2018 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA) 2018
DOI: 10.1109/cybersa.2018.8551402
|View full text |Cite
|
Sign up to set email alerts
|

Development and evaluation of information elements for simplified cyber-incident reports

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
15
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(15 citation statements)
references
References 21 publications
0
15
0
Order By: Relevance
“…Furthermore, the number of information pieces used in a report was related to the quality assessments made by the exercise management. The results, according to Lif et al, (2018), show that, while the general assessment of content relevance of the simplified cyber incident reporting template was favourable, the template still needs to be validated further.…”
Section: Empirical Literature Reviewmentioning
confidence: 99%
See 3 more Smart Citations
“…Furthermore, the number of information pieces used in a report was related to the quality assessments made by the exercise management. The results, according to Lif et al, (2018), show that, while the general assessment of content relevance of the simplified cyber incident reporting template was favourable, the template still needs to be validated further.…”
Section: Empirical Literature Reviewmentioning
confidence: 99%
“…Handling, analysis, and attribution, according to Hattema (2021), require 'epistemic states,' which are based on a limited grasp of the attackers' intentions, opportunities, actions, and specific motions. One of the most critical duties in cyber security incident handling, according to Lif et al, (2018), is to report what has happened. Several frameworks have been developed to assist this reporting, according to Lif et al, (2018), each with its own set of benefits and drawbacks.…”
Section: Empirical Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…During the implementation stage, the trainer monitors the students and tries to handle events and incidents, driving the students to pass through all learning goals. The process is based on the Boyd's Observe-Orient-Decide-Act (OODA) loop [42]. In the feedback stage, the students and the trainer go through all the main exercise elements.…”
Section: Teaching Cyber-securitymentioning
confidence: 99%