| Literature DB >> 33586204 |
Mariana G Cains1, Liberty Flora1, Danica Taber1, Zoe King1, Diane S Henshel1.
Abstract
It is important to have and use standardized terminology and develop a comprehensive common understanding of what is meant by cyber security and cyber security risk given the multidisciplinary nature of cyber security and the pervasiveness of cyber security concerns throughout society. Using expert elicitation methods, collaborating cyber researchers from multiple disciplines and two sectors (academia, government-military) were individually interviewed and asked to define cyber security and cyber security risk. Data-driven thematic analysis was used to identify the most salient themes within each definition, sector, and cyber expert group as a whole with results compared to current standards definitions. Network analysis was employed to visualize the interconnection of salient themes within and across sectors and disciplines. When examined as a whole group, "context-driven," "resilient system functionality," and "maintenance of CIA (confidentiality, integrity, availability)" were the most salient themes and influential network nodes for the definition of cyber security, while "impacts of CIA vulnerabilities," "probabilities of outcomes," and "context-driven" were the most salient themes for cyber security risk. We used this expert elicitation process to develop comprehensive definitions of cyber security (cybersecurity) and cyber security risk that encompass the contextual frameworks of all the disciplines represented in the collaboration and explicitly incorporates human factors as significant cyber security risk factors.Entities:
Keywords: Cross-disciplinary; human factors; network analysis; system; thematic analysis
Mesh:
Year: 2021 PMID: 33586204 PMCID: PMC9543401 DOI: 10.1111/risa.13687
Source DB: PubMed Journal: Risk Anal ISSN: 0272-4332 Impact factor: 4.302
Disciplines and Research Areas of Interviewed Cyber Security Collaborative Research Alliance Participants (CSec CRA)
| Behavioral Psychology | Cognitive Neuroscience | Computer Engineering |
| Computer Science | Computer Security | Human Factors Engineering |
| Network Science and Engineering | Risk Assessment | Security Informatics |
| Security Monitoring and Intrusion Detection | Social and Decision Sciences | Software Engineering |
| Systems and Network Security | Tactical Mobile and Strategic networks | Wireless Systems and Networks |
Excerpt of Coding Progression via Thematic Analysis of Responses to “What is your Definition of Cyber Security Risk?”
| Interviewee | Definition Extract | Code | 1° Theme | 2° Theme | 3° Theme |
|---|---|---|---|---|---|
| A | “To me, it is the humans that are the biggest risk.” | humans are the biggest risk | Bad user or attacker | Unknown of human behavior | Uncertainties introduced by human factors |
| A | “…humans that are the biggest risk.” | humans are the biggest risk | Humans are a source of risk | ||
| B | “…humans will be hard such as insider threat.” | humans are hard to quantify | Unknowns of human behavior | ||
| C | “…attackers don't follow rules in reality…” | attackers don't follow rules | Attackers can be unpredictable | ||
| B | “Risk in terms of machine may be easier to quantify.” | machine risk is easier to quantify than human | Machines are easier than humans | Human complexity |
Fig 1Thematic butterfly map of first, second, and third‐order themes from thematic analysis of the answers to “What is your definition of cyber security?” Green themes were expressed by both sectors (U.S. Army Research Laboratory [ARL] and academia), blue themes were expressed by only one sector, and yellow themes represent differing first or second‐order themes that consolidate into the same second and third‐order themes, respectively. Image best viewed in color and enlarged via online journal.
Fig 2Thematic map of first, second, and third‐order themes from thematic analysis of the answers to “What is your definition of cyber security risk?” Green themes were expressed by both sectors (U.S. Army Research Laboratory [ARL] and academia), blue themes were expressed by only one sector, and yellow themes represent differing first or second‐order themes that consolidate into the same second and third‐order themes, respectively. Image best viewed in color and enlarged via online journal.
Fig 3Top five third‐order themes of cyber security, identified and refined from expert elicitation using data‐driven thematic analysis.
Fig 4Top five third‐order cyber security risk themes, identified and refined from expert elicitation using data‐driven thematic analysis. Three third‐order themes tied for fifth: “Vulnerabilities (known and unknown),” “Negative consequences,” and “Absolute and relative resource valuation.”
Fig 5Simplified sector‐based network.
Fig 6Parent networks of cyber security (left network) and cyber security risk (right network) third‐order themes identified from the interview corpus using thematic analysis. Nodes (i.e., circles) are the third‐order theme and edges (i.e., connecting lines) signify interviewee definitions from which both themes were identified. The nodes of the same color are more densely connected to each other than other nodes in the network, that is community of nodes. The edge color denotes the interviewees sector, Academia (gold) and U.S. Army Research Laboratory (ARL; blue). Image best viewed in color and enlarged via online journal.
Fig 7Sector‐parsed networks of cyber security third‐order themes identified from the interview corpus using thematic analysis. Nodes (i.e., circles) are the third‐order theme and edges (i.e., connecting lines) signify interviewee definitions from which both themes were identified. The nodes of the same color are more densely connected to each other than other nodes in the network, that is community of nodes. The edge color denotes the interviewees sector, Academia (gold; left network) and U.S. Army Research Laboratory (ARL; blue, right network). Image best viewed in color and enlarged via online journal.
Fig 8Sector‐parsed networks of cyber security risk third‐order themes identified from the interview corpus using thematic analysis. Nodes (i.e., circles) are the third‐order theme and edges (i.e., connecting lines) signify interviewee definitions from which both themes were identified. The nodes of the same color are more densely connected to each other than other nodes in the network, that is community of nodes. The edge color denotes the interviewees sector, Academia (gold; left network) and U.S. Army Research Laboratory (ARL; blue, right network). Image best viewed in color and enlarged via online journal.
Minimum and Maximum Number of Degrees, with Respective Node (i.e., Third‐Theme) for Each Parent Networks and Parsed Sector Networks. The Degree is the Number of Edges (i.e., connections) Connecting to Other Nodes
| Network | Number of Comm | Total N | Total E | GD | Min D | Theme(s) | Max D | Theme |
| Cyber Security | ||||||||
| Corpus | 3 | 19 | 136 | 0.795 | 2 | Systemic solutions | 43 | Context‐driven |
| Academia | 2 | 18 | 94 | 0.614 | 1 | Verifiable information provenance | 27 | Context‐driven |
| ARL | 3 | 15 | 42 | 0.4 | 2 | Accurate intrusion detection; Comprehensive system awareness; Resource management; Systemic solutions | 16 | Context‐driven |
| Cyber Security Risk | ||||||||
| Corpus | 3 | 26 | 103 | 0.317 | 1 | Goal dependent | 28 | Impacts of CIA vulnerabilities |
| Academia | 3 | 22 | 68 | 0.294 | 1 | Goal dependent; Multiple realms of threats; Sociotechnical exploitation | 23 | Impacts of CIA vulnerabilities |
| ARL | 6 | 17 | 35 | 0.435 | 0 | Absolute and relative resource valuation; Scope of risk perception | 9 | Probability of outcomes |
Comm. = communities, N = nodes, E = edges, GD = graph density, D = degrees.
Fig 9Discipline‐parsed network of cyber security and cyber security risk third‐order themes identified from the interview corpus using thematic analysis. Center nodes (i.e., colorful circles) are the interviewee's discipline and external nodes (i.e., gray circles) are the third‐order themes. The size of the node corresponds to the number interviewees per discipline (colored nodes) and total number of interviewee definitions per theme (gray nodes). The edges (i.e., lines) connect interviewee discipline with identified third order themes in their definition. The edge color denotes the interviewee discipline. The edge thickness/weight corresponds to the number of interviewees per discipline per theme. Image best viewed in color and enlarged via online journal.
Expert Elicitation Use of Cyber Security Terms and Concepts by Percentage. The Cyber Risk Ontology (CR Ont; N = 9) Columns is the Percentage of Select Ontologies that Contain the Cyber Risk Specific Vocabulary Terms and as Determined by Oltramari and Kott. The Cyber Security Expert Elicitation (CS EE; N = 25) and Cyber Security Risk Expert Elicitation (CSR EE; N = 27) Columns are Percentage of Experts Who Used the Term Within Their Definition of Cyber Security and Cyber Security Risk, Respectively
| Term/Concept | CR Ont | CS EE | CSR EE | Term/Concept | CR Ont | CS EE | CSR EE |
|---|---|---|---|---|---|---|---|
| Alert | 22.2 | 0.0 | 0.0 | Impact | 44.4 | 0.0 | 7.4 |
| Asset | 66.7 | 0.0 | 3.7 | Intent | 22.2 | 0.0 | 3.7 |
| Benefit | 11.1 | 0.0 | 3.7 | Likelihood | 33.3 | 0.0 | 14.8 |
| Configuration | 33.3 | 0.0 | 0.0 | Mission | 33.3 | 0.0 | 0.0 |
| Consequence | 55.6 | 4.0 | 7.4 | Network | 33.3 | 32.0 | 22.2 |
| Control | 11.1 | 8.0 | 3.7 | Origin/Source | 55.6 | 20.0 | 11.1 |
| Cost | 22.2 | 4.0 | 3.7 | Payload | 22.2 | 0.0 | 0.0 |
| Countermeasure | 44.4 | 0.0 | 0.0 | Report | 22.2 | 0.0 | 0.0 |
| Credential | 22.2 | 4.0 | 0.0 | Risk | 33.3 | 0.0 | 81.5 |
| Cyber attack | 88.9 | 0.0 | 0.0 | Risk assessment | 33.3 | 0.0 | 11.1 |
| Cyber defense | 22.2 | 0.0 | 0.0 | Risk factor | 33.3 | 0.0 | 0.0 |
| Cyber exploitation | 44.4 | 0.0 | 0.0 | Risk identification | 11.1 | 0.0 | 0.0 |
| Cyber incident | 22.2 | 0.0 | 0.0 | Risk metric | 33.3 | 0.0 | 0.0 |
| Cyber operation | 22.2 | 0.0 | 0.0 | Risk mitigation | 11.1 | 0.0 | 0.0 |
| Cyber response | 22.2 | 0.0 | 0.0 | Risk monitoring | 11.1 | 0.0 | 0.0 |
| Cyber risk | 22.2 | 0.0 | 3.7 | Security protocol | 11.1 | 0.0 | 0.0 |
| Cyber threat | 22.2 | 4.0 | 0.0 | Security/Risk Policy | 33.3 | 0.0 | 0.0 |
| Cyber vulnerability | 66.7 | 0.0 | 0.0 | Service | 55.6 | 4.0 | 3.7 |
| Dependability | 22.2 | 0.0 | 0.0 | Situation | 33.3 | 0.0 | 0.0 |
| Detection | 55.6 | 0.0 | 3.7 | Stakeholder | 22.2 | 0.0 | 0.0 |
| Failure | 33.3 | 0.0 | 3.7 | Target | 44.4 | 0.0 | 0.0 |
| Fault | 33.3 | 0.0 | 0.0 | Threat | 44.4 | 12.0 | 18.5 |
| Treatment | 11.1 | 0.0 | 0.0 |
Content Analysis of Expert Elicitation for Cyber Risk Vocabulary Without Adjectives and Using Stem Form of Vocabulary Terms. The Cyber Risk Vocabulary Terms is the Full Form of the Vocabulary Term/Concept Identified by Oltramari and Kott. The Stemmed Vocabulary Terms Are the Stem (i.e., base) Form of the Word without Any Adjective. The Cyber Risk Ontology (CR Ont; N = 9) columns is the Percentage of Select Ontologies that Contain the Cyber Risk Specific Vocabulary Terms and as Determined by Oltramari and Kott. The Cyber Security Expert Elicitation (CS EE; N = 25) and Cyber Security Risk Expert Elicitation (CSR EE; N = 27) Columns Are Percentage of Experts Who Used the Term Within Their Definition of Cyber Security and Cyber Security Risk, Respectively
| Cyber Risk Vocabulary Terms | CR Ont | CS EE % | CSR EE % | Stemmed Vocabulary Terms | CS EE % | CSR EE % |
|---|---|---|---|---|---|---|
| Cyber attack | 88.9 | 0.0 | 0.0 | Attack | 24.0 | 29.6 |
| Cyber defense | 22.2 | 0.0 | 0.0 | Defen | 8.0 | 0.0 |
| Cyber exploitation | 44.4 | 0.0 | 0.0 | Exploit | 0.0 | 11.1 |
| Cyber operation | 22.2 | 0.0 | 0.0 | Operat | 16.0 | 7.4 |
| Cyber response | 22.2 | 0.0 | 0.0 | Respon | 4.0 | 0.0 |
| Cyber vulnerability | 66.7 | 0.0 | 0.0 | Vulnerab | 4.0 | 25.9 |
| Dependability | 22.2 | 0.0 | 0.0 | Dependab | 4.0 | 0.0 |
| Risk identification | 11.1 | 0.0 | 0.0 | Identi | 24.0 | 14.8 |
| Risk metric | 33.3 | 0.0 | 0.0 | Metric | 4.0 | 3.7 |
| Risk mitigation | 11.1 | 0.0 | 0.0 | Mitigat | 8.0 | 0.0 |
Cyber Risk Vocabulary Terms and Concepts from Semantic Analysis of Ontologies (Oltramari & Kott, 2018) Not Used by Expert Elicitation Participants to Define Cyber Security or Cyber Security Risk. Asterisk Denotes Terms/Concepts Found in the Expert Elicitation in Their NonADJECTIVE Stemmed Form
| Alert | Cyber exploitation* | Dependability* | Risk factor | Security protocol |
|---|---|---|---|---|
| Configuration | Cyber incident | Fault | Risk identification* | Security/Risk Policy |
| Countermeasure | Cyber operation* | Mission | Risk metric* | Situation |
| Cyber attack* | Cyber response* | Payload | Risk mitigation* | Stakeholder |
| Cyber defense* | Cyber vulnerability* | Report | Risk monitoring | Target |
| Treatment |
Select Definitions of Cyber/Information Security and Risk from National and International Standards and Best Practices. Merriam‐Webster (MW) and Craigen et al., 2014 Are Standard or Best Practice, however it Provides Context for a Nontechnical General Definition
| Source | Security definition | Risk definition |
|---|---|---|
| MW |
Cybersecurity: “Measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack.” |
Security risk: 1) “someone who could damage an organization by giving information to an enemy or competitor” 2) “someone or something that is a risk to safety” |
| Craigen et al., |
Cybersecurity: “…the organization and collection of resources, processes, and structures used to protect cyberspace and cyberspace‐enabled systems from occurrences that misalign de jure from de facto property rights.” | No explicit definition for cyber or information security risk. |
| FISMA |
Information security: “The term ‘information security’ means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide: (A) integrity, which means guarding against improper information modification or destruction, and includes ensuring information nonrepudiation and authenticity; (B) confidentiality, which means preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information; and (C) availability, which means ensuring timely and reliable access to and use of information. | No explicit definition for cyber or information security risk. |
| ISO |
Cybersecurity: “Preservation of confidentiality, integrity and availability of information in the Cyberspace. In addition, other properties, such as authenticity, accountability, non‐repudiation, and reliability can also be involved” | No explicit definition for cyber or information security risk |
| ITU |
Cybersecurity: “The collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user's assets. Organization and user's assets include connected computing devices, personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and/or stored information in the cyber environment. Cybersecurity strives to ensure the attainment and maintenance of the security properties of the organization and user's assets against relevant security risks in the cyber environment. The general security objectives comprise the following: Availability; Integrity, which may include authenticity and nonrepudiation; Confidentiality” |
Security risk: “The probability that a threat will exploit a vulnerability to breach the security of an asset.” |
| NICCS |
Cybersecurity: “Strategy, policy, and standards regarding the security of and operations in cyberspace, and encompass[ing] the full range of threat reduction, vulnerability reduction, deterrence, international engagement, incident response, resiliency, and recovery policies and activities, including computer network operations, information assurance, law enforcement, diplomacy, military, and intelligence missions as they relate to the security and stability of the global information and communications infrastructure.” |
Risk: “The potential for an unwanted or adverse outcome resulting from an incident, event, or occurrence, as determined by the likelihood that a particular threat will exploit a particular vulnerability, with the associated consequences.” |
| NIST |
Cybersecurity: “The process of protecting information by preventing, detecting, and responding to attacks.” |
Risk: “A measure of the extent to which an entity is threatened by a potential circumstance or event, and typically a function of (i) the adverse impacts that would arise if the circumstance or event occurs; and (ii) the likelihood of occurrence.” |
| CNSS |
Cybersecurity: “Prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation.” |
Risk: “A measure of the extent to which an entity is threatened by a potential circumstance or event, and typically a function of (i) the adverse impacts that would arise if the circumstance or event occurs; and (ii) the likelihood of occurrence. Note: Information system‐related security risks are those risks that arise from the loss of confidentiality, integrity, or availability of information or information systems and reflect the potential adverse impacts to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the Nation. Adverse impacts to the Nation include, for example, compromises to information systems that support critical infrastructure applications or are paramount to government continuity of operations as defined by the Department of Homeland Security.” |
| WEF |
Cybersecurity: “‘Cybersecurity’ refers to analysis, warning, information sharing, vulnerability reduction, risk mitigation and recovery efforts for networked information systems.” |
Cyber risk: ‘Cyber risks’ are defined as the combination of the probability of an event within the realm of networked information systems and the consequences of this event on assets and reputation.” |
MW, 2020.: Merriam‐Webster Dictionary; FISMA: United States Federal Information Security Modernization Act of 2014 (ISO, 2012; U.S. Congress, 2014): International Organization for Standardization; ITU: International Telecommunication Union, 2008, 2011; NICCS: National Initiative for Cybersecurity Careers and Studies (DHS, 2020); NIST, 2018: United States National Institute of Standards and Technology; CNSS, 2015, : United States Committee on National Security Systems; WEF, 2012: World Economic Forum.
Comparison of third‐order thematic Analysis Themes Identified in the Definition of Cyber/Information Security for US and International Standards and Best Practices
| Third‐Order Theme(Expert Elicitation Interviewee Count; Percent) | MW | Craigen et al., | FISMA | ISO | ITU | NICCS | NIST | CNSS | WEF |
|---|---|---|---|---|---|---|---|---|---|
| Context‐driven (13; 52%) | (x) | ||||||||
| Resilient system functionality (12; 48%) | x | x | x | x | x | ||||
| Maintenance of CIA (10; 40%) | x | x | x | (x) | x | ||||
| Threat prediction and prevention (7; 28%) | (x) | (x) | (x) | (x) | x | x | x | (x) | |
| Protection of resources (6; 24%) | x | X | x | (x) | x | x | x | x | (x) |
| Sociotechnical system (5; 20%) | x | ∼ | |||||||
| Unattainable (4; 16%) | |||||||||
| Resource management (4; 6%) | (x) | (x) | (x) | (x) | x | x | (x) | x | (x) |
| Comprehensive system awareness (3; 12%) | (x) | (x) | ∼ | ||||||
| Evolving security standards (3; 12%) | |||||||||
| Iterative (and/or active) process (2; 8%) | (x) | (x) | ∼ | (x) | |||||
| Accurate intrusion detection (2; 8%) | (x) | ∼ | ∼ | x | (x) | ||||
| Security competence (2; 8%) | (x) | (x) | |||||||
| Verifiable information provenance (2; 8%) | (x) | (x) | x | ||||||
| Characterization and effects of human factor (2; 8%) | |||||||||
| Diverse dimensions and factors (2; 8%) | ∼ | x | ∼ | ||||||
| Quantifiable security (2; 8%) | |||||||||
| Complicated (1; 4%) | |||||||||
| Systemic solutions (1; 4%) | X | (x) | (x) |
x = Third‐order theme concept and or words explicitly included in definition; (x) = third‐order theme concept is implicit in definition, ∼ = required assumption for definition context.
Source of definition is not a standard or best practice, however it provides context for a nontechnical general definition.
MW, 2020: Merriam‐Webster Dictionary; FISMA: United States Federal Information Security Modernization Act of 2014 (ISO, 2012; U.S. Congress, 2014): International Organization for Standardization; ITU: International Telecommunication Union, 2008, 2011; NICCS: National Initiative for Cybersecurity Careers and Studies (DHS, 2020); NIST, 2018: United States National Institute of Standards and Technology; CNSS, 2015: United States Committee on National Security Systems; WEF, 2012: World Economic Forum.
Comparison of Third‐Order Thematic Analysis Themes Identified in the Definition of Cyber/Information Security Risk for US and International Standards and Best Practices. FIMSA nor ISO Provide an Explicit Definition for Cyber or Information Security Risk
| Third‐Order Theme(Expert Elicitation Interviewee Count; Percent) | MW | Craigen et al., | FISMA | ISO | ITU | NICCS | NIST | CNSS | WEF |
|---|---|---|---|---|---|---|---|---|---|
| Probability of outcomes (11; 41%) | N/A | N/A | N/A | x | x | (x) | x | x | |
| Impacts of CIA Vulnerabilities (10; 37%) | x | ||||||||
| Context‐driven (6; 22%) | (x) | ||||||||
| Uncertainties introduced by human factors (5; 19%) | x | ||||||||
| Vulnerabilities (known and unknown) (4; 15%) | x | x | |||||||
| Negative consequences (4; 15%) | x | (x) | x | x | x | ||||
| Absolute and relative resource valuation (4; 15%) | |||||||||
| Monetization (3; 11%) | |||||||||
| Negative consequences for humans (3; 11%) | (x) | x | |||||||
| Multiple dimensions and scales (3; 11%) | x | ∼ | |||||||
| Vulnerabilities introduced by human factors (3; 11%) | x | ||||||||
| Classical elements of risk (3; 11%) | x | x | x | x | (x) | ||||
| Sociotechnical exploitation (2; 7%) | ∼ | x | |||||||
| Complicated (2; 7%) | |||||||||
| Interference with physical components (2; 7%) | x | (x) | |||||||
| Interference with cyber security (2; 7%) | (x) | x | (x) | ||||||
| Probability of vulnerability (2; 7%) | x | x | (x) | (x) | |||||
| Scope of risk perception (2; 7%) | |||||||||
| Vulnerabilities in first line of defense (1; 4%) | (x) | ||||||||
| Limits of detection (1; 4%) | |||||||||
| Risk Quantification (1; 4%) | (x) | (x) | x | ||||||
| Agility is paramount (1; 4%) | |||||||||
| Agility‐dependent (1; 4%) | |||||||||
| Beyond CIA (1; 4%) | x | ||||||||
| Goal dependent (1; 4%) | |||||||||
| Multiple realms of threats (1; 4%) | x | x |
x = Third‐order theme concept and or words explicitly included in definition; (x) = third‐order theme concept is implicit in definition, ∼ = required assumption for definition context.
Source of definition is not a standard or best practice, however it provides context for a nontechnical general definition.
MW, 2020: Merriam‐Webster Dictionary; FISMA: United States Federal Information Security Modernization Act of 2014 (U.S. Congress); ISO, 2012: International Organization for Standardization; ITU: International Telecommunication Union, 2008, 2011; NICCS, 2020: National Initiative for Cybersecurity Careers and Studies; NIST, 2018: United States National Institute of Standards and Technology; CNSS, 2015: United States Committee on National Security Systems; WEF, 2012: World Economic Forum.