Affiliation:
1. Pacific Northwest National Laboratory, USA
Abstract
Security often requires collaboration, but when multiple stakeholders are involved, it is typical for their priorities to differ or even conflict with one another. In today’s increasingly networked world, cyber security collaborations may span organizations and countries. In this chapter, the authors address collaboration tensions, their effects on incident detection and response, and how these tensions may potentially be resolved. The authors present three case studies of collaborative cyber security within the U.S. government and discuss technical, social, and regulatory challenges to collaborative cyber security. They suggest possible solutions and present lessons learned from conflicts. Finally, the authors compare collaborative solutions from other domains and apply them to cyber security collaboration. Although they concentrate their analysis on collaborations whose purpose is to achieve cyber security, the authors believe this work applies readily to security tensions found in collaborations of a general nature as well.
Reference56 articles.
1. Users are not the enemy
2. Aitoro, J. R. (2008a, February 28). DHS gives itself a 'C' for cybersecurity. Government Executive. Retrieved from http://www.govexec.com/story_page.cfm?filepath=/dailyfed/0208/022808j1.htm
3. Aitoro, J. R. (2008b, March 2). OMB reports 60 percent increase in information security incidents. Government Executive. Retrieved fromhttp://www.govexec.com/story_page.cfm?filepath=/dailyfed/0308/030208a1.htm
4. Enterprise information security strategies
5. Anderson, R. (1993). Why cryptosystems fail in. In Proceedings of the 1st ACM Conference on Computer and Communications Security (pp. 215-227). New York: ACM Press.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献