Explore chapters and articles related to this topic
Cybersecurity Counter Unmanned Aircraft Systems (C-UAS) and Artificial Intelligence (AI)
Published in R. Kurt Barnhart, Douglas M. Marshall, Eric J. Shappee, Introduction to Unmanned Aircraft Systems, 2021
A superior model for evaluation of INFOSEC was developed by Parker in 1998 (Parker, 2002). The Parkerian Hexad is a set of six elements of information security proposed by Donn B. Parker. The Parkerian Hexad adds three additional attributes (Possession or Control, Authenticity, and Utility) to the three classic security attributes (Confidentiality, Integrity, and Availability) of the CIA triad. These attributes of information cannot be broken down into further constituents; they are nonoverlapping unique aspects. Any information security breach can be described as affecting one or more of these fundamental attributes of information.
A linear model for optimal cybersecurity investment in Industry 4.0 supply chains
Published in International Journal of Production Research, 2022
A general objective of cybersecurity investment is to protect an asset against a compromise in the area of confidentiality, control, integrity, authenticity, availability and utility, where the six elements of information security are called the Parkerian hexad (Falco et al. 2019). The asset types may include systems and applications, networks or data, end-user systems, and off line media and devices. The various actions developed to prevent intrusions or to mitigate the impact of successful breaches and information flow disruptions are called security safeguards, countermeasures or controls. In view of the variety of methods used by attackers to infiltrate an IT infrastructure and disrupt operations, a wide range of different safeguards are developed. A common practice is also information redundancy. However, even the most sophisticated safeguards cannot be expected to completely block cyberattacks as new attack profiles proliferate and to adapt to them the implemented safeguards, both the long time and the high cost, are required. If no safeguards were implemented, the losses resulting from the increasing number of breaches and disruptions of information flows could rapidly excess the costs of safeguards implementations. For example, in 2018, there were 1244 data breaches in the USA with more than 446.5 million records exposed (Identity Theft Resource Center 2018). Despite more than a decade of heightened focus on cybersecurity investment, the breaches to cyber systems continue to grow, costing globally up to $575 billion annually (Verizon. 2017).