Information and Communication Technologies are increasingly intertwined across the economies and societies of developed countries. Protecting these technologies from cyberthreats requires collaborative relationships for exchanging cyber defense data and an ability to establish trusted relationships. The fact that Communication and Information Systems (CIS) security1 is an international issue increases the complexity of these relationships. Cyber defense collaboration presents specific challenges since most entities would like to share cyber-related data but lack a successful model to do so. We will explore four aspects of cyber defense collaboration to identify approaches for improving cyber defense information sharing. First, incentives and barriers for information sharing, which includes the type of information that may be of interest to share and the motivations that cause social networks to be used or stagnate. Second, collaborative risk management and information value perception. This includes risk management approaches that have built-in mechanisms for sharing and receiving information, increasing transparency, and improving entity peering relationships. Third, we explore procedural models for improving data exchange, with a focus on inter-governmental collaborative challenges. Fourth, we explore automation of sharing mechanisms for commonly shared cyber defense data (e.g., vulnerabilities, threat actors, black/ white lists). In order to reach a common understanding of terminology in this paper, we leverage the NATO CIS Security Capability Breakdown [19], published in November 2011, which is designed to identify and describe (CIS) security and cyber defense terminology and definitions to facilitate NATO, national, and multi-national discussion, coordination, and capability development.
[1]
Riivo Talviste,et al.
Deploying secure multiparty computation for joint data analysis — a case study
,
2011
.
[2]
Emma Disley,et al.
Incentives and Challenges for Information Sharing in the Context of Network and Information Security
,
2012
.
[3]
Kevin Leyton-Brown,et al.
Incentives for sharing in peer-to-peer networks
,
2001,
EC '01.
[4]
Ian Roxan.
United Kingdom country report
,
2006
.
[5]
Marianne M. Swanson,et al.
Recommended Security Controls for Federal Information Systems
,
2005
.
[6]
Tudor Dumitras,et al.
Toward a standard benchmark for computer security research: the worldwide intelligence network environment (WINE)
,
2011,
BADGERS '11.
[7]
Dan Bogdanov,et al.
Sharemind: A Framework for Fast Privacy-Preserving Computations
,
2008,
ESORICS.
[8]
Roland Klemke,et al.
Modelling context in information brokering processes
,
2002
.