22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

424 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Figure 3. Division of the incident observation sheet onto two basic parts: observed incident<br />

<strong>and</strong> status of the observer<br />

The universal character of proposed methodology stems from the fact that<br />

particular sections of the incident observation sheet are also valid for describing<br />

parameters with observations from every other sources of information both civilian<br />

<strong>and</strong> military (from mission plans <strong>and</strong> mission reports) <strong>and</strong> technical devices<br />

used for collecting factual data. The stage of collecting cyber incidents ends by filling<br />

particular sections of the observation sheet with content. Underlying information<br />

sources consist of a set of:<br />

• factual data about incidents in civilian security domain (registered for e.g.<br />

by NASK – Research <strong>and</strong> Academic Computer Network).<br />

• military documents about planning, execution <strong>and</strong> debriefing of a mission<br />

• factual data reported by ICT systems, which covers e.g. network traffic,<br />

reports from port scanning, number <strong>and</strong> size of transferred batches.<br />

Every single entry inserted into incident database can be packaged as paper or/<br />

<strong>and</strong> an electronic form. Proposed information structure (parameters) of database<br />

records is presented in the following sub-section. All information which will not<br />

be selected for inclusion into the observation sheet are considered to be irrelevant.<br />

This way information from the data sources about single cyber incident is carefully<br />

selected (Figure 4).<br />

C. Recommendations for the gathering process<br />

Every role involved in the process of cyberspace data gathering should obey<br />

a well-defined set of rules in order to assure reliability of results. These rules concern<br />

among all:<br />

• focusing on particular objects (e.g. central, base station, access to active<br />

network elements, type of software) <strong>and</strong> processes (e.g. way of communication,<br />

activities coordination),<br />

• omitting irrelevant details (they are defined separately for every mission<br />

<strong>and</strong> type of event),<br />

• using one or a well-defined set of recording techniques (paper notes, photos,<br />

videos, mind mapping, other)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!