22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 4: <strong>Information</strong> Assurance & Cyber Defence<br />

423<br />

ing) is also potential source of information changes (corruption). In example<br />

the missile guidance systems rely only on primary information, which proves how<br />

important primary information can be considered. Within the process of cyber<br />

incidents data acquisition a multiple limitations (boundary conditions) have to<br />

be considered:<br />

• this process relies on a very formal set of (field) documents, e.g: OPORD<br />

(OPerational ORDer, operational order), FRAGO (FRAGmentary Order,<br />

more specific, fragmentary OPORD),<br />

• incorrect (inappropriate) training of personnel responsible for implementation<br />

of an observation process (for e.g. too high/low sensitivity threshold),<br />

• time limitation during debriefing,<br />

• presence of typical psychological barriers of a soldier/civilian during<br />

the AAR (After Action Review) stage<br />

• lack of contextual knowledge, needed to associate events to each other,<br />

• most of the factual data is rather plain text than reach multimedia content.<br />

The example of typical psychological barriers of a soldier during AAR stage<br />

can be among all:<br />

• details, which can negatively influence opinion, assessment of activities<br />

of other soldiers,<br />

• observations, which seem to be irrelevant, infantile,<br />

• emotional states, which may indicate weaknesses of soldiers <strong>and</strong> result<br />

in lack of acceptance or ridiculousness (abnormal, excessive fear, caution,<br />

tendency to recklessness, taking excessive risk),<br />

B. Formalization of the process of collecting information about cyber<br />

incidents in cyberspace<br />

The incident observation control sheet, which is an integral part of the method<br />

of collecting information about incidents consists of four main sections: start, event/<br />

incident itself, status of the observer <strong>and</strong> the end (Figure 3).<br />

The following information should be included in particular sections of such<br />

sheet:<br />

1. Indication of the starting point of the observation (location, time)<br />

2. Event/incident itself, description of observation with parameters<br />

3. The status of an observer (data, which could be combined for the purpose<br />

of identification of a person, who formalizes observation materials <strong>and</strong><br />

information, which makes possible to assess the level of competence of this<br />

person);<br />

4. The endpoint of the observation (location, time).<br />

Proposed methodology covers both – the AAR (After Action Review), debriefing<br />

<strong>and</strong> other materials acquired automatically through technical devices (both<br />

civilian <strong>and</strong> military).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!