a pilot study.

    PubMed

    Dearnley, Christine A; Meddings, Fiona S

    2007-05-01

    Student self-assessment is widely reported to offer numerous advantages to the learner. It is a popular practice for empowering students and the advantages are claimed to incorporate increased dialogue between students and teachers and the development of skills that encompass critical awareness and reflectivity. It is, potentially, a process that may enable health care practitioners to be lifelong learners, equipped with the skills for autonomy in learning and professional practice. As such it might be viewed as an essential element of the curriculum. This paper reports on a study designed to evaluate the implementation of self-assessment among student health care practitioners. The pilot study examined the impact of self-assessment on learning and how the process was perceived by students and staff. Findings indicated that a varied approach had been taken to its implementation, which had significant repercussions in the way in which it was perceived by students. Similarly, there was a varied approach taken by students to the process of self-assessment and this had significant repercussions for its overall value as a learning tool. The outcomes of this study provide a sound rational for maintaining and expanding the practice of student self-assessment and important lessons for the process of doing so. PMID:16870309

  4. Student self-assessment and its impact on learning - a pilot study.

    PubMed

    Dearnley, Christine A; Meddings, Fiona S

    2007-05-01

    Student self-assessment is widely reported to offer numerous advantages to the learner. It is a popular practice for empowering students and the advantages are claimed to incorporate increased dialogue between students and teachers and the development of skills that encompass critical awareness and reflectivity. It is, potentially, a process that may enable health care practitioners to be lifelong learners, equipped with the skills for autonomy in learning and professional practice. As such it might be viewed as an essential element of the curriculum. This paper reports on a study designed to evaluate the implementation of self-assessment among student health care practitioners. The pilot study examined the impact of self-assessment on learning and how the process was perceived by students and staff. Findings indicated that a varied approach had been taken to its implementation, which had significant repercussions in the way in which it was perceived by students. Similarly, there was a varied approach taken by students to the process of self-assessment and this had significant repercussions for its overall value as a learning tool. The outcomes of this study provide a sound rational for maintaining and expanding the practice of student self-assessment and important lessons for the process of doing so.

  5. Finite Energy and Bounded Actuator Attacks on Cyber-Physical Systems

    SciTech Connect

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M; Laska, Jason A; Dong, Jin; Drira, Anis

    2015-01-01

    As control system networks are being connected to enterprise level networks for remote monitoring, operation, and system-wide performance optimization, these same connections are providing vulnerabilities that can be exploited by malicious actors for attack, financial gain, and theft of intellectual property. Much effort in cyber-physical system (CPS) protection has focused on protecting the borders of the system through traditional information security techniques. Less effort has been applied to the protection of cyber-physical systems from intelligent attacks launched after an attacker has defeated the information security protections to gain access to the control system. In this paper, attacks on actuator signals are analyzed from a system theoretic context. The threat surface is classified into finite energy and bounded attacks. These two broad classes encompass a large range of potential attacks. The effect of theses attacks on a linear quadratic (LQ) control are analyzed, and the optimal actuator attacks for both finite and infinite horizon LQ control are derived, therefore the worst case attack signals are obtained. The closed-loop system under the optimal attack signals is given and a numerical example illustrating the effect of an optimal bounded attack is provided.

  6. Preceptors’ Self-Assessment of Their Ability to Perform the Learning Objectives of an Experiential Program

    PubMed Central

    2012-01-01

    Objective. To evaluate preceptors’ perception of their ability to perform the Structured Practical Experiences in Pharmacy (SPEP) learning objectives through a self-assessment activity. Methods. A self-assessment instrument consisting of 28 learning objectives associated with clinic, community, and hospital pharmacy practice experiences were developed. Preceptors rated their performance ability for each of the learning objectives using a 3-point Likert scale. Results. Of the 116 preceptors, 89 (77%) completed the self-assessment survey instrument. The overall preceptor responses to the items on performance of the 28 SPEP learning objectives ranged from good to excellent. Years of experience, practice experience setting, and involvement as a SPEP or SPEP and PharmD preceptor had no influence on their self-reported capabilities. Conclusion. Most preceptors rated their ability to perform the learning objectives for the structured practical experiences in pharmacy as high. Competency areas requiring further preceptor development were identified. PMID:23193333

  7. Evaluating the effect of learning style and student background on self-assessment accuracy

    NASA Astrophysics Data System (ADS)

    Alaoutinen, Satu

    2012-06-01

    This study evaluates a new taxonomy-based self-assessment scale and examines factors that affect assessment accuracy and course performance. The scale is based on Bloom's Revised Taxonomy and is evaluated by comparing students' self-assessment results with course performance in a programming course. Correlation has been used to reveal possible connections between student information and both self-assessment and course performance. The results show that students can place their knowledge along the taxonomy-based scale quite well and the scale seems to fit engineering students' learning style. Advanced students assess themselves more accurately than novices. The results also show that reflective students were better in programming than active. The scale used in this study gives a more objective picture of students' knowledge than general scales and with modifications it can be used in other classes than programming.

  8. Water Intelligence and the Cyber-Infrastructure Revolution

    NASA Astrophysics Data System (ADS)

    Cline, D. W.

    2015-12-01

    As an intrinsic factor in national security, the global economy, food and energy production, and human and ecological health, fresh water resources are increasingly being considered by an ever-widening array of stakeholders. The U.S. intelligence community has identified water as a key factor in the Nation's security risk profile. Water industries are growing rapidly, and seek to revolutionize the role of water in the global economy, making water an economic value rather than a limitation on operations. Recent increased focus on the complex interrelationships and interdependencies between water, food, and energy signal a renewed effort to move towards integrated water resource management. Throughout all of this, hydrologic extremes continue to wreak havoc on communities and regions around the world, in some cases threatening long-term economic stability. This increased attention on water coincides with the "second IT revolution" of cyber-infrastructure (CI). The CI concept is a convergence of technology, data, applications and human resources, all coalescing into a tightly integrated global grid of computing, information, networking and sensor resources, and ultimately serving as an engine of change for collaboration, education and scientific discovery and innovation. In the water arena, we have unprecedented opportunities to apply the CI concept to help address complex water challenges and shape the future world of water resources - on both science and socio-economic application fronts. Providing actionable local "water intelligence" nationally or globally is now becoming feasible through high-performance computing, data technologies, and advanced hydrologic modeling. Further development on all of these fronts appears likely and will help advance this much-needed capability. Lagging behind are water observation systems, especially in situ networks, which need significant innovation to keep pace with and help fuel rapid advancements in water intelligence.

  9. Smartphone and mobile phone security for the clinician.

    PubMed

    Barber, Harry

    2016-08-01

    Smartphones are near ubiquitous and widely used by doctors in discussing patients. In all communication doctors should take steps to protect confidentiality, yet there is a paucity of available information on how clinicians can bolster cyber security and minimize risk when using their mobile phone. PMID:27487057

  10. Smartphone and mobile phone security for the clinician.

    PubMed

    Barber, Harry

    2016-08-01

    Smartphones are near ubiquitous and widely used by doctors in discussing patients. In all communication doctors should take steps to protect confidentiality, yet there is a paucity of available information on how clinicians can bolster cyber security and minimize risk when using their mobile phone.

  11. CyberGIS software: a synthetic review and integration roadmap

    SciTech Connect

    Wang, Shaowen; Anselin, Luc; Bhaduri, Budhendra L; Cosby, Christopher; Goodchild, Michael; Liu, Yan; Nygers, Timothy L.

    2013-01-01

    CyberGIS defined as cyberinfrastructure-based geographic information systems (GIS) has emerged as a new generation of GIS representing an important research direction for both cyberinfrastructure and geographic information science. This study introduces a 5-year effort funded by the US National Science Foundation to advance the science and applications of CyberGIS, particularly for enabling the analysis of big spatial data, computationally intensive spatial analysis and modeling (SAM), and collaborative geospatial problem-solving and decision-making, simultaneously conducted by a large number of users. Several fundamental research questions are raised and addressed while a set of CyberGIS challenges and opportunities are identified from scientific perspectives. The study reviews several key CyberGIS software tools that are used to elucidate a vision and roadmap for CyberGIS software research. The roadmap focuses on software integration and synthesis of cyberinfrastructure, GIS, and SAM by defining several key integration dimensions and strategies. CyberGIS, based on this holistic integration roadmap, exhibits the following key characteristics: high-performance and scalable, open and distributed, collaborative, service-oriented, user-centric, and community-driven. As a major result of the roadmap, two key CyberGIS modalities gateway and toolkit combined with a community-driven and participatory approach have laid a solid foundation to achieve scientific breakthroughs across many geospatial communities that would be otherwise impossible.

  12. Quantitative Cyber Risk Reduction Estimation Methodology for a Small Scada Control System

    SciTech Connect

    Miles A. McQueen; Wayne F. Boyer; Mark A. Flynn; George A. Beitel

    2006-01-01

    We propose a new methodology for obtaining a quick quantitative measurement of the risk reduction achieved when a control system is modified with the intent to improve cyber security defense against external attackers. The proposed methodology employs a directed graph called a compromise graph, where the nodes represent stages of a potential attack and the edges represent the expected time-to-compromise for differing attacker skill levels. Time-to-compromise is modeled as a function of known vulnerabilities and attacker skill level. The methodology was used to calculate risk reduction estimates for a specific SCADA system and for a specific set of control system security remedial actions. Despite an 86% reduction in the total number of vulnerabilities, the estimated time-to-compromise was increased only by about 3 to 30% depending on target and attacker skill level.

  13. Agent-based Cyber Control Strategy Design for Resilient Control Systems: Concepts, Architecture and Methodologies

    SciTech Connect

    Craig Rieger; Milos Manic; Miles McQueen

    2012-08-01

    The implementation of automated regulatory control has been around since the middle of the last century through analog means. It has allowed engineers to operate the plant more consistently by focusing on overall operations and settings instead of individual monitoring of local instruments (inside and outside of a control room). A similar approach is proposed for cyber security, where current border-protection designs have been inherited from information technology developments that lack consideration of the high-reliability, high consequence nature of industrial control systems. Instead of an independent development, however, an integrated approach is taken to develop a holistic understanding of performance. This performance takes shape inside a multiagent design, which provides a notional context to model highly decentralized and complex industrial process control systems, the nervous system of critical infrastructure. The resulting strategy will provide a framework for researching solutions to security and unrecognized interdependency concerns with industrial control systems.

  14. Modeling Cyber Conflicts Using an Extended Petri Net Formalism

    SciTech Connect

    Zakrzewska, Anita N; Ferragut, Erik M

    2011-01-01

    When threatened by automated attacks, critical systems that require human-controlled responses have difficulty making optimal responses and adapting protections in real- time and may therefore be overwhelmed. Consequently, experts have called for the development of automatic real-time reaction capabilities. However, a technical gap exists in the modeling and analysis of cyber conflicts to automatically understand the repercussions of responses. There is a need for modeling cyber assets that accounts for concurrent behavior, incomplete information, and payoff functions. Furthermore, we address this need by extending the Petri net formalism to allow real-time cyber conflicts to be modeled in a way that is expressive and concise. This formalism includes transitions controlled by players as well as firing rates attached to transitions. This allows us to model both player actions and factors that are beyond the control of players in real-time. We show that our formalism is able to represent situational aware- ness, concurrent actions, incomplete information and objective functions. These factors make it well-suited to modeling cyber conflicts in a way that allows for useful analysis. MITRE has compiled the Common Attack Pattern Enumera- tion and Classification (CAPEC), an extensive list of cyber attacks at various levels of abstraction. CAPEC includes factors such as attack prerequisites, possible countermeasures, and attack goals. These elements are vital to understanding cyber attacks and to generating the corresponding real-time responses. We demonstrate that the formalism can be used to extract precise models of cyber attacks from CAPEC. Several case studies show that our Petri net formalism is more expressive than other models, such as attack graphs, for modeling cyber conflicts and that it is amenable to exploring cyber strategies.

  15. Adaptive cyber-attack modeling system

    NASA Astrophysics Data System (ADS)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  16. Cyber Contingency Analysis version 1.x

    SciTech Connect

    2015-10-02

    Contingency analysis based approach for quantifying and examining the resiliency of a cyber system in respect to confidentiality, integrity and availability. A graph representing an organization's cyber system and related resources is used for the availability contingency analysis. The mission critical paths associated with an organization are used to determine the consequences of a potential contingency. A node (or combination of nodes) are removed from the graph to analyze a particular contingency. The value of all mission critical paths that are disrupted by that contingency are used to quantify its severity. A total severity score can be calculated based on the complete list of all these contingencies. A simple n1 analysis can be done in which only one node is removed at a time for the analysis. We can also compute nk analysis, where k is the number of nodes to simultaneously remove for analysis. A contingency risk score can also be computed, which takes the probability of the contingencies into account. In addition to availability, we can also quantify confidentiality and integrity scores for the system. These treat user accounts as potential contingencies. The amount (and type) of files that an account can read to is used to compute the confidentiality score. The amount (and type) of files that an account can write to is used to compute the integrity score. As with availability analysis, we can use this information to compute total severity scores in regards to confidentiality and integrity. We can also take probability into account to compute associated risk scores.

  17. Medical Differential Diagnosis (MDD) as the Architectural Framework for a Knowledge Model: A Vulnerability Detection and Threat Identification Methodology for Cyber-Crime and Cyber-Terrorism

    ERIC Educational Resources Information Center

    Conley-Ware, Lakita D.

    2010-01-01

    This research addresses a real world cyberspace problem, where currently no cross industry standard methodology exists. The goal is to develop a model for identification and detection of vulnerabilities and threats of cyber-crime or cyber-terrorism where cyber-technology is the vehicle to commit the criminal or terrorist act (CVCT). This goal was…

  18. Examining the Reliability and Validity of the Effective Behavior Support Self-Assessment Survey

    ERIC Educational Resources Information Center

    Solomon, Benjamin G.; Tobin, Kevin G.; Schutte, Gregory M.

    2015-01-01

    The Effective Behavior Support Self-Assessment Survey (SAS; Sugai, Horner, & Todd, 2003) is designed to measure perceived Positive Behavior Interventions and Supports (PBIS) implementation and identify priorities for improvement. Despite its longevity, little published research exists documenting its reliability or validity for these purposes.…

  19. Beyond Model Answers: Learners' Perceptions of Self-Assessment Materials in E-Learning Applications

    ERIC Educational Resources Information Center

    Handley, Karen; Cox, Benita

    2007-01-01

    The importance of feedback as an aid to self-assessment is widely acknowledged. A common form of feedback that is used widely in e-learning is the use of model answers. However, model answers are deficient in many respects. In particular, the notion of a "model" answer implies the existence of a single correct answer applicable across multiple…

  20. Vocational Education Students' Generic Working Life Competencies: Developing a Self-Assessment Instrument

    ERIC Educational Resources Information Center

    Kyndt, Eva; Janssens, Ine; Coertjens, Liesje; Gijbels, David; Donche, Vincent; Van Petegem, Peter

    2014-01-01

    The current study reports on the process of developing a self-assessment instrument for vocational education students' generic working life competencies. The instrument was developed based on a competence framework and in close collaboration with several vocational education teachers and intermediary organisations offering various human…