Power of Communication Behind Extreme Cybersecurity Incidents
Title | Power of Communication Behind Extreme Cybersecurity Incidents |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Kikuchi, Masato, Okubo, Takao |
Conference Name | 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech) |
Date Published | aug |
Publisher | IEEE |
ISBN Number | 978-1-7281-3024-8 |
Keywords | Computational modeling, cybersecurity, Cyberspace, Electronic mail, extreme cybersecurity incidents, Human Behavior, human factors, Internet, Metrics, Pervasive Computing Security, phishing, Protocols, pubcrawl, resilience, Resiliency, risk analysis, risk management, risk mitigations, Scalability, security of data, surrounding threats |
Abstract | There are increasing threats for cyberspace. This paper tries to identify how extreme cybersecurity incidents occur based on the scenario of a targeted attack through emails. Knowledge on how extreme cybersecurity incidents occur helps in identifying the key points on how they can be prevented from occurring. The model based on system thinking approach to the understanding how communication influences entities and how tiny initiating events scale up into extreme events provides a condensed figure of the cyberspace and surrounding threats. By taking cyberspace layers and characteristics of cyberspace identified by this model into consideration, it predicts most suitable risk mitigations. |
URL | https://ieeexplore.ieee.org/document/8890392 |
DOI | 10.1109/DASC/PiCom/CBDCom/CyberSciTech.2019.00065 |
Citation Key | kikuchi_power_2019 |
- Phishing
- surrounding threats
- security of data
- Scalability
- risk mitigations
- risk management
- risk analysis
- Resiliency
- resilience
- pubcrawl
- Protocols
- Computational modeling
- Pervasive Computing Security
- Metrics
- internet
- Human Factors
- Human behavior
- extreme cybersecurity incidents
- Electronic mail
- Cyberspace
- Cybersecurity