SlideShare a Scribd company logo
An Adaptive Wideband Delphi Method to
Study state Cyber- Defence Requirements.
CONTENTS
 Abstract,
 Terms,
 Introduction,
 Work carried out,
 Related work,
 Design,
 Analytical framework,
 Results,
 Conclusion,
 Future Enhancement,
 References.
What is “CYBERNATICS”?
“Cybernetics” is a domain relevant to the study of systems .
It provides protection and security to the systems and eradicate the
threats and attacks effecting the systems.
Cyber security is the body of technologies, processes and
practices designed to protect networks, computers, programs and data
from attack, damage or unauthorized access. n a computing context,
the term security implies cyber security.
ABSTRACT
This paper deals with the key requirements for
protecting data against the foreign surveillance . A
wideband Delphi method has been introduced to
study the state’s (Indonesia’s ) requirements for
cyber- defence. And also a group of 25 mitigation
controls are availed to safeguard and protect the
sate’s national interests. Delphi method was
developed by the RAND Corporation.
KEYWORDS
• Defence,
• Adaptive wideband Delphi,
• Foreign surveillance,
• Security requirements.
INTRODUCTION
 The research has tended to focus on anticipatory self-
defence in cyberspace against active cyber attacks.
 A number of researchers have suggested that local data
clouds, data protection and security.
 It highlights the need for a state self-defence framework to
deal with threats and attacks in cyberspace .
 Several recent attempts have been need to protect and
safeguard classified information against NSA surveillance
programs such as PRISM, Tempora, Upstream, and etc.
 The requirements were investigated by using an Adaptive
Wideband Delphi Method to gather information from key
national stakeholders.
MITIGATIONS
PEOPLE
 Awareness, Training and Education.
 Information security commitments.
 Non-disclosure agreements.
 Proof of security clearance.
 Local Experts Requirements.
OPERATIONS
Trustworthy systems certifications.
 Registration of Authorized Software.
Registration of Authorized Hardware.
Incident Response Management.
 Security Continuous Monitoring.
TECHNOLOGY
 System and Communications Protection
National Cryptographic Standards
Local Applications Platform
National Infrastructures Platform
Control of International Traffic.
GOVERNANCE
 Independent Review Agency
 Risk Management Process
 Information Security Baseline
 Impact of potential threats
LEGAL REMEDIES
 Information Security Agreement
Regulation of Data Protection
Data Centre Localization
Lawful Interception Capability
Code of Ethics and Conduct in Bilateral
Cooperation Treaties.
WORK CARRIED OUT…
Delphi Approach to develop strategy.
 Delphi is an method for
structuring a group
communication process so
that the process is an
effective in allowing a
group of individuals as a
whole to deal with complex
problem.
 Was developed at RAND
Corporation in the 1950’s
as a part of military defence
project.
An adaptive Delphi method is based on the Delphi
technique and the wideband Delphi approach.
The method is one of the most practical ways of
eliciting requirements for state self- defence.
Traditional Delphi studies avoid face-to-face
meetings in order to elicit genuine opinions and
anonymous.
PROBLEM :
– Less control over the period from securing work
schedules.
– As every country has it’s own culture and work
behaviour.
AVOIDANCE
Researchers need to give potential
participants a clear understanding of
the problem description and Delphi
steps before the study begins .
RELATED WORK
• The issue deals with how to protect a state
from cyber attacks.
• State self-defence refers to continuous efforts
to safeguard and protect state sovereignty, &
national territory.
SELF DEFENCE AGAINST ACTIVE
ATTACKS :
 Proposed a legal framework that would
allow use of active self-defence in cyberspace
in order to reduce and mitigate risks from
threats which would occur.
SELF DEFENCE AGAINST
PASSIVE ATTACKS
 Focuses on the global communications
surveillance as a passive attack.
 NSA considers passive attack of as a
class which includes monitoring of
communications ,decrypting and
encrypting the information.
 The proposed work is the development
of global internet services such as cloud
services based on opensource platforms
and decentralized services.
DESIGN/ METHODOLOGY
 The design about to discuss about is the
Adaptive wideband Delphi framework.
Wideband Delphi enable the survey
through face-face to qualitive stages such
as panel discussions to clarify the major
issues of global communications
surveillance.
 Based on the wideband Delphi, face-to-
face meetings has been followed .
Kick-off meeting during first round.
Panel discussion during 2nd round.
o Panel 1,(Government officials and
Military officers).
o Panel 2 ,(Academics)
o Panel 3,(Industries)
o Panel 4(Practitioners)
 Final meetings.
 This design also allows making the
comparison of different frames of mind
from panelists.
DATA
COLLECTION METHOD
 Panel selections,
 Kick-off meeting,
 First individual feedback,
 Panel discussions,
 Convergence results,
 Second individual feedback,
 Consolidated meeting.
 In the first step, we selected a
moderator and formed four panel
of experts.
 In second step was the kick-off
meeting where presentations are
presented.
 In 3rd step ,panelist to review and
revise the requirements based on
results.
 In 4th step, each panel discussed a
general list of requirements for
state self defence.
ANALYTICAL FRAMEWORK
Legal remedies
Technology
GovernanceOperations
People
 The study defined 5
fundamental requirements as
mitigation controls for each five
defence in depth elements based
on state’s national interests.
The adopted method is
OCTAVE Allegro Method.
It concludes with saying that
protection against threat requires
5 primary elements people
,operations ,technology
,governance and legal remedies.
RESULTS
 The outcome of the state cyber-defence
requirements study may be helpful to identify
the security risk assessment .
• It helped to classify certain requirements
such : Security Awareness, & Regulation
on lawful interception.
CONCLUSION
• The paper concludes about the description and usage of Delphi
estimation and traditional Delphi study and it has also adapted to
understand policymaker’s requirements for state cyber–defence
against foreign intelligence surveillance.
FUTURE ENHANCEMENT
 It might be possible to further develop a variant Delphi
approach to investigate to what extent governments can
protect national security and privacy in cyberspace, and
to examine the fundamental and essential elements of
sovereignty in cyberspace.
REFERENCES
o Defense in Depth, National Security Agency, Fort Meade, MD, USA.
o Information Assurance Technical Framework, National Security Agency, Fort Meade,
MD, USA, 2000.
o E. Amoroso, Cyber Attacks: Protecting National Infrastructure. Amsterdam, The
Netherlands: Elsevier, 2012.
o E. Amoroso, Cyber Attacks: Protecting National Infrastructure. Amsterdam, The
Netherlands: Elsevier, 2012. .
o B. D. Caulking, ‘‘Proactive self defense in cyberspace,’’ DTIC, U.S. Army War College,
PA, USA, Tech. Rep. No. 0704-0188, 2009.
o J. Landeta, ‘‘Current validity of the Delphi method in social sciences,’’ Technol.
Forecasting Soc. Change, vol. 73, no. 5, pp. 467–482, 2006.
o Defence in Depth, Trusted Information Sharing Network, ACT, Australia, 2008.
o Security and Privacy Controls for Federal Information Systems and Organizations,
National Institute of Standards and Technology, Gaithersburg, MD, USA, 2013.
o C.OkoliandS.D.Pawlowski,‘‘TheDelphimethodasaresearchtool:An example, design
considerations and applications,’’ Inf. Manage., vol. 42, no. 1, pp. 15–29, 2004.
o Critical Security Controls for Effective Cyber Defense, Council on CyberSecurity,
Arlington, VA, USA, 2009.

More Related Content

DOCX
Maranan chap.2 lab 1
DOCX
Research paper -- neri
PDF
6528 opensource intelligence as the new introduction in the graduate cybersec...
PPT
The EDUCAUSE Security Professionals Experience [ppt]
PDF
Modern Metrics on Computer Networking
DOCX
Cataluña mary hapkins
DOCX
Brua computer forensics specialist
Maranan chap.2 lab 1
Research paper -- neri
6528 opensource intelligence as the new introduction in the graduate cybersec...
The EDUCAUSE Security Professionals Experience [ppt]
Modern Metrics on Computer Networking
Cataluña mary hapkins
Brua computer forensics specialist

What's hot (20)

DOCX
Mary hankins fernando br ua
PPTX
AGILIS: an on-line map reduce environment for collaborative security
PDF
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
PDF
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
PDF
L010517180
PDF
Module 2 (footprinting)
DOCX
DOCX
Computer forensics paper
DOCX
Computer forensics paper ---neri
PPTX
Challenges2013
DOC
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
DOCX
Cataluña computer forensics specialist
DOCX
Computer Forensics Specialist
DOCX
Cataluña computer forensics specialist
PDF
Tecomex Forensics Brochure 2014
PDF
Ethical Hacking Class
PDF
EC-Council Computer Hacking Forensic Investigator v9
PDF
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
PDF
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
DOCX
Mary hankins(lord)
Mary hankins fernando br ua
AGILIS: an on-line map reduce environment for collaborative security
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
L010517180
Module 2 (footprinting)
Computer forensics paper
Computer forensics paper ---neri
Challenges2013
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
Cataluña computer forensics specialist
Computer Forensics Specialist
Cataluña computer forensics specialist
Tecomex Forensics Brochure 2014
Ethical Hacking Class
EC-Council Computer Hacking Forensic Investigator v9
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
Mary hankins(lord)
Ad

Similar to An adaptive wideband delphi method to study state (20)

PPTX
Cybersecurity Immune System for Progress Updated.pptx
DOCX
11Copyright © 2012, Elsevier Inc. All Rights Reserved.docx
PDF
[Bucharest] Attack is easy, let's talk defence
PDF
Nist cybersecurity framework isc2 quantico
PDF
Design and Analyze Secure Networked Systems - 2
PPT
Improving cyber security using biosecurity experience
PDF
How to Build Your Own Cyber Security Framework using a Balanced Scorecard
PDF
Introduction to NIST Cybersecurity Framework
DOCX
1 1 Copyright © 2012, Elsevier Inc. All Rights Reserved .docx
PPTX
Legal and Ethical Implications of Cybersecurity.pptx
PDF
No National 'Stand Your Cyberground' Law Please
PDF
PPTX
Interesting Times: Will Business Survive?
DOCX
Lab #1 - Assessment Worksheet Configuring an Active Direct.docx
PDF
Global Partnership Key to Cyber Security
PPTX
PPT-Security-for-Management.pptx
PPTX
Capstone Final Presentation
PPT
Proposal defense presentation
PDF
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
PDF
Cybersecurity Framework - What are Pundits Saying?
Cybersecurity Immune System for Progress Updated.pptx
11Copyright © 2012, Elsevier Inc. All Rights Reserved.docx
[Bucharest] Attack is easy, let's talk defence
Nist cybersecurity framework isc2 quantico
Design and Analyze Secure Networked Systems - 2
Improving cyber security using biosecurity experience
How to Build Your Own Cyber Security Framework using a Balanced Scorecard
Introduction to NIST Cybersecurity Framework
1 1 Copyright © 2012, Elsevier Inc. All Rights Reserved .docx
Legal and Ethical Implications of Cybersecurity.pptx
No National 'Stand Your Cyberground' Law Please
Interesting Times: Will Business Survive?
Lab #1 - Assessment Worksheet Configuring an Active Direct.docx
Global Partnership Key to Cyber Security
PPT-Security-for-Management.pptx
Capstone Final Presentation
Proposal defense presentation
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
Cybersecurity Framework - What are Pundits Saying?
Ad

Recently uploaded (20)

PPT
Occupational Health and Safety Management System
PPTX
Safety Seminar civil to be ensured for safe working.
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
PDF
Categorization of Factors Affecting Classification Algorithms Selection
PPTX
Nature of X-rays, X- Ray Equipment, Fluoroscopy
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
PPTX
Information Storage and Retrieval Techniques Unit III
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PDF
Abrasive, erosive and cavitation wear.pdf
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PDF
Analyzing Impact of Pakistan Economic Corridor on Import and Export in Pakist...
PPTX
Current and future trends in Computer Vision.pptx
PDF
Visual Aids for Exploratory Data Analysis.pdf
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PDF
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
PPTX
UNIT - 3 Total quality Management .pptx
PDF
Soil Improvement Techniques Note - Rabbi
PDF
COURSE DESCRIPTOR OF SURVEYING R24 SYLLABUS
PPTX
Fundamentals of Mechanical Engineering.pptx
Occupational Health and Safety Management System
Safety Seminar civil to be ensured for safe working.
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
Categorization of Factors Affecting Classification Algorithms Selection
Nature of X-rays, X- Ray Equipment, Fluoroscopy
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
Information Storage and Retrieval Techniques Unit III
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
Abrasive, erosive and cavitation wear.pdf
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
Analyzing Impact of Pakistan Economic Corridor on Import and Export in Pakist...
Current and future trends in Computer Vision.pptx
Visual Aids for Exploratory Data Analysis.pdf
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
UNIT - 3 Total quality Management .pptx
Soil Improvement Techniques Note - Rabbi
COURSE DESCRIPTOR OF SURVEYING R24 SYLLABUS
Fundamentals of Mechanical Engineering.pptx

An adaptive wideband delphi method to study state

  • 1. An Adaptive Wideband Delphi Method to Study state Cyber- Defence Requirements.
  • 2. CONTENTS  Abstract,  Terms,  Introduction,  Work carried out,  Related work,  Design,  Analytical framework,  Results,  Conclusion,  Future Enhancement,  References.
  • 3. What is “CYBERNATICS”? “Cybernetics” is a domain relevant to the study of systems . It provides protection and security to the systems and eradicate the threats and attacks effecting the systems. Cyber security is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. n a computing context, the term security implies cyber security.
  • 4. ABSTRACT This paper deals with the key requirements for protecting data against the foreign surveillance . A wideband Delphi method has been introduced to study the state’s (Indonesia’s ) requirements for cyber- defence. And also a group of 25 mitigation controls are availed to safeguard and protect the sate’s national interests. Delphi method was developed by the RAND Corporation.
  • 5. KEYWORDS • Defence, • Adaptive wideband Delphi, • Foreign surveillance, • Security requirements.
  • 6. INTRODUCTION  The research has tended to focus on anticipatory self- defence in cyberspace against active cyber attacks.  A number of researchers have suggested that local data clouds, data protection and security.  It highlights the need for a state self-defence framework to deal with threats and attacks in cyberspace .  Several recent attempts have been need to protect and safeguard classified information against NSA surveillance programs such as PRISM, Tempora, Upstream, and etc.  The requirements were investigated by using an Adaptive Wideband Delphi Method to gather information from key national stakeholders.
  • 7. MITIGATIONS PEOPLE  Awareness, Training and Education.  Information security commitments.  Non-disclosure agreements.  Proof of security clearance.  Local Experts Requirements.
  • 8. OPERATIONS Trustworthy systems certifications.  Registration of Authorized Software. Registration of Authorized Hardware. Incident Response Management.  Security Continuous Monitoring.
  • 9. TECHNOLOGY  System and Communications Protection National Cryptographic Standards Local Applications Platform National Infrastructures Platform Control of International Traffic.
  • 10. GOVERNANCE  Independent Review Agency  Risk Management Process  Information Security Baseline  Impact of potential threats
  • 11. LEGAL REMEDIES  Information Security Agreement Regulation of Data Protection Data Centre Localization Lawful Interception Capability Code of Ethics and Conduct in Bilateral Cooperation Treaties.
  • 12. WORK CARRIED OUT… Delphi Approach to develop strategy.  Delphi is an method for structuring a group communication process so that the process is an effective in allowing a group of individuals as a whole to deal with complex problem.  Was developed at RAND Corporation in the 1950’s as a part of military defence project.
  • 13. An adaptive Delphi method is based on the Delphi technique and the wideband Delphi approach. The method is one of the most practical ways of eliciting requirements for state self- defence. Traditional Delphi studies avoid face-to-face meetings in order to elicit genuine opinions and anonymous. PROBLEM : – Less control over the period from securing work schedules. – As every country has it’s own culture and work behaviour.
  • 14. AVOIDANCE Researchers need to give potential participants a clear understanding of the problem description and Delphi steps before the study begins .
  • 15. RELATED WORK • The issue deals with how to protect a state from cyber attacks. • State self-defence refers to continuous efforts to safeguard and protect state sovereignty, & national territory. SELF DEFENCE AGAINST ACTIVE ATTACKS :  Proposed a legal framework that would allow use of active self-defence in cyberspace in order to reduce and mitigate risks from threats which would occur.
  • 16. SELF DEFENCE AGAINST PASSIVE ATTACKS  Focuses on the global communications surveillance as a passive attack.  NSA considers passive attack of as a class which includes monitoring of communications ,decrypting and encrypting the information.  The proposed work is the development of global internet services such as cloud services based on opensource platforms and decentralized services.
  • 17. DESIGN/ METHODOLOGY  The design about to discuss about is the Adaptive wideband Delphi framework. Wideband Delphi enable the survey through face-face to qualitive stages such as panel discussions to clarify the major issues of global communications surveillance.  Based on the wideband Delphi, face-to- face meetings has been followed . Kick-off meeting during first round. Panel discussion during 2nd round. o Panel 1,(Government officials and Military officers). o Panel 2 ,(Academics) o Panel 3,(Industries) o Panel 4(Practitioners)  Final meetings.  This design also allows making the comparison of different frames of mind from panelists.
  • 18. DATA COLLECTION METHOD  Panel selections,  Kick-off meeting,  First individual feedback,  Panel discussions,  Convergence results,  Second individual feedback,  Consolidated meeting.
  • 19.  In the first step, we selected a moderator and formed four panel of experts.  In second step was the kick-off meeting where presentations are presented.  In 3rd step ,panelist to review and revise the requirements based on results.  In 4th step, each panel discussed a general list of requirements for state self defence.
  • 20. ANALYTICAL FRAMEWORK Legal remedies Technology GovernanceOperations People  The study defined 5 fundamental requirements as mitigation controls for each five defence in depth elements based on state’s national interests. The adopted method is OCTAVE Allegro Method. It concludes with saying that protection against threat requires 5 primary elements people ,operations ,technology ,governance and legal remedies.
  • 21. RESULTS  The outcome of the state cyber-defence requirements study may be helpful to identify the security risk assessment . • It helped to classify certain requirements such : Security Awareness, & Regulation on lawful interception.
  • 22. CONCLUSION • The paper concludes about the description and usage of Delphi estimation and traditional Delphi study and it has also adapted to understand policymaker’s requirements for state cyber–defence against foreign intelligence surveillance.
  • 23. FUTURE ENHANCEMENT  It might be possible to further develop a variant Delphi approach to investigate to what extent governments can protect national security and privacy in cyberspace, and to examine the fundamental and essential elements of sovereignty in cyberspace.
  • 24. REFERENCES o Defense in Depth, National Security Agency, Fort Meade, MD, USA. o Information Assurance Technical Framework, National Security Agency, Fort Meade, MD, USA, 2000. o E. Amoroso, Cyber Attacks: Protecting National Infrastructure. Amsterdam, The Netherlands: Elsevier, 2012. o E. Amoroso, Cyber Attacks: Protecting National Infrastructure. Amsterdam, The Netherlands: Elsevier, 2012. . o B. D. Caulking, ‘‘Proactive self defense in cyberspace,’’ DTIC, U.S. Army War College, PA, USA, Tech. Rep. No. 0704-0188, 2009. o J. Landeta, ‘‘Current validity of the Delphi method in social sciences,’’ Technol. Forecasting Soc. Change, vol. 73, no. 5, pp. 467–482, 2006. o Defence in Depth, Trusted Information Sharing Network, ACT, Australia, 2008. o Security and Privacy Controls for Federal Information Systems and Organizations, National Institute of Standards and Technology, Gaithersburg, MD, USA, 2013. o C.OkoliandS.D.Pawlowski,‘‘TheDelphimethodasaresearchtool:An example, design considerations and applications,’’ Inf. Manage., vol. 42, no. 1, pp. 15–29, 2004. o Critical Security Controls for Effective Cyber Defense, Council on CyberSecurity, Arlington, VA, USA, 2009.