22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 4: <strong>Information</strong> Assurance & Cyber Defence<br />

419<br />

• recording of any information about incidents, both positive (i.e.: Best <strong>and</strong><br />

Good Practices) <strong>and</strong> negative (Lessons Learned),<br />

• ordering recorded items according to some predefined criteria (e.g. ranking).<br />

The results which should be delivered at the end of the process after collecting<br />

an appropriate amount of complete data about incidents, on one h<strong>and</strong> lead directly<br />

to an increase in analysis quality <strong>and</strong> on the other (indirectly) to:<br />

• increase in the training effectiveness (for e.g. through updated syllabuses<br />

of training programs, discussing more comprehensive cases in the area<br />

of cyber security, etc.);<br />

• wider use of observations <strong>and</strong> experiences from mission (e.g. through visualization<br />

of cyber risk on the map, predicting the threat levels for a given<br />

region <strong>and</strong> period of time, ...);<br />

• cross-validation <strong>and</strong> improvement of the methodological documents<br />

fundamental for military service (recommending changes that aim at<br />

improving soldiers’ performance) on a tactical level (in warfare rules),<br />

operational-tactical level (mission plans), to a strategic level (improvement<br />

of doctrines).<br />

A successful execution of a process of gathering factual data (information<br />

about incidents) is a necessary condition to be able to apply advanced methods<br />

of analysis of data in subsequent steps e.g. to identify relevant:<br />

• correlations (mutual qualitative <strong>and</strong> quantitative relations);<br />

• coincidences (simultaneous occurrence of incidents, which are not related<br />

to each other by the root cause);<br />

• associations (association, combining facts pairwise <strong>and</strong> identifying relations<br />

between them);<br />

• cause-effect relations (direct <strong>and</strong> indirect).<br />

An interesting case study on the analysis of communication networks reliability<br />

in crisis management <strong>and</strong> military missions is presented by authors in [3].<br />

The way to identify <strong>and</strong> analyse the critical resources, search for the optimum<br />

communications network layout (relative to the adopted criterion) <strong>and</strong> identifying<br />

cause-effect relationships of objects <strong>and</strong> processes in the area of communications<br />

is presented there with use of game theory approach.<br />

IV. Factographic data collection process<br />

The proposed method of collecting factual material in cyberspace is specific<br />

<strong>and</strong> as such can be characterized by:<br />

• underlying goal of inferring information from data <strong>and</strong> further turning<br />

it into explicit knowledge;<br />

• multi-staged approach (gaining experience e.g. from daily missions, collecting,<br />

analysing <strong>and</strong> then applying it in a given context);

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!