Skip to main content

2018 | OriginalPaper | Buchkapitel

What You Can Change and What You Can’t: Human Experience in Computer Network Defenses

verfasst von : Vivien M. Rooney, Simon N. Foley

Erschienen in: Secure IT Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The work of Computer Network Defense conducted, for instance, in Security Operations Centers and by Computer Security Incident Teams, is dependent not alone on technology, but also on people. Understanding how people experience these environments is an essential component toward achieving optimal functioning. This paper describes a qualitative research study on the human experience of working in these environments. Using Grounded Theory, a psychological understanding of the experience is developed. Results suggest that positive and negative aspects of the work are either amenable or not amenable to change. Areas of tension are identified, and posited as the focus for improving experience. For this purpose, psychological theories of Social Identity Theory, Relational Dialectics, and Cognitive Dissonance, provide a way of understanding and interpreting these components of Computer Network Defence work, and can be used to assess the experience of staff.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Baxter, L., Braithwaite, D.: Relational dialectics theory. In: Engaging Theories in Interpersonal Communication: Multiple Perspectives, pp. 349–361. Sage (2008) Baxter, L., Braithwaite, D.: Relational dialectics theory. In: Engaging Theories in Interpersonal Communication: Multiple Perspectives, pp. 349–361. Sage (2008)
2.
Zurück zum Zitat Charmaz, K.: Constructing Grounded Theory. Sage Publications, London (2006) Charmaz, K.: Constructing Grounded Theory. Sage Publications, London (2006)
3.
Zurück zum Zitat Chen, T., Shore, D., Zaccaro, S.J., Dalal, R.S., Tetrick, L., Gorab, A.: An organizational psychology perspective to examining computer security incident response teams. Secur. Priv. 5(12), 61–67 (2014)CrossRef Chen, T., Shore, D., Zaccaro, S.J., Dalal, R.S., Tetrick, L., Gorab, A.: An organizational psychology perspective to examining computer security incident response teams. Secur. Priv. 5(12), 61–67 (2014)CrossRef
4.
Zurück zum Zitat Festinger, L.: A Theory of Cognitive Dissonance. Stanford University Press, Palo Alto (1957) Festinger, L.: A Theory of Cognitive Dissonance. Stanford University Press, Palo Alto (1957)
6.
Zurück zum Zitat Kandogan, E., Haber, E.: Security administration tools and practices. In: Security and Usability: Designing Secure Systems that People Can Use (2006) Kandogan, E., Haber, E.: Security administration tools and practices. In: Security and Usability: Designing Secure Systems that People Can Use (2006)
7.
Zurück zum Zitat Kvale, S., Brinkmann, S.: InterViews. Learning the Craft of Qualitative Research Interviewing, 2nd edn. Sage Publications, London (2009) Kvale, S., Brinkmann, S.: InterViews. Learning the Craft of Qualitative Research Interviewing, 2nd edn. Sage Publications, London (2009)
8.
Zurück zum Zitat Liu, P., et al.: Human subject research protocol: Computer-aided human centric cyber situation awareness: Understanding cognitive processes of cyber analysts. Technical report ARL-TR-6731, Army Research Laboratory, MD, USA (2013) Liu, P., et al.: Human subject research protocol: Computer-aided human centric cyber situation awareness: Understanding cognitive processes of cyber analysts. Technical report ARL-TR-6731, Army Research Laboratory, MD, USA (2013)
9.
Zurück zum Zitat O’Connell, D., Kowal, S.: Basic principles of transcription. In: Rethinking Methods in Psychology. Part II, Discourse as Topic, chap. 7. Sage, London (1995) O’Connell, D., Kowal, S.: Basic principles of transcription. In: Rethinking Methods in Psychology. Part II, Discourse as Topic, chap. 7. Sage, London (1995)
11.
Zurück zum Zitat Sundaramurthy, S., et al.: A human capital model for mitigating security analyst burnout. In: Symposium on Usable Privacy and Security. USENIX (2015) Sundaramurthy, S., et al.: A human capital model for mitigating security analyst burnout. In: Symposium on Usable Privacy and Security. USENIX (2015)
12.
Zurück zum Zitat Sundaramurthy, S., et al.: Turning contradictions into innovations or: how we learned to stop whining and improve security operations. In: Symposium on Usable Privacy and Security (SOUPS). USENIX (2016) Sundaramurthy, S., et al.: Turning contradictions into innovations or: how we learned to stop whining and improve security operations. In: Symposium on Usable Privacy and Security (SOUPS). USENIX (2016)
13.
Zurück zum Zitat Tajfel, H., Turner, J.: An integrative theory of intergroup conflict. In: The Social Psychology of Intergroup Relations, pp. 33–47 (1979) Tajfel, H., Turner, J.: An integrative theory of intergroup conflict. In: The Social Psychology of Intergroup Relations, pp. 33–47 (1979)
15.
Zurück zum Zitat Velasquez, N., Weisband, S.: Work practices of system administrators: implications for tool design. In: Symposium on Computer Human Interaction for Management of Information Technology. ACM (2008) Velasquez, N., Weisband, S.: Work practices of system administrators: implications for tool design. In: Symposium on Computer Human Interaction for Management of Information Technology. ACM (2008)
16.
Zurück zum Zitat Weir, C., Rashid, A., Noble, J.: I’d like to have an argument, please: using dialectic for effective app security. In: EuroUSEC 2017. Internet Society, April 2017 Weir, C., Rashid, A., Noble, J.: I’d like to have an argument, please: using dialectic for effective app security. In: EuroUSEC 2017. Internet Society, April 2017
17.
Zurück zum Zitat Werlinger, R., Hawkey, K., Beznosov, K.: An integrated view of human, organizational, and technological challenges of it security management. Inf. Manag. Comput. Secur. 17(1), 4–19 (2009)CrossRef Werlinger, R., Hawkey, K., Beznosov, K.: An integrated view of human, organizational, and technological challenges of it security management. Inf. Manag. Comput. Secur. 17(1), 4–19 (2009)CrossRef
18.
Zurück zum Zitat Zimmerman, C.: Ten strategies of a world-class cybersecurity operations center. Technical report The MITRE Corporation, Bedford, MA, USA (2014) Zimmerman, C.: Ten strategies of a world-class cybersecurity operations center. Technical report The MITRE Corporation, Bedford, MA, USA (2014)
Metadaten
Titel
What You Can Change and What You Can’t: Human Experience in Computer Network Defenses
verfasst von
Vivien M. Rooney
Simon N. Foley
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-030-03638-6_14

Premium Partner