Ignacio Martin Gallardo Urbini, Paula Venosa, P. Bazán, Nicolas Del Rio
{"title":"Distributed Cybersecurity Strategy, applying the Intelligence Operations Theory","authors":"Ignacio Martin Gallardo Urbini, Paula Venosa, P. Bazán, Nicolas Del Rio","doi":"10.23919/cisti54924.2022.9820426","DOIUrl":null,"url":null,"abstract":"This document presents a line of doctoral research that proposes a cybersecurity strategy that has not been formally standardized up to date, based on knowledge of defense intelligence operations, and applying a combination of static and dynamic approaches, in a context of threat risk, anticipating its effectiveness. In this way, changing the current approach, leaving aside the old concept of \"walled\" defense, for a more innovative one, where information collectors or \"spies\" infiltrate \"unknown terrain\" or external networks to extract data and information, learn from context, analyze and detect patterns, be willing to share the knowledge, and then be able to make defensive deterrent, or offensive decisions in real-time.","PeriodicalId":187896,"journal":{"name":"2022 17th Iberian Conference on Information Systems and Technologies (CISTI)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 17th Iberian Conference on Information Systems and Technologies (CISTI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/cisti54924.2022.9820426","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This document presents a line of doctoral research that proposes a cybersecurity strategy that has not been formally standardized up to date, based on knowledge of defense intelligence operations, and applying a combination of static and dynamic approaches, in a context of threat risk, anticipating its effectiveness. In this way, changing the current approach, leaving aside the old concept of "walled" defense, for a more innovative one, where information collectors or "spies" infiltrate "unknown terrain" or external networks to extract data and information, learn from context, analyze and detect patterns, be willing to share the knowledge, and then be able to make defensive deterrent, or offensive decisions in real-time.