kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Cyber situational awareness issues and challenges
KTH, School of Electrical Engineering and Computer Science (EECS), Human Centered Technology, Media Technology and Interaction Design, MID.ORCID iD: 0000-0003-2017-7914
KTH, School of Electrical Engineering and Computer Science (EECS), Human Centered Technology, Media Technology and Interaction Design, MID. RISE Research Institutes of Sweden, Kista, Sweden.ORCID iD: 0000-0003-1748-3769
KTH, School of Electrical Engineering and Computer Science (EECS), Human Centered Technology, Media Technology and Interaction Design, MID. FOI Swedish Defence Research Agency, Stockholm, Sweden.ORCID iD: 0000-0002-6903-9072
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Theoretical Computer Science, TCS. FOI Swedish Defence Research Agency, Stockholm, Sweden.ORCID iD: 0000-0002-2677-9759
Show others and affiliations
2022 (English)In: Cybersecurity and Cognitive Science / [ed] Ahmed A. Moustafa, Elsevier , 2022, p. 235-265Chapter in book (Other academic)
Abstract [en]

Today, most enterprises are increasingly reliant on information technology to carry out their operations. This also entails an increasing need for cyber situational awareness—roughly, to know what is going on in the cyber domain, and thus be able to adequately respond to events such as attacks or accidents. This chapter argues that cyber situational awareness is best understood by combining three complementary points of view: the technological, the socio-cognitive, and the organizational perspectives. In addition, the chapter investigates the prospects for reasoning about adversarial actions. This part also reports on a small empirical investigation where participants in the Locked Shields cyber defense exercise were interviewed about their information needs with respect to threat actors. The chapter is concluded with a discussion regarding important challenges to be addressed along with suggestions for further research.

Place, publisher, year, edition, pages
Elsevier , 2022. p. 235-265
Keywords [en]
Adversarial behavior, Cognition, Cyber situational awareness, Organization, Technology
National Category
Computer and Information Sciences
Identifiers
URN: urn:nbn:se:kth:diva-319570DOI: 10.1016/B978-0-323-90570-1.00015-2Scopus ID: 2-s2.0-85137911650OAI: oai:DiVA.org:kth-319570DiVA, id: diva2:1718840
Funder
Swedish Armed Forces
Note

Part of book: ISBN 978-0-323-90570-1, QC 20221214

Available from: 2022-12-13 Created: 2022-12-13 Last updated: 2022-12-14Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Franke, UlrikAndreasson, AnnikaArtman, HenrikBrynielsson, JoelVarga, StefanVilhelm, Niklas

Search in DiVA

By author/editor
Franke, UlrikAndreasson, AnnikaArtman, HenrikBrynielsson, JoelVarga, StefanVilhelm, Niklas
By organisation
Media Technology and Interaction Design, MIDTheoretical Computer Science, TCSSchool of Electrical Engineering and Computer Science (EECS)KTH
Computer and Information Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 199 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf