A Cyber Security Multi Agency Collaboration for Rapid Response that Uses AGILE Methods on an Education Infrastructure
Autor: | Erik Moore, Daniel M. Likarish |
---|---|
Přispěvatelé: | Regis University, Matt Bishop, Natalia Miloslavskaya, Marianthi Theocharidou, TC 11, WG 11.8 |
Rok vydání: | 2015 |
Předmět: |
Agile
Engineering Colorado Cyber 02 engineering and technology Certification Computer security computer.software_genre Critical infrastructure Education Formative assessment State exercise 020204 information systems Defense ComputingMilieux_COMPUTERSANDEDUCATION 0202 electrical engineering electronic engineering information engineering Operations Inter-agency [INFO]Computer Science [cs] Constraint (mathematics) Line training Infrastructure business.industry 05 social sciences National guard Physical exercise 050301 education Collaboration Rapid response Constraint General partnership Security Table (database) Domain knowledge business Multi agency 0503 education computer Simulation Agile software development |
Zdroj: | Information Security Education Across the Curriculum ISBN: 9783319184999 World Conference on Information Security Education IFIP Advances in Information and Communication Technology 9th IFIP World Conference on Information Security Education (WISE) 9th IFIP World Conference on Information Security Education (WISE), May 2015, Hamburg, Germany. pp.41-50, ⟨10.1007/978-3-319-18500-2_4⟩ |
DOI: | 10.1007/978-3-319-18500-2_4 |
Popis: | Part 1: Innovative Methods; International audience; This study provides a summary and analysis of a cyber security multi agency collaboration for rapid response by Regis University (RU), in partnership with the Colorado Army and Air Force National Guard (CONG) and the State of Colorado (SOC), deploying AGILE methods to improve the ability of the CONG and SOC to respond to attacks against Colorado’s critical infrastructure. The summary covers formative discussions and about a year-long series of physical exercises, lectures and certification exams that advanced the study participants domain knowledge, awareness of SOC policy and communication with industry. Other states and territories can use the model to the benefit of their citizens. Events included multiple simulations, physical exercise scenarios, and table top exercises designed to give real-world substance to more abstract cyber security concepts and integrate physical world consequences to actions performed by the participants. |
Databáze: | OpenAIRE |
Externí odkaz: |