Skip to main content

Cyber Crises and Disaster Preparation in Austria: A Survey of Research Projects

  • Chapter
  • First Online:
Dynamics of Disasters

Part of the book series: Springer Optimization and Its Applications ((SOIA,volume 169))

  • 650 Accesses

Abstract

In this paper, we survey some recent applied research and development projects dealing with threat analysis and disaster scenario generation, preparation, management, and training funded by the security-focused funding scheme KIRAS by the Austrian government, which include efforts for the development and execution of serious games in the respective domains. In our analysis, we found multiple lines of multiyear, multi-project activities, which consistently improve and advance the technologies and capabilities available to the affected stakeholders. Based on this review of the state of the art, we identify areas of high-potential interest to direct future applied research and development efforts.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The Republic of Austria is a landlocked East Alpine country in the southern part of central Europe and a member of the European Union.

References

  1. ACCSA. https://www.kiras.at/gefoerderte-projekte/detail/d/accsa-austrian-cyber-crises-support-activities/. Accessed: 2020-09-22.

  2. CAIS. https://www.kiras.at/gefoerderte-projekte/detail/d/cais-cyber-attack-information-system/. Accessed: 2020-09-23.

  3. CCDCOE - The NATO Cooperative Cyber Defence Centre of Excellence is a multinational and interdisciplinary hub of cyber defence expertise. https://ccdcoe.org/. Accessed: 2020-09-22.

  4. Cerberus. https://www.kiras.at/gefoerderte-projekte/detail/d/cerberus/. Accessed: 2020-09-23.

  5. CERT-Komm. https://www.kiras.at/gefoerderte-projekte/detail/d/cert-komm/. Accessed: 2020 -09-23.

  6. CERT-Komm II. https://www.kiras.at/gefoerderte-projekte/detail/d/cert-komm-ii/. Accessed: 2020-09-23.

  7. CIIS. https://www.kiras.at/gefoerderte-projekte/detail/d/ciis-cyber-incident-information-sharing/. Accessed: 2020-09-22.

  8. CISA. https://www.kiras.at/gefoerderte-projekte/detail/d/cisa-cyber-incident-situational-awareness/. Accessed: 2020-09-22.

  9. CPS-Security. https://www.kiras.at/gefoerderte-projekte/detail/d/cps-security/. Accessed: 2020-09-22.

  10. CURSOR. https://www.kiras.at/en/financed-proposals/detail/d/cursor-cyber-security-exercise-concept-and-framework/. Accessed: 2020-09-22.

  11. Cyber Crime. https://www.kiras.at/gefoerderte-projekte/detail/d/cyber-crime/. Accessed: 2020-09-22.

  12. Cyber Heroes. https://www.kiras.at/gefoerderte-projekte/detail/d/cyber-heroes/. Accessed: 2020-09-22.

  13. CyberRoad: Home. http://www.cyberroad-project.eu/. Accessed: 2020-09-22.

  14. CybSiVerkehr. https://www.kiras.at/gefoerderte-projekte/detail/d/cybsiverkehr/. Accessed: 2020-09-22.

  15. ECSO - European Cyber Security Organisation. https://www.ecs-org.eu/. Accessed: 2020-09-22.

  16. INKA. https://www.kiras.at/gefoerderte-projekte/detail/d/inka/. Accessed: 2020-09-23.

  17. (K)ein Raum. https://www.kiras.at/gefoerderte-projekte/detail/d/kein-raum-cyber-gewalt-gegen-frauen-in-ex-beziehungen/. Accessed: 2020-09-22.

  18. KIRAS - Security Research. https://www.kiras.at/en/home/. Accessed: 2020-09-22.

  19. LMK-MUSE. https://www.kiras.at/gefoerderte-projekte/detail/d/lmk-muse/. Accessed: 2020-09-22.

  20. MetaRisk. https://www.kiras.at/gefoerderte-projekte/detail/d/metarisk/. Accessed: 2020-09-23.

  21. Providentia. https://www.kiras.at/gefoerderte-projekte/detail/d/providentia-erhoehung-des-sicherheitsniveaus-oesterreichs-durch-sichere-beschaffung/. Accessed: 2020-09-23.

  22. Public Warning and Alert System for Austria. https://www.kiras.at/gefoerderte-projekte/detail/d/pasa/. Accessed: 2020-09-22.

  23. Risiko- und Krisenmanagement für die Ernährungsvorsorge in Österreich. https://www.kiras.at/gefoerderte-projekte/detail/d/risiko-und-krisenmanagement-fuer-die-ernaehrungsvorsorge-in-oesterreich-ev-a/. Accessed: 2020-09-22.

  24. SCUDO. https://www.kiras.at/gefoerderte-projekte/detail/d/scudo/. Accessed: 2020-09-22.

  25. The Directive on security of network and information systems (NIS Directive) — Shaping Europe’s digital future. https://ec.europa.eu/digital-single-market/en/network-and-information-security-nis-directive. Accessed: 2020-09-22.

  26. Romana Berariu, Christian Fikar, Manfred Gronalt, and Patrick Hirsch. Understanding the impact of cascade effects of natural disasters on disaster relief operations. International Journal of Disaster Risk Reduction, 12:350 – 356, 2015.

    Google Scholar 

  27. Cybersecurity & Infrastructure Security Agency, Department of Homeland Security, The White House. Cyber Storm. https://www.cisa.gov/cyber-storm-securing-cyber-space. Accessed: 2020-09-22.

  28. ENISA. Cyber Exercises. https://www.enisa.europa.eu/topics/cyber-exercises. Accessed: 2020-09-22.

  29. EU. Secure societies – Protecting freedom and security of Europe and its citizens. https://ec.europa.eu/programmes/horizon2020/en/h2020-section/secure-societies-%E2%80%93-protecting-freedom-and-security-europe-and-its-citizens. Accessed: 2020-09-22.

  30. M. Frank, M. Leitner, and T. Pahi. Design considerations for cyber security testbeds: A case study on a cyber security testbed for education. In 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), pages 38–46, 2017.

    Google Scholar 

  31. Ivo Friedberg, Florian Skopik, and Roman Fiedler. Cyber situational awareness through network anomaly detection: state of the art and new approaches. e & i Elektrotechnik und Informationstechnik, 132(2):101–105, 2015.

    Article  Google Scholar 

  32. Ivo Friedberg, Florian Skopik, Giuseppe Settanni, and Roman Fiedler. Combating advanced persistent threats: From network event correlation to incident detection. Computers & Security, 48:35–57, 2015.

    Article  Google Scholar 

  33. Ivan Gojmerac, Christoph Ruggenthaler, Maria Egly, Wolfgang Vorraber, Julia Brugger, Helmut Aschbacher, Katrin Panzenbock, and Markus Christian. Advanced information systems for enhanced civil-military interoperability in austria. pages 1–8, 12 2016.

    Google Scholar 

  34. Otto Hellwig, Gerald Quirchmayr, Edith Huber, Timo Mischitz, and Markus Huber. Towards a cert-communication model as basis to software assurance. In 2015 10th International Conference on Availability, Reliability and Security, pages 481–485. IEEE, 2015.

    Google Scholar 

  35. Edith Huber. Sicherheit in Cyber-Netzwerken: Computer Emergency Response Teams und ihre Kommunikation. Springer-Verlag, 2015.

    Google Scholar 

  36. Peter Kieseberg. Research and innovation. Augmented R ealit y, page 28.

    Google Scholar 

  37. Helmut Leopold. Cyber situational awareness. e & i Elektrotechnik und Informationstechnik, 132(2):97–100, 2015.

    Article  Google Scholar 

  38. Helmut Leopold, Florian Skopik, Thomas Bleier, Josef Schröfl, Mike Fandler, Roland Ledinger, and Timo Mischitz. Einleitung zum cyber attack information system. In Cyber Attack Information System, pages 1–12. Springer, 2015.

    Google Scholar 

  39. G. Lichtenegger, W. Vorraber, I. Gojmerac, A. Sporer, J. Brugger, E. Exner, H. Aschbacher, M. Christian, and S. Voessner. Identification of information gaps in civil-military cooperation in disaster management. In 2015 2nd International Conference on Information and Communication Technologies for Disaster Management (ICT-DM), pages 122–129, 2015.

    Google Scholar 

  40. Bernd Malle, Peter Kieseberg, Edgar Weippl, and Andreas Holzinger. The right to be forgotten: Towards machine learning on perturbed knowledge bases. In Availability, Reliability, and Security in Information Systems, 2016.

    Google Scholar 

  41. Christian Meurers, Johannes Göllner, Stefan Schauer, Stefan Schiebeck, Andreas Peer, and Martin Stierle. Meta risk model for critical infrastructures. In European Meetings on Cybernetics and Systems Research 2014, pages 616–621, 2014.

    Google Scholar 

  42. Timea Pahi, Maria Leitner, and Florian Skopik. Analysis and assessment of situational awareness models for national cyber security centers. pages 334–345, 01 2017.

    Google Scholar 

  43. A. Preinerstorfer, M. Egly, I. Gojmerac, C. Hochwarter, C. Schuster, and R. Stocker. Requirements for the next generation public warning and alert system for austria. In 2017 14th International Conference on Telecommunications (ConTEL), pages 115–122, 2017.

    Google Scholar 

  44. S. Schauer, S. Rass, S. König, Thomas Grafenauer, and Martin Latzenhofer. Analyzing cascading effects among critical infrastructures. In ISCRAM, 2018.

    Google Scholar 

  45. Giuseppe Settanni., Florian Skopik., Yegor Shovgenya., and Roman Fiedler. A collaborative analysis system for cross-organization cyber incident handling. In Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,, pages 105–116. INSTICC, SciTePress, 2016.

    Google Scholar 

  46. F. Skopik and S. Filip. Design principles for national cyber security sensor networks: Lessons learned from small-scale demonstrators. In 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), pages 1–8, 2019.

    Google Scholar 

  47. F. Skopik, G. Settanni, R. Fiedler, and I. Friedberg. Semi-synthetic data set generation for security software evaluation. In 2014 Twelfth Annual International Conference on Privacy, Security and Trust, pages 156–163, 2014.

    Google Scholar 

  48. F. Skopik, M. Wurzenberger, G. Settanni, and R. Fiedler. Establishing national cyber situational awareness through incident information clustering. In 2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), pages 1–8, 2015.

    Google Scholar 

  49. Florian Skopik. The limitations of national cyber security sensor networks debunked: Why the human factor matters. In ICCWS 2019 14th International Conference on Cyber Warfare and Security: ICCWS 2019, page 405. Academic Conferences and publishing limited, 2019.

    Google Scholar 

  50. Florian Skopik, Thomas Bleier, and Roman Fiedler. Information management and sharing for national cyber situational awareness. In ISSE 2012 Securing Electronic Business Processes, pages 217–227. Springer, 2012.

    Google Scholar 

  51. Florian Skopik, Roman Fiedler, and Otmar Lendl. Cyber attack information sharing. Datenschutz und Datensicherheit-DuD, 38(4):251–256, 2014.

    Article  Google Scholar 

  52. Florian Skopik, Tímea Páhi, and Maria Leitner. Cyber Situational Awareness in Public-Private-Partnerships. Springer.

    Google Scholar 

  53. Florian Skopik, Giuseppe Settanni, and Roman Fiedler. A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing. Computers & Security, 60:154–176, 2016.

    Article  Google Scholar 

  54. Aleksandra Solinska-Nowak, Piotr Magnuszewski, Margot Curl, Adam French, Adriana Keating, Junko Mochizuki, Wei Liu, Reinhard Mechler, Michalina Kulakowska, and Lukasz Jarzabek. An overview of serious games for disaster risk management – prospects and limitations for informing actions to arrest increasing risk. International Journal of Disaster Risk Reduction, 31:1013 – 1029, 2018.

    Google Scholar 

  55. M. Wurzenberger, F. Skopik, G. Settanni, and R. Fiedler. Beyond gut instincts: Understanding, rating and comparing self-learning idss. In 2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), pages 1–1, 2015.

    Google Scholar 

Download references

Acknowledgements

SBA Research (SBA-K1) is a COMET Center within the framework of COMET – Competence Centers for Excellent Technologies Program – and funded by BMK, BMDW, and the federal state of Vienna. The COMET Program is managed by FFG.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dimitris E. Simos .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Garn, B., Kieseberg, K., Schreiber, D., Simos, D.E. (2021). Cyber Crises and Disaster Preparation in Austria: A Survey of Research Projects. In: Kotsireas, I.S., Nagurney, A., Pardalos, P.M., Tsokas, A. (eds) Dynamics of Disasters. Springer Optimization and Its Applications, vol 169. Springer, Cham. https://doi.org/10.1007/978-3-030-64973-9_7

Download citation

Publish with us

Policies and ethics