Adaptive Knowledge Encoding for Agile Cybersecurity Operations

An agile cybersecurity operation is the dynamic adaptability of security services and mechanisms including people, process, technology, and environment to ensure organizational efficacy. Two key roles in agile security operations are cybersecurity operators and cybersecurity analysts. Both are overwhelmed with data and information, but underwhelmed in knowledge and understanding. Adaptive knowledge encoding introduces cybersecurity decision patterns (CDPs) and a cybersecurity decision pattern language (CDPL) as formal knowledge representation and a formal knowledge repository to capture, codify, and share knowledge that supports cybersecurity operators and analysts ability to perform timely agile cybersecurity operations. The Knowledge Engineer applies CDPs and the CDPL to provide a cybersecurity cognitive schema that dynamically adapts by assimilating new CDPs in the CDPL structure and acclimating the CDPL structure to new knowledge. CDPs and the CDPL together with applied fundamentals of agile systems engineering help facilitate the design and sustainment of agile cybersecurity operations.

[1]  James D. Lowe A Design Pattern Language for Space Stations and Long- Term Residence Human Spacecraft , 2006 .

[2]  Mary Lynn Garcia,et al.  The Design and Evaluation of Physical Protection Systems , 2001 .

[3]  R. Ackoff From Data to Wisdom , 2014 .

[4]  Rick Dove,et al.  Pattern qualifications and examples of next-generation agile system-security strategies , 2010, 44th Annual 2010 IEEE International Carnahan Conference on Security Technology.

[5]  Youki Kadobayashi,et al.  Ontological approach toward cybersecurity in cloud computing , 2010, SIN.

[6]  Jennifer E. Rowley,et al.  The wisdom hierarchy: representations of the DIKW hierarchy , 2007, J. Inf. Sci..

[7]  Michael Hughes,et al.  A pattern language approach to usability knowledge management , 2006 .

[8]  Werner Ulrich,et al.  The Art of Observation: Understanding Pattern Languages , 2006 .

[9]  Rick Dove,et al.  8.4.1 Fundamentals of Agile Systems Engineering – Part 1 , 2014 .

[10]  Ralph Johnson,et al.  Security Patterns and their Classification Schemes , 2006 .

[11]  Olivier L. de Weck,et al.  10.1.3 Agile SYSTEMS ENGINEERING versus AGILE SYSTEMS engineering , 2005 .

[12]  Jay Liebowitz Knowledge management - learning from knowledge engineering , 2001 .

[13]  F. Osinga Science, Strategy and War: The Strategic Theory of John Boyd , 2006 .

[14]  Gerard G. Meszaros,et al.  A pattern language for pattern writing , 1997 .

[15]  Bonnie Lee Appleton Patterns and Software: Essential Concepts and Terminology , 1997 .

[16]  Murray Silverstein,et al.  A Pattern Language , 1977 .

[17]  John Boardman,et al.  Systems Thinking: Coping with 21st Century Problems , 2008 .

[18]  Pauline Ratnasingam,et al.  A knowledge architecture for IT security , 2007, CACM.

[19]  Keith Willett Information Assurance Architecture , 2008 .

[20]  Gary B. Reid,et al.  A Comparative Evaluation of Two Subjective Workload Measures: The Subjective Workload Assessment Technique and the Modified Cooper Harper Scale. , 1986 .