Figure 8 - uploaded by Erik Moore
Content may be subject to copyright.
A cyber defense incident timeline reflecting relative load of tasks that are supplanted over time by the first Incident Response Load (IRL1) and how the Collaborative Training and Response Team (CTRC) provided relief after variants reinfected the institution

A cyber defense incident timeline reflecting relative load of tasks that are supplanted over time by the first Incident Response Load (IRL1) and how the Collaborative Training and Response Team (CTRC) provided relief after variants reinfected the institution

Source publication
Thesis
Full-text available
(full text avaiable at https://pearl.plymouth.ac.uk/handle/10026.1/16608 cc: Attribution-NonCommercial-NoDerivs 3.0) As society advances in terms of information technology, the dependency on cyber secure systems increases. Likewise, the need to enhance both the quality and relevance of education, training, and professional development for cybersecu...

Contexts in source publication

Context 1
... Figure 8, the left side of the timeline represents normal operations for CDOT. When the incident occurs, incident response load (IRL) takes over the whole team's time, eventually minimizing the ability to do basic "Keep the Lights on" operations required to run the business. ...
Context 2
... Figure 8, the left side of the timeline represents normal operations for CDOT. When the incident occurs, incident response load (IRL) takes over the whole team's time, eventually minimizing the ability to do basic "Keep the Lights on" operations required to run the business. ...

Similar publications

Article
Full-text available
A virtual world or an online world is referred to as cyberspace. It is a communication-enabled artificial world created by computers or internet-enabled devices or components. It is a web-based platform that allows users to interact and communicate with one another. Cybercrime is an area of crime that is rapidly expanding around the world. It is de...

Citations

Chapter
Full-text available
In the era of the Fourth Industrial Revolution (4IR), data have been described as the new ‗oil‘ because of its importance in driving sustainable development in countries and organisations that efficiently utilized them. As a result of their significance, hackers (cyber-attackers) have been targeting and stealing these data for different motives. When data are stolen or breached, the affected countries or organisations are denied benefits of such data and this may have severe implications for their efficiency. Cyberspace makes exchanges and transfer of data easier.
Chapter
Full-text available
As technology proliferates and becomes indispensable to all functions of society, so does the need to ensure its security and resilience through cyber defense training, education, and professional development. This paper presents a layered model that supports cyber defense training progressively through the development of technology services, digital context, performance assessment, and impact analysis. The methods used were applied to college laboratories associated with cybersecurity classes, defense training exercises, cyber based competitions, and graduate research program designs. The service layer presents methods for developing the technical infrastructure and agile deployment necessary to support cyber defense training. This, then, is layered with conceptual frameworks to guide teams as they immerse into scenarios within cyberspace. To enhance team performance in this space and to enhance the value of the training process itself, psychometric feedback, Agile methods, and quantitative assessments are used to track efficacy and facilitate future development. The final layer represents active incident response and ongoing collaborative efforts between institutions and across disciplines. The work is presented as a progression and illustrates a decade of research from 2010 to 2020. The context has been updated here with the intention that it can be used as a guide for designing a broad range of collaborative cyber defense and cyber range programs. The influence of socio-behavioral factors increasingly illuminates the path forward.