Abstract
In this paper, we survey some recent applied research and development projects dealing with threat analysis and disaster scenario generation, preparation, management, and training funded by the security-focused funding scheme KIRAS by the Austrian government, which include efforts for the development and execution of serious games in the respective domains. In our analysis, we found multiple lines of multiyear, multi-project activities, which consistently improve and advance the technologies and capabilities available to the affected stakeholders. Based on this review of the state of the art, we identify areas of high-potential interest to direct future applied research and development efforts.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
The Republic of Austria is a landlocked East Alpine country in the southern part of central Europe and a member of the European Union.
References
ACCSA. https://www.kiras.at/gefoerderte-projekte/detail/d/accsa-austrian-cyber-crises-support-activities/. Accessed: 2020-09-22.
CAIS. https://www.kiras.at/gefoerderte-projekte/detail/d/cais-cyber-attack-information-system/. Accessed: 2020-09-23.
CCDCOE - The NATO Cooperative Cyber Defence Centre of Excellence is a multinational and interdisciplinary hub of cyber defence expertise. https://ccdcoe.org/. Accessed: 2020-09-22.
Cerberus. https://www.kiras.at/gefoerderte-projekte/detail/d/cerberus/. Accessed: 2020-09-23.
CERT-Komm. https://www.kiras.at/gefoerderte-projekte/detail/d/cert-komm/. Accessed: 2020 -09-23.
CERT-Komm II. https://www.kiras.at/gefoerderte-projekte/detail/d/cert-komm-ii/. Accessed: 2020-09-23.
CIIS. https://www.kiras.at/gefoerderte-projekte/detail/d/ciis-cyber-incident-information-sharing/. Accessed: 2020-09-22.
CISA. https://www.kiras.at/gefoerderte-projekte/detail/d/cisa-cyber-incident-situational-awareness/. Accessed: 2020-09-22.
CPS-Security. https://www.kiras.at/gefoerderte-projekte/detail/d/cps-security/. Accessed: 2020-09-22.
CURSOR. https://www.kiras.at/en/financed-proposals/detail/d/cursor-cyber-security-exercise-concept-and-framework/. Accessed: 2020-09-22.
Cyber Crime. https://www.kiras.at/gefoerderte-projekte/detail/d/cyber-crime/. Accessed: 2020-09-22.
Cyber Heroes. https://www.kiras.at/gefoerderte-projekte/detail/d/cyber-heroes/. Accessed: 2020-09-22.
CyberRoad: Home. http://www.cyberroad-project.eu/. Accessed: 2020-09-22.
CybSiVerkehr. https://www.kiras.at/gefoerderte-projekte/detail/d/cybsiverkehr/. Accessed: 2020-09-22.
ECSO - European Cyber Security Organisation. https://www.ecs-org.eu/. Accessed: 2020-09-22.
INKA. https://www.kiras.at/gefoerderte-projekte/detail/d/inka/. Accessed: 2020-09-23.
(K)ein Raum. https://www.kiras.at/gefoerderte-projekte/detail/d/kein-raum-cyber-gewalt-gegen-frauen-in-ex-beziehungen/. Accessed: 2020-09-22.
KIRAS - Security Research. https://www.kiras.at/en/home/. Accessed: 2020-09-22.
LMK-MUSE. https://www.kiras.at/gefoerderte-projekte/detail/d/lmk-muse/. Accessed: 2020-09-22.
MetaRisk. https://www.kiras.at/gefoerderte-projekte/detail/d/metarisk/. Accessed: 2020-09-23.
Providentia. https://www.kiras.at/gefoerderte-projekte/detail/d/providentia-erhoehung-des-sicherheitsniveaus-oesterreichs-durch-sichere-beschaffung/. Accessed: 2020-09-23.
Public Warning and Alert System for Austria. https://www.kiras.at/gefoerderte-projekte/detail/d/pasa/. Accessed: 2020-09-22.
Risiko- und Krisenmanagement für die Ernährungsvorsorge in Österreich. https://www.kiras.at/gefoerderte-projekte/detail/d/risiko-und-krisenmanagement-fuer-die-ernaehrungsvorsorge-in-oesterreich-ev-a/. Accessed: 2020-09-22.
SCUDO. https://www.kiras.at/gefoerderte-projekte/detail/d/scudo/. Accessed: 2020-09-22.
The Directive on security of network and information systems (NIS Directive) — Shaping Europe’s digital future. https://ec.europa.eu/digital-single-market/en/network-and-information-security-nis-directive. Accessed: 2020-09-22.
Romana Berariu, Christian Fikar, Manfred Gronalt, and Patrick Hirsch. Understanding the impact of cascade effects of natural disasters on disaster relief operations. International Journal of Disaster Risk Reduction, 12:350 – 356, 2015.
Cybersecurity & Infrastructure Security Agency, Department of Homeland Security, The White House. Cyber Storm. https://www.cisa.gov/cyber-storm-securing-cyber-space. Accessed: 2020-09-22.
ENISA. Cyber Exercises. https://www.enisa.europa.eu/topics/cyber-exercises. Accessed: 2020-09-22.
EU. Secure societies – Protecting freedom and security of Europe and its citizens. https://ec.europa.eu/programmes/horizon2020/en/h2020-section/secure-societies-%E2%80%93-protecting-freedom-and-security-europe-and-its-citizens. Accessed: 2020-09-22.
M. Frank, M. Leitner, and T. Pahi. Design considerations for cyber security testbeds: A case study on a cyber security testbed for education. In 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), pages 38–46, 2017.
Ivo Friedberg, Florian Skopik, and Roman Fiedler. Cyber situational awareness through network anomaly detection: state of the art and new approaches. e & i Elektrotechnik und Informationstechnik, 132(2):101–105, 2015.
Ivo Friedberg, Florian Skopik, Giuseppe Settanni, and Roman Fiedler. Combating advanced persistent threats: From network event correlation to incident detection. Computers & Security, 48:35–57, 2015.
Ivan Gojmerac, Christoph Ruggenthaler, Maria Egly, Wolfgang Vorraber, Julia Brugger, Helmut Aschbacher, Katrin Panzenbock, and Markus Christian. Advanced information systems for enhanced civil-military interoperability in austria. pages 1–8, 12 2016.
Otto Hellwig, Gerald Quirchmayr, Edith Huber, Timo Mischitz, and Markus Huber. Towards a cert-communication model as basis to software assurance. In 2015 10th International Conference on Availability, Reliability and Security, pages 481–485. IEEE, 2015.
Edith Huber. Sicherheit in Cyber-Netzwerken: Computer Emergency Response Teams und ihre Kommunikation. Springer-Verlag, 2015.
Peter Kieseberg. Research and innovation. Augmented R ealit y, page 28.
Helmut Leopold. Cyber situational awareness. e & i Elektrotechnik und Informationstechnik, 132(2):97–100, 2015.
Helmut Leopold, Florian Skopik, Thomas Bleier, Josef Schröfl, Mike Fandler, Roland Ledinger, and Timo Mischitz. Einleitung zum cyber attack information system. In Cyber Attack Information System, pages 1–12. Springer, 2015.
G. Lichtenegger, W. Vorraber, I. Gojmerac, A. Sporer, J. Brugger, E. Exner, H. Aschbacher, M. Christian, and S. Voessner. Identification of information gaps in civil-military cooperation in disaster management. In 2015 2nd International Conference on Information and Communication Technologies for Disaster Management (ICT-DM), pages 122–129, 2015.
Bernd Malle, Peter Kieseberg, Edgar Weippl, and Andreas Holzinger. The right to be forgotten: Towards machine learning on perturbed knowledge bases. In Availability, Reliability, and Security in Information Systems, 2016.
Christian Meurers, Johannes Göllner, Stefan Schauer, Stefan Schiebeck, Andreas Peer, and Martin Stierle. Meta risk model for critical infrastructures. In European Meetings on Cybernetics and Systems Research 2014, pages 616–621, 2014.
Timea Pahi, Maria Leitner, and Florian Skopik. Analysis and assessment of situational awareness models for national cyber security centers. pages 334–345, 01 2017.
A. Preinerstorfer, M. Egly, I. Gojmerac, C. Hochwarter, C. Schuster, and R. Stocker. Requirements for the next generation public warning and alert system for austria. In 2017 14th International Conference on Telecommunications (ConTEL), pages 115–122, 2017.
S. Schauer, S. Rass, S. König, Thomas Grafenauer, and Martin Latzenhofer. Analyzing cascading effects among critical infrastructures. In ISCRAM, 2018.
Giuseppe Settanni., Florian Skopik., Yegor Shovgenya., and Roman Fiedler. A collaborative analysis system for cross-organization cyber incident handling. In Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,, pages 105–116. INSTICC, SciTePress, 2016.
F. Skopik and S. Filip. Design principles for national cyber security sensor networks: Lessons learned from small-scale demonstrators. In 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), pages 1–8, 2019.
F. Skopik, G. Settanni, R. Fiedler, and I. Friedberg. Semi-synthetic data set generation for security software evaluation. In 2014 Twelfth Annual International Conference on Privacy, Security and Trust, pages 156–163, 2014.
F. Skopik, M. Wurzenberger, G. Settanni, and R. Fiedler. Establishing national cyber situational awareness through incident information clustering. In 2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), pages 1–8, 2015.
Florian Skopik. The limitations of national cyber security sensor networks debunked: Why the human factor matters. In ICCWS 2019 14th International Conference on Cyber Warfare and Security: ICCWS 2019, page 405. Academic Conferences and publishing limited, 2019.
Florian Skopik, Thomas Bleier, and Roman Fiedler. Information management and sharing for national cyber situational awareness. In ISSE 2012 Securing Electronic Business Processes, pages 217–227. Springer, 2012.
Florian Skopik, Roman Fiedler, and Otmar Lendl. Cyber attack information sharing. Datenschutz und Datensicherheit-DuD, 38(4):251–256, 2014.
Florian Skopik, TÃmea Páhi, and Maria Leitner. Cyber Situational Awareness in Public-Private-Partnerships. Springer.
Florian Skopik, Giuseppe Settanni, and Roman Fiedler. A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing. Computers & Security, 60:154–176, 2016.
Aleksandra Solinska-Nowak, Piotr Magnuszewski, Margot Curl, Adam French, Adriana Keating, Junko Mochizuki, Wei Liu, Reinhard Mechler, Michalina Kulakowska, and Lukasz Jarzabek. An overview of serious games for disaster risk management – prospects and limitations for informing actions to arrest increasing risk. International Journal of Disaster Risk Reduction, 31:1013 – 1029, 2018.
M. Wurzenberger, F. Skopik, G. Settanni, and R. Fiedler. Beyond gut instincts: Understanding, rating and comparing self-learning idss. In 2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), pages 1–1, 2015.
Acknowledgements
SBA Research (SBA-K1) is a COMET Center within the framework of COMET – Competence Centers for Excellent Technologies Program – and funded by BMK, BMDW, and the federal state of Vienna. The COMET Program is managed by FFG.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Garn, B., Kieseberg, K., Schreiber, D., Simos, D.E. (2021). Cyber Crises and Disaster Preparation in Austria: A Survey of Research Projects. In: Kotsireas, I.S., Nagurney, A., Pardalos, P.M., Tsokas, A. (eds) Dynamics of Disasters. Springer Optimization and Its Applications, vol 169. Springer, Cham. https://doi.org/10.1007/978-3-030-64973-9_7
Download citation
DOI: https://doi.org/10.1007/978-3-030-64973-9_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-64972-2
Online ISBN: 978-3-030-64973-9
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)