Applications of SD models to Information Security

This forum supports discussion on topics of interest to the Security Special interest Groups of the System Dynamics Society. Everyone who is logged in may post to this forum.

Moderator: Eliot Rich

Forum rules
This forum supports discussion on topics of interest to the Security Special interest Groups of the System Dynamics Society. Everyone who is logged in may post to this forum.
Post Reply
Eliot Rich
Posts: 20
Joined: Mon Jan 12, 2009 3:39 pm
Location: University at Albany, SUNY
Contact:

Applications of SD models to Information Security

Post by Eliot Rich » Sat Feb 05, 2011 4:31 pm

The Insider Threat Center of the US-Computer Emergency Response Team continues to use SD and systems thinking to guide its approach towards protecting against insider cyber attack. Below is their most recent publication --

The CERT Insider Threat Center recently published a new paper titled “Deriving Candidate Technical Controls and Indicators of Insider Attack from Socio-Technical Models and Data” (http://www.cert.org/archive/pdf/11tn003.pdf). The paper seeks to demonstrate how a useful method for extracting technical information from previous insider crimes and mapping it to previous modeling work can create informed candidate technical controls and indicators. It was written by Mike Hanley, lead of our Insider Threat Lab, and was voted Best Paper at the NSA Center of Academic Excellence Workshop on Insider Threat, held in St. Louis, Missouri, in November 2010.

Venkata Sree Rama Murty Maddula
Posts: 1
Joined: Fri Feb 08, 2013 1:03 am

Re: Applications of SD models to Information Security

Post by Venkata Sree Rama Murty Maddula » Fri Feb 08, 2013 1:11 am

In the last week Financial Times if you see the CyberAttacks for the Federal Government sites and several other international Bank Sites its explained that
Java is installed on all of those systems which were attacked.In the models where we all discuss we dont talk about the technical things of the Cyber Crime attacked sites source of developement ( what technology is used ....and how they differ ...while they are on real time environment ).... and other thing is the risk of un known bugs or events triggered by new bad brains which cause damages....how to protect from those risks and what best backups can be done should be encorporated...

Post Reply

Who is online

Users browsing this forum: No registered users and 1 guest