TY - GEN
T1 - Towards a Cyber Counterintelligence maturity model
AU - Jaquire, Victor
AU - Von Solms, Sebastiaan
PY - 2017
Y1 - 2017
N2 - Cyber-attacks are on the increase [PWC, 2015]. Severe breaches, especially on critical information infrastructure are increasingly affecting nearly every environment - from citizens to private companies to governments. At present cyberspace is possibly more insecure than it has ever been and it will, at least for the near future, be the most secure that it is going to be [Bodmer, 2012]. "Staying vulnerable while waiting for a security patch from your software vendor is an anachronistic method that won't survive this new world" [Farchi, 2016]. The traditionally trusted defensive-only solutions are no longer sufficient to safeguard environments such as government and private business. Both of these environments need to be innovative in their approach to cyber issues. "Just as intelligence organizations are tracking the activities of terrorist cells trying to stop them before they take action, going after the malicious attackers before they are able to commit attacks is the desired approach" [Bodmer, 2012]. This desired approach, this paper argues, has to have Cyber Counterintelligence at its core. This paper aims to add to the budding discourse on cyber counterintelligence (CCI) through the position of a CCI maturity model. It explores cyber counterintelligence (CCI) and its relation to the main concept of counterintelligence (CI). It deliberates on the need for cyber counterintelligence (CCI) practices in conjunction with traditional defensive and/or offensive cyber measures within both government and private sector business. It argues the augmented effectiveness of cybersecurity when incorporating a dedicated focus on defensive, offensive, passive and active measures in a multi-disciplinary and integrated CCI approach. This culminates in a discussion on an appropriate CCI framework, as the underlying basis for a CCI maturity model, and highlights the quintessence for the establishment of a CCI maturity model that can be customised for government and private sector alike.
AB - Cyber-attacks are on the increase [PWC, 2015]. Severe breaches, especially on critical information infrastructure are increasingly affecting nearly every environment - from citizens to private companies to governments. At present cyberspace is possibly more insecure than it has ever been and it will, at least for the near future, be the most secure that it is going to be [Bodmer, 2012]. "Staying vulnerable while waiting for a security patch from your software vendor is an anachronistic method that won't survive this new world" [Farchi, 2016]. The traditionally trusted defensive-only solutions are no longer sufficient to safeguard environments such as government and private business. Both of these environments need to be innovative in their approach to cyber issues. "Just as intelligence organizations are tracking the activities of terrorist cells trying to stop them before they take action, going after the malicious attackers before they are able to commit attacks is the desired approach" [Bodmer, 2012]. This desired approach, this paper argues, has to have Cyber Counterintelligence at its core. This paper aims to add to the budding discourse on cyber counterintelligence (CCI) through the position of a CCI maturity model. It explores cyber counterintelligence (CCI) and its relation to the main concept of counterintelligence (CI). It deliberates on the need for cyber counterintelligence (CCI) practices in conjunction with traditional defensive and/or offensive cyber measures within both government and private sector business. It argues the augmented effectiveness of cybersecurity when incorporating a dedicated focus on defensive, offensive, passive and active measures in a multi-disciplinary and integrated CCI approach. This culminates in a discussion on an appropriate CCI framework, as the underlying basis for a CCI maturity model, and highlights the quintessence for the establishment of a CCI maturity model that can be customised for government and private sector alike.
KW - Cyber Counterintelligence
KW - Cyber counterintelligence levels
KW - Cyber counterintelligence maturity
KW - Cyber threat intelligence
KW - Defensive and offensive cybersecurity
UR - http://www.scopus.com/inward/record.url?scp=85019005585&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:85019005585
T3 - Proceedings of the 12th International Conference on Cyber Warfare and Security, ICCWS 2017
SP - 432
EP - 440
BT - Proceedings of the 12th International Conference on Cyber Warfare and Security, ICCWS 2017
A2 - Lopez, Juan R.
A2 - Bryant, Adam R.
A2 - Mills, Robert F.
PB - Academic Conferences and Publishing International Limited
T2 - 12th International Conference on Cyber Warfare and Security, ICCWS 2017
Y2 - 2 March 2017 through 3 March 2017
ER -