[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2612733.2612759acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesdg-oConference Proceedingsconference-collections
research-article

A taxonomy and a knowledge portal for cybersecurity

Published: 18 June 2014 Publication History

Abstract

Smart government is possible only if the security of sensitive data can be assured. The more knowledgeable government officials and citizens are about cybersecurity, the better are the chances that government data is not compromised or abused. In this paper, we present two systems under development that aim at improving cybersecurity education. First, we are creating a taxonomy of cybersecurity topics that provides links to relevant educational or research material. Second, we are building a portal that serves as platform for users to discuss the security of websites. These sources can be linked together. This helps to strengthen the knowledge of government officials and citizens with regard to cybersecurity issues. These issues are a central concern for open government initiatives.

References

[1]
J. J. Cebula and L. R. Young. a taxonomy of operational cyber security risks. Technical report, Software Engineering Institute, CMU, 2010.
[2]
I. M. Chapman, S. P. Leblanc, and A. Partington. Taxonomy of cyber attacks and simulation of their effects. In Proceedings Military Modeling & Simulation MMS, 2011.
[3]
S. A. Crosby and D. S. Wallach. Efficient data structures for tamper-evident logging. In Proceedings USENIX Security Symposium, 2009.
[4]
Department of the Treasury. Treasury department report to the President on cybersecurity incentives. http://www.treasury.gov/press-center/Documents/Supporting%20Analysis%20Treasury%20Report%20to%20the%20President%20on%20Cybersecurity%20Incentives_FINAL.pdf (last checked April 29, 2014), 2013.
[5]
E. A. Fisher. Federal laws relating to cybersecurity: Overview and discussion of proposed revisions. https://www.fas.org/sgp/crs/natsec/R42114.pdf (last checked April 29, 2014), 2013. Congressional Research Service.
[6]
M. Goncharov. Russian underground 101. Research Paper, 2012. Trend Micro Incorporated.
[7]
Government Accountability Office. Cybersecurity: National strategy, roles, and responsibilities need to be better defined and more effectively implemented. http://www.gao.gov/products/GAO-13-187 (last checked April 29, 2014), 2013.
[8]
W. V. Held. Hacktivism: An analysis of the motive to disseminate confidential information. Master's thesis, Texas State University - San Marcos, 2012.
[9]
H. A. M. Luiijf, K. Besseling, M. Spoelstra, and P. de Graaf. Ten national cyber security strategies: A comparison. In Proceedings CRITIS, 2011.
[10]
A. McGettrick. Toward curricular guidelines for cybersecurity. http://www.acm.org/education/TowardCurricularGuidelinesCybersec.pdf (last checked April 29, 2014), 2013.
[11]
Microsoft. Cybersecurity for open government: Security planning in the era of transparency. White Paper, 2010.
[12]
National Institute of Standards and Technology. Framework for improving critical infrastructure cybersecurity. http://www.nist.gov/cyberframework/upload/cybersecurity-framework-021214-final.pdf (last checked April 29, 2014), 2014.
[13]
B. Obama. Presidential policy directive -- critical infrastructure security and resilience. http://www.whitehouse.gov/the-press-office/2013/02/12/presidential-policy-directive-critical-infrastructure-security-and-resil (last checked April 29, 2014), 2013.
[14]
C. Paar and J. Pelzl. Understanding Cryptography: A Textbook for Students and Practitioners. Springer, 2010.
[15]
J. Park, D. Nguyen, and R. Sandhu. A provenance-based access control model. In Proceedings IEEE Privacy, Security and Trust (PST), 2012.
[16]
President's Council of Advisors on Science and Technology. Report to the President: Immediate opportunities for strengthening the nation's cybersecurity. http://www.whitehouse.gov/sites/default/files/microsites/ostp/PCAST/pcast_cybersecurity_nov-2013.pdf (last checked April 29, 2014), 2013.
[17]
M. B. Salem, S. Hershkop, and S. J. Stolfo. Insider Attack and Cyber Security: Beyond the Hacker, chapter A Survey of Insider Attack Detection Research, pages 69--90. Springer, 2008.
[18]
M. Sharifi, E. Fink, and J. G. Carbonell. SmartNotes: Application of crowdsourcing to the detection of web threats. In Proceedings Systems, Man, and Cybernetics (SMC), pages 1346--1350. IEEE, 2011.
[19]
R. Tehan. Cybersecurity: Authoritative reports and resources, by topic. http://www.fas.org/sgp/crs/misc/R42507.pdf (last checked April 29, 2014), 2014. Congressional Research Service.
[20]
US Computer Emergency Readiness Team (US-CERT). Computer forensics. http://www.us-cert.gov/sites/default/files/publications/forensics.pdf (last checked April 29, 2014), 2008.
[21]
Wavefront Consulting Group. A brief history of cybercrime. http://www.wavefrontcg.com/A_Brief_History_of_Cybercrime.html (last checked April 29, 2014), 2008.

Cited By

View all
  • (2024)Cybersecurity activities for education and curriculum design: A surveyComputers in Human Behavior Reports10.1016/j.chbr.2024.10050116(100501)Online publication date: Dec-2024
  • (2022)TaxIdMA: Towards a Taxonomy for Attacks related to IdentitiesProceedings of the 17th International Conference on Availability, Reliability and Security10.1145/3538969.3544430(1-13)Online publication date: 23-Aug-2022
  • (2022)Vulnerability Exposure Driven Intelligence in Smart, Circular CitiesDigital Threats: Research and Practice10.1145/34870593:4(1-18)Online publication date: 10-Mar-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
dg.o '14: Proceedings of the 15th Annual International Conference on Digital Government Research
June 2014
365 pages
ISBN:9781450329019
DOI:10.1145/2612733
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

  • Digital Government Society of North America

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 June 2014

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. cybersecurity
  2. education
  3. systematization
  4. taxonomy

Qualifiers

  • Research-article

Conference

dg.o '14
Sponsor:

Acceptance Rates

dg.o '14 Paper Acceptance Rate 36 of 62 submissions, 58%;
Overall Acceptance Rate 150 of 271 submissions, 55%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)16
  • Downloads (Last 6 weeks)1
Reflects downloads up to 26 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Cybersecurity activities for education and curriculum design: A surveyComputers in Human Behavior Reports10.1016/j.chbr.2024.10050116(100501)Online publication date: Dec-2024
  • (2022)TaxIdMA: Towards a Taxonomy for Attacks related to IdentitiesProceedings of the 17th International Conference on Availability, Reliability and Security10.1145/3538969.3544430(1-13)Online publication date: 23-Aug-2022
  • (2022)Vulnerability Exposure Driven Intelligence in Smart, Circular CitiesDigital Threats: Research and Practice10.1145/34870593:4(1-18)Online publication date: 10-Mar-2022
  • (2022)Analyzing and Evaluating Critical Cyber Security Challenges Faced by Vendor Organizations in Software Development: SLR Based ApproachIEEE Access10.1109/ACCESS.2022.317982210(65044-65054)Online publication date: 2022
  • (2022)Cybersecurity Challenges in Small and Medium Enterprise (SMEs)Blockchain and Other Emerging Technologies for Digital Business Strategies10.1007/978-3-030-98225-6_1(1-19)Online publication date: 4-May-2022
  • (2022)Investigating the drivers of cybersecurity enhancement in public organizationsThe Electronic Journal of Information Systems in Developing Countries10.1002/isd2.1222388:5Online publication date: 4-Sep-2022
  • (2022)Cyber Security Challenges Model: SLR‐Based Protocol and Initial FindingsEvolving Software Processes10.1002/9781119821779.ch13(253-270)Online publication date: 7-Jan-2022
  • (2019)Knowledge PortalsInternational Journal of Knowledge Management10.4018/IJKM.201901010115:1(1-18)Online publication date: Jan-2019
  • (2019)BOTNETCyber Security: The Lifeline of Information and Communication Technology10.1007/978-3-030-31703-4_4(43-65)Online publication date: 18-Oct-2019
  • (2018)Exploring User Behavior and Cybersecurity Knowledge - An experimental study in Online Shopping2018 16th Annual Conference on Privacy, Security and Trust (PST)10.1109/PST.2018.8514190(1-10)Online publication date: Aug-2018
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media