Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet47/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   43   44   45   46   47   48   49   50   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

CHAPTER
43
5
Cyber-specifications: 
capturing user 
requirements for cyber-
security investigations
Alex W. Stedmon, Dale Richards, Siraj A. Shaikh, John Huddlestone,
Ruairidh Davison
INTRODUCTION
In many security domains, the “human in the system” is often a critical line of de-
fense in identifying, preventing, and responding to any threats (
Saikayasit et al., in 
print
). Traditionally, these domains have been focused in the real world, ranging 
from mainstream public safety within crowded spaces and border controls, through 
to identifying suspicious behaviors, hostile reconnaissance and implementing 
counter-terrorism initiatives. In these instances, security is usually the specific re-
sponsibility of front-line personnel with defined roles and responsibilities operating 
to organizational protocols (
Saikayasit et al., 2012; Stedmon et al., 2013
).
From a systems perspective, the process of security depends upon the performance 
of those humans (e.g., users and stakeholders) in the wider security system. Personnel 
are often working in complex and challenging work environments where the nature of 
their job is that specific security breaches may be very rare and so they are tasked with 
recognizing small state changes within a massive workflow, but where security inci-
dents could have rapid and catastrophic consequences (e.g., airline baggage handlers 
not identifying an improvised explosive device in a passengers luggage).
Furthermore, with the increasing presence of technology in security provision 
there is a reliance on utilizing complex distributed systems that assist the user, and 
in some instances are instrumental in facilitating decisions that are made by the user. 
However, one of the significant benefits of deploying dedicated security personnel 
is that they often provide operational flexibility and local/tacit knowledge of their 
working environment that automated systems simply do not possess (
Hancock and 
Hart, 2002; Stedmon et al., 2013
).
Through a unique understanding of their work contexts (and the ability to notice 
subtle patterns of behavior and underlying social norms in those environments) se-
curity personnel represent a key asset in identifying unusual behaviors or suspicious 
incidents that may pose a risk to public safety (
Cooke and Winner, 2008
). However, 



Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   43   44   45   46   47   48   49   50   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish