Abstract
In my talk, I outline a number of cyber-attacks that have been reported in recent years, and examine the vulnerability of organisations and critical infrastructure to them. I then discuss an approach to combating cyber-threats that integrates specialised tools within a managed service platform to create a command, control an intelligence (C2I) system used to co-ordinated defences against a diverse collection of resourceful and persistent opponents. The discussion is illustrated with examples from BT research and development projects. Such a system will have to be refreshed and up-graded regularly to keep pace with challenges such as:
-
The escalating arms race against threat agents,
-
Innovations in technology and business practice,
-
Changing regulations and compliance demands,
-
A cyber-Moore’s Law that dictates a continual shrinking of required response times
Ultimately it will need to be adaptive and to learn from experience.
Chapter PDF
Similar content being viewed by others
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 IFIP International Federation for Information Processing
About this paper
Cite this paper
Kearney, P. (2012). Towards a C2I Platform for Combating the Cyber-Threat. In: Askoxylakis, I., Pöhls, H.C., Posegga, J. (eds) Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems. WISTP 2012. Lecture Notes in Computer Science, vol 7322. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30955-7_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-30955-7_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30954-0
Online ISBN: 978-3-642-30955-7
eBook Packages: Computer ScienceComputer Science (R0)