Page 113 - Artificial Intelligence for the Internet of Everything
P. 113

Policy Issues Regarding Implementations of Cyber Attack  99


              rapid response to be possible, an early emphasis must be placed on supporting
              relevant research and education.
                 An interesting side note related to this paper is that technology-focused,
              system prototype experiments served to create early interactions between
              technologists and policy makers that illuminated a number of important
              issues related to policy. It would appear that prototype-based projects that
              serve to couple government and industry would be a valuable method for
              accelerating the partnerships necessary for identifying and addressing critical
              policy issues. A preliminary strategy would include identifying safety-related
              domains that demand the rapid integration of fast-changing technologies
              into their physical systems. This article provides examples related to
              advanced air traffic control and automated automotive systems.



              ACKNOWLEDGMENTS

              This material is based upon work supported, in whole or in part, by the US Department of
              Defense through the Systems Engineering Research Center under Contract HQ0034-13-
              0004. The SERC is a federally funded University Affiliated Research Center managed by
              Stevens Institute of Technology, Hoboken, NJ, USA. Any opinions, findings, and conclu-
              sions or recommendations expressed in this material are those of the authors and do not nec-
              essarily reflect the views of the US Department of Defense.



              REFERENCES
              Babineau, G. L., Jones, R. A., & Horowitz, B. M. (2012). A system-aware cyber security
                 method for shipboard control systems with a method described to evaluate cyber security
                 solutions. In 2012 IEEE international conference on technologies for homeland security (HST).
              Bayuk, J. L., & Horowitz, B. M. (2011). An architectural systems engineering methodology
                 for addressing cyber security. Systems Engineering, 14, 294–304.
              CyberVirginia. (2015). About the Commission. Available from: https://www.cyberva.
                 virginia.gov/about-the-commission/.
              Cyber Security Research Alliance (CART). (2013). Designed-in cyber security for cyber-physical
                 systems. Workshop report.
              Falliere, N., Murchu, L. O., & Chien, E. (2011). W32.Stuxnet Dossier. Symantec Security
                 Response.
              Gay, C., Horowitz, B., Bobko, P., Elshaw, J., & Kim, I. (2017). Operator suspicion and
                 decision responses to cyber-attacks on unmanned ground vehicle systems. In HFES
                 2017 international annual meeting, Austin, TX.
              Higgins, K. J. (2015a). State trooper vehicles hacked. Dark Reading. September.
              Higgins, K. J. (2015b). Car hacking shifts into high gear. Dark Reading. July.
              Horowitz, B. M. (2016). AFCEA SIGNAL—cybersecurity for unmanned aerial vehicle missions.
                 April (pp. 40–43).
              Horowitz, B. M., & Scott Lucero, D. (2017). System-aware cybersecurity: a systems engi-
                 neering approach for enhancing cybersecurity. INCOSE INSIGHT. https://doi.org/
                 10.1002/inst.12165.
   108   109   110   111   112   113   114   115   116   117   118