Page 113 - Artificial Intelligence for the Internet of Everything
P. 113
Policy Issues Regarding Implementations of Cyber Attack 99
rapid response to be possible, an early emphasis must be placed on supporting
relevant research and education.
An interesting side note related to this paper is that technology-focused,
system prototype experiments served to create early interactions between
technologists and policy makers that illuminated a number of important
issues related to policy. It would appear that prototype-based projects that
serve to couple government and industry would be a valuable method for
accelerating the partnerships necessary for identifying and addressing critical
policy issues. A preliminary strategy would include identifying safety-related
domains that demand the rapid integration of fast-changing technologies
into their physical systems. This article provides examples related to
advanced air traffic control and automated automotive systems.
ACKNOWLEDGMENTS
This material is based upon work supported, in whole or in part, by the US Department of
Defense through the Systems Engineering Research Center under Contract HQ0034-13-
0004. The SERC is a federally funded University Affiliated Research Center managed by
Stevens Institute of Technology, Hoboken, NJ, USA. Any opinions, findings, and conclu-
sions or recommendations expressed in this material are those of the authors and do not nec-
essarily reflect the views of the US Department of Defense.
REFERENCES
Babineau, G. L., Jones, R. A., & Horowitz, B. M. (2012). A system-aware cyber security
method for shipboard control systems with a method described to evaluate cyber security
solutions. In 2012 IEEE international conference on technologies for homeland security (HST).
Bayuk, J. L., & Horowitz, B. M. (2011). An architectural systems engineering methodology
for addressing cyber security. Systems Engineering, 14, 294–304.
CyberVirginia. (2015). About the Commission. Available from: https://www.cyberva.
virginia.gov/about-the-commission/.
Cyber Security Research Alliance (CART). (2013). Designed-in cyber security for cyber-physical
systems. Workshop report.
Falliere, N., Murchu, L. O., & Chien, E. (2011). W32.Stuxnet Dossier. Symantec Security
Response.
Gay, C., Horowitz, B., Bobko, P., Elshaw, J., & Kim, I. (2017). Operator suspicion and
decision responses to cyber-attacks on unmanned ground vehicle systems. In HFES
2017 international annual meeting, Austin, TX.
Higgins, K. J. (2015a). State trooper vehicles hacked. Dark Reading. September.
Higgins, K. J. (2015b). Car hacking shifts into high gear. Dark Reading. July.
Horowitz, B. M. (2016). AFCEA SIGNAL—cybersecurity for unmanned aerial vehicle missions.
April (pp. 40–43).
Horowitz, B. M., & Scott Lucero, D. (2017). System-aware cybersecurity: a systems engi-
neering approach for enhancing cybersecurity. INCOSE INSIGHT. https://doi.org/
10.1002/inst.12165.