Abstract
To achieve information superiority, a hybrid situational awareness (HSA) is essential, by merging traditional physical situational awareness (SA) capability, with cyber-intelligence sources to obtain SA on adversaries’ capabilities in the information environment. The integration of Intel disciplines such as SIGINT, HUMINT and OSINT (including social engineering analysis techniques through machine learning), along with deception techniques to characterize adversaries’ cyber-abilities (TTP), will conduct to a suitable HSA. Considering some recent case studies of cyber-attacks attributed to Russia, we will analyse how generating an HSA improves cyber-incident handling capability, particularly its threat hunting functions, during multi-domain attacks on critical infrastructures.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
CYCOP—Cyber Common Operational Picture—provides an immersive virtual reality and a real-time risk analysis tool. It was developed by the Spanish Joint Cyberspace Command and Universitat Politecnica de Valencia.
- 2.
Kevin Mitnick (born in 1963) is an American computer security consultant, author and hacker. In the mid-90 s, he was ‘The World’s Most Wanted Hacker’ by the FBI, specialized in social engineering. He was convicted on multiple counts of wire fraud, possession of unauthorized access devices and other cybercrimes and spent 5 years in jail (TheFamousPeople, 2021).
References
ACT. (2011). Assured access to the global commons—Findings and recommendations. NATO.
Bennett, W. (2007). Counterdeception principles and applications for national security. Artech House.
Dragos. (2019). xenotime. Récupéré sur dragos: https://www.dragos.com/threat/xenotime/ Accessed February 1, 2021.
Endsley, M. R. (1995). Toward a theory of situation awareness in dynamic systems. Human Factors Journal,37(1), 32–64.
EU. (2008). Council Directive 2008/114/EC. European Union.
FireEye. (2020, December). apt-groups.html#russia. Récupéré sur. Retrieved February 1, 2021, from https://www.fireeye.com: https://www.fireeye.com/current-threats/apt-groups.html#russia.
Global Commons Alliance. (2020, December). global-commons. Récupéré sur globalcommonsalliance.org. Retrieved February 1, 2021, from https://globalcommonsalliance.org/global-commons/.
Heckman, S. T. (2015). Cyber denial, deception and counter deception. In Advances in Information Security (64). Springer.
Hingant. (2018). A hybrid intelligence system for critical infrastructures protection. (p. 13). Wiley.
JCS. (2012). Military deception. Joint Chiefs of Staff.
JCS. (2014a). JP 2–01.3 Joint intelligence preparation of the operational environment. Joint Chiefs of Staff.
JCS. (2014b). JP 3–13 information operations. Joint Chiefs of Staff.
JCS. (2017). JP 3–0 joint operations. Joint Chiefs of Staff.
Libicki, M. (2012). Cyberspace is not a warfighting domain. Journal of Law and Policy for the Information Society,8(2), 325–340.
Mallick, P. (2018). Enhanced situational awareness for modern warfare.
MITRE Corporation. (2020). groups. Récupéré sur MITRE ATTandCK. Retrieved February 1, 2021, from https://attack.mitre.org/groups/.
PandaSecurity. (2019). xenotime-apt-critical-infrastructure. Récupéré sur www.pandasecurity.com. Retrieved February 1, 2021, from https://www.pandasecurity.com/en/mediacenter/news/xenotime-apt-critical-infrastructure/.
Posen, B. R. (2003). Command of the commons: The military foundation of U.S. Hegemony. International Security, 28(1), 8–9.
Seals, T. (2019). trisis-physical-destruction-electric-companies. Récupéré sur Threatpost. Retrieved February 1, 2021, from https://threatpost.com/trisis-physical-destruction-electric-companies/145712/.
Seymour, T. (2016). Weaponizing data science for social engineering: Automated E2E spear phishing on Twitter. BlackHat.
Steinhart, A. (2014). The future is behind us? The human factor in cyber intelligence: Interplay between Cyber-HUMINT, Hackers and Social Engineering. Journal of Diplomacy, Diplomatic Institute.
TheFamousPeople. (2021, 01). https://www.thefamouspeople.com/profiles/. Récupéré sur https://www.thefamouspeople.com/. Retrieved February 1, 2021, from https://www.thefamouspeople.com/profiles/kevin-mitnick-37791.php.
US Army. (2019). FM 3–13.4 army support to military deception. Government Printing Office.
Vacca, W. A. (2011). Military culture and cyber security. Survival - Global Politics and Strategy, 164.
Bleidorn, W., & Hopwood, C. J. (2018). Using machine learning to advance personality assessment and theory. Personality and Social Psychology Review.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Antunes, D., Esteve, M. (2021). Hybrid Situational Awareness Against Cyber-Attacks. In: Mölder, H., Sazonov, V., Chochia, A., Kerikmäe, T. (eds) The Russian Federation in Global Knowledge Warfare. Contributions to International Relations. Springer, Cham. https://doi.org/10.1007/978-3-030-73955-3_12
Download citation
DOI: https://doi.org/10.1007/978-3-030-73955-3_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-73954-6
Online ISBN: 978-3-030-73955-3
eBook Packages: Political Science and International StudiesPolitical Science and International Studies (R0)