You are on page 1of 8

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/335568949

From Cognitive Skills to Automated Cybersecurity Response

Conference Paper · August 2019

CITATIONS READS
0 384

8 authors, including:

Roberto Omar Andrade Maria Cazares


Escuela Politécnica Nacional Universidad Politécnica Salesiana (UPS)
59 PUBLICATIONS 511 CITATIONS 16 PUBLICATIONS 52 CITATIONS

SEE PROFILE SEE PROFILE

Luis Tello Oquendo Walter Fuertes


iWN Lab. | NCSU Universidad de las Fuerzas Armadas-ESPE
73 PUBLICATIONS 683 CITATIONS 116 PUBLICATIONS 880 CITATIONS

SEE PROFILE SEE PROFILE

All content following this page was uploaded by Maria Cazares on 02 September 2019.

The user has requested enhancement of the downloaded file.


Int'l Conf. on Advances on Applied Cognitive Computing | ACC'19 | 19

From Cognitive Skills to Automated Cybersecurity


Response
Roberto O Andrade∗ , Maria Fernanda Cazares† , Luis Tello-Oquendo‡ , Walter Fuertes§ ,
Nicolay Samaniego‡ ,
Susana Cadena¶ Freddy Tapia§
∗ Escuela Politécnica Nacional, Quito, Ecuador
† Departamento Psicologı́a, Universidad Politécnica Salesiana, Quito, Ecuador
‡ Universidad Nacional de Chimborazo, Riobamba, Ecuador
§ Universidad de las Fuerzas Armadas ESPE, Sangolquı́, Ecuador
¶ Universidad Central del Ecuador, Quito, Ecuador

Abstract—Organizations should face cybersecurity attacks called Computer Incidents Response Teams (CSIRTs) [2].
that can strongly affect their operational processes, business CSIRT are formed in a multidisciplinary way by specialists
image, and security of critical information. Establishing security generally from the field of cybersecurity, legal, psychology,
mechanisms helps to reduce possible weaknesses that can be
exploited by attackers; however, they will not always be sufficient, and data analysts. CSIRT acts according to predefined
and an attack can be successful. Therefore, organizations need procedures and policies in order to respond quickly and
to establish plans or procedures to handle these security effectively to cybersecurity incidents, and mitigate the risk of
incidents or even build incident response teams called CSIRTs. cyber-attacks.
Due to different forms of attacks and massive data growth, Security analysts in CSIRTs require to process massive
handling cybersecurity incidents requires to adapt to new security
management strategies. In this sense, the use of big data, amount of data in order to i) determine patterns or anomalies
artificial intelligence, and data analytics applied to cybersecurity, that trigger alerts of possible attacks, and ii) carry out the
defined as cognitive security, presents a viable alternative detection process more quickly and effectively. Members of
but is necessary to consider that technological solutions CSIRTs are seeking new strategies based on technological
lack effectiveness without adequate training of cybersecurity solutions such as Big Data, Machine Learning, and Data
specialists or if their technical and non-technical skills are used.
Establishing a close interrelation between human skills and Science [3]. International organizations such as the National
technological solutions can help to contrive an adequate and Institute of Standards and Technology (NIST), started the
efficient detection and automation process that can improve Data Science Research Program (DSRP) to accelerate the
the handling of security incidents. This study analyzes the research progress for data analytic methods [4]. In the
interrelation between the technological solutions of cognitive field of cybersecurity, the application of cognitive sciences
security and the skills of cybersecurity specialists. A framework is
proposed for the automation of incident response by establishing for information security processes drives the concept of
situation awareness for making decisions. cognitive security [5]; this allows making predictive and
Index Terms—cognitive security, self-awareness, artificial prescriptive analyzes that could provide a view of the
intelligence, big-data, teamwork, soft-skills. possible impacts of an security attack. Another critical
factor in the success of CSIRTs is the ability to function
I. I NTRODUCTION as team and adapt to different environments [6]; security
Computer security has become an essential element in professionals require skills such as teamwork, critical thinking,
the society due to the expansion of technology in different and communication in the 21st century [7]. In September
areas such as financial services, medical services, public 2015, a collaboration among Association for Computing
services, and critical infrastructures of water, electricity, and Machinery (ACM), IEEE Computer Society (IEEE CS),
telecommunications. According to the Massachusetts Institute Association for Information Systems Special Interest Group
of Technology (MIT), security teams will face risks related on Information Security and Privacy (AIS SIGSEC), and
mainly to attacks on Internet of Things (IoT) devices, International Federation for Information Processing Technical
block-chains, and critical infrastructures [1]; for instance, Committee on Information Security Education (IFIP WG 11.8)
MIT mentions that attackers focus on the use of artificial proposed a curricular guide in cybersecurity education which
intelligence and quantum techniques to perform the attacks in mentions that non-technical skills denominated soft-skills, are
the year 2019. This context involves having better-prepared vital for security professionals and are focused on: teamwork,
organizations with security professionals with the capacity communication, generation of situational awareness, and
to face these new challenges; at international level, several operation with disparate organizational cultures [8].
organizations have defined strategy for respond quickly to The capability to generate cybersecurity situation awareness
security risks through of teams of specialists and researchers in organizations allow to determine proactive strategies to

ISBN: 1-60132-491-X, CSREA Press ©


20 Int'l Conf. on Advances on Applied Cognitive Computing | ACC'19 |

The rest of the study is organized as follows. Section II


presents related works about automated cybersecurity
Cognitive skills response. Section III presents a background on the importance
Cognitive Sciences
of psychology in cybersecurity. Section IV presents a proposal
Cybersecurity of framework for automated cybersecurity based on cognitive
Psychology
process. Finally, Section VI draws the conclusions and
Cognitive presents the future work.
Security

Teamwork Self-awareness II. R ELATED W ORK


According to the analysis of the MIT Review [11], in the
year 2018, the cities will implement layers of sensors to
monitor the air quality, levels of trash or amount of traffic;
this forecast, in addition to Gartnert’s projection for 2020,
Data Analytics there will be 20.4 billion connected devices [12]. In new
security scenarios organizations must face a drastic change
Figure 1. Cognitive Security. in the size and complexity of the networks or computing
platforms on which they are based for support the provision
of services and connection of devices. Under this new context,
face the ongoing and upcoming attacks or threats. Situation the capacity of action of traditional security solutions and the
awareness is generated from three cognitive processes: human reaction to detect and respond to security incidents
perception, comprehension and projection. Cognitive is limited. Alternatives for cybersecurity are evaluated for
processes are inherent to the human behaviour that can be organizations and researchers is the use of cognitive models as
affected by different factors such as: stress, fatigue, distraction, a proposal to enhanced the security of computing environments
and physical or environmental conditions. Analyzing the and expand the analytical capacity of the human.
performance of tasks and the influence of this factors is of In [13], the authors present a combination of machine
interest for some researchers. For instance, Robert Karasek learning based detection with temporal logic based analysis
proposed the Demand Control Model (DICT) [9] that study that allows distinguishing anomalies and enabling dynamic
the cognitive, emotional, and physical demands in different network response. In [14], includes the use of cognitive
labor fields, where the computer officer has a high level of security for personal devices to allow the device to recognize
psychological demands. In this context, the development of the owner and autonomous security so that the device takes its
cognitive strategies in all levels of information processing is own security decisions. Through of autonomic computation is
necessary; furthermore, it is important to analyze the way possible the automation of diagnoses based on the knowledge
that executive functions integrate all levels of information of the functions and dependencies [15]. The work “A survey of
processing through of: inhibitory control, optimization autonomic computing methods in digital service ecosystems”
of working memory processing [10], which could help [16], presents different 25 different digital ecosystems on
cybersecurity professionals to work with efficiency and which the concepts of autonomic computing are applied,
adequate response time. in [13], present how the cognitive security approach can
In this study, we propose a model to integrate cognition establish“good anomalies” for establishing normal parameters
skills, teamwork and data analytics in the field of cybersecurity of operation and how any variation generates an automatic
as depicted in Fig. 1. Cognitive security allows to take auto-re-configuration of the network equipment to control the
advantage of the characteristics of the cognitive abilities of flow of data.
the security analyst to transfer this knowledge and intelligence
to the computer systems; by doing so, they can carry out III. C OGNITIVE S KILLS AND C YBERSECURITY
an immediate response action or notification to the security
team for the decision making against attacks of security, as A. Situation Awareness
illustrated in Diagram 1. Situation Awareness is defined, from the field of psychology,
as the capacity of an human to generate understanding about
Incident-Response his life based on his experiences [17]. This concept has been
adapted to the field of computer systems; for instance, Lewis
dynamic defines self-awareness of a computational system as the ability
to obtain knowledge about itself based on internal and external
events [18]. In [19], self-awareness is defined as the capacity
cognitive decision game agents of generate knowledge for a computer system about itself and
making theory its environment and determine the actions that will be executed
Diagram 1. Incident Response Models. according to this knowledge.

ISBN: 1-60132-491-X, CSREA Press ©


Int'l Conf. on Advances on Applied Cognitive Computing | ACC'19 | 21

1) Cybersecurity Situation Awareness (CSA): The concept Id


of situation awareness (SA) describes the current situation en

r
ve
tif
y

co
of the organization about threats and attacks, the impact

Re
of a possible attack and the identification of the attacker
RISK
and user behavior [20]. The analyst must understand the Cycle
security situation and determine the likelihood of impact. For
generate situation awareness, we can use the OODA loop. Pr

ct
ot

te
The cognitive OODA loop proposed by Breton is based on ec

De
the cognitive processes of perception, comprehension and t
projection [21]. Table I shows the relationships between
cognitive phases, cognitive processes and products generated Figure 2. Cybersecurity Risk Management Cycle.
according to Brenton’s proposal.
• Classifier or triage;
Table I
OODA C OGNITIVE P HASES .
• Incident management team - second level;
• Legal team.
P hase P rocess This emphasizes the need to develop collaborative skills
Observe Perceiving - Feature Matching within an environment of professionals of heterogeneous
Orient Comprehending - Projecting - Mental Models disciplines that must work in coordination, so teamwork is
Decide Recalling - Evaluating
a very critical skill in cybersecurity specialists. Newstrom
mentions that organizations or companies in the 21st century
2) Cyber-cognitive situation awareness (CCSA): To are more flexible, to adapt quickly to change, and that
establish the cybersecurity situation awareness of the horizontal relationships are more effective [23]; therefore,
organization, we could rely on cognitive aspects oriented to the organizations today give it greater importance to flexible
support of decision-making processes. Adapted to cyberspace structures and horizontal communication. The tasks and roles
the cognitive processes of perception, comprehension and are defined in a more open manner, the environment is more
projection, we would have the relationships shown in Table II. dynamic and the creation of teams allows the described
aspects to be fulfilled. Morin bases that the complexity and
Table II multidisciplinary work are part of the 21st century, education
C YBER C OGNITIVE S ITUATION AWARENESS .
of the future must be centered on the human condition and
Process Attribute the diverse relations between humans [24]. Another essential
aspect mentioned by Morin in Education 21st century is to
Perception Identification of relevant data
prepare students to face the uncertainty that is generated in
Interpretation of data
Comprehension
Conversion in knowledge
the different events of daily life.
Regarding the first aspect mentioned by Morin about
Prediction of futures events
Projection
Evaluation of possible impacts focusing on the human aspects of students, it may be important
to begin to emphasize a training focused on strengthening
the skills. Mumford presents a classification of skills in four
B. Non-technical Skills categories [25]:
Organisms like the U.S. Department of Homeland Security 1) Cognitive Skills;
(DHS) and the National CyberSecurity Alliance (NCSA) have 2) Interpersonal Skills;
promoted the National CyberSecurity Awareness Month that 3) Business Skills;
in 2018 has celebrated its 15th edition [22], to promote that the 4) Strategic Skills.
community know about the relevant aspects of the risks and Generally, universities in the field of cybersecurity focus
threats in the digital environment. In these spaces is necessary primarily on enhance cognitive, business and strategic skills
that security professionals have non-technical skills to be able but do not focus heavily on non-technical skills. According
to disseminate knowledge in a clear and consistent way to to the classification proposed by Mumford, the teamwork,
a group of people without technical background. Concerning the collaboration, the communication, and the networking
cybersecurity in organizations, defense strategy are based on are included in the interpersonal skills category. Future
risk management, established in four levels cybersecurity risk professionals of cybersecurity are studying the university;
management life-cycle depicted in Fig. 2. therefore, the education in engineering, requires encouraging
Within the cybersecurity risk management life-cycle, the the development of non-technical skills. Kyllonen presents the
following personnel is required, as a minimum: skills that are required in the 21st century among which the
• Team leader / coordinator; following are mentioned [7]:
• Responsible for systems and information security; • Critical thinking;
• Communication team or public relations; • Oral and written communication;

ISBN: 1-60132-491-X, CSREA Press ©


22 Int'l Conf. on Advances on Applied Cognitive Computing | ACC'19 |

• Labor ethics;
• Teamwork;
Complexity
• Collaboration;
• Professionalism;
• Troubleshooting.

NICE Cybersecurity Workforce Framework [26] establishes


a set of knowledge, skills, and abilities for security
professionals related to the non-technical aspect such as:
• Ability to participate as a member of planning teams,
Multi- Situation
coordination groups, and task forces as necessary; disciplinary KSA Awareness
• Ability to apply collaborative skills and strategies;
• Ability to apply critical reading / thinking skills;
• Ability to collaborate effectively with others.

Regarding the second aspect, uncertainty, proposed by


Morin in the field of computer science, some authors such
as [27] and [28] mention that the uncertainty in software
development processes may be associated with human Uncertainty
participation, concurrency, and problem-domain uncertainties.
In the software context, the uncertainty can arise between the
development of a product and the variation of the requirements
presented by the user initially. In the field of cybersecurity, Figure 3. Knowledge, Skills, Abilities (KSA) in 21st Century.
uncertainty can be associated with others aspects such as the
time, the type and the goal of the cyber-attack.
in Fig. 4. Our proposal emphasizes the analysis layer, in
Working in team also generates uncertainty; in [29] the
which the understanding of the data acquired by different
authors mention that uncertainty can be generated in function
sources such as sensors, logs, or security blogs is made.
of people and the environment work, depending on variables
Besides, in this layer, the experience of security analysts
such as preconceptions, altruistic intelligence, harvesting and
and effective communication is fundamental, because it will
serendipity. In [30] the authors suggest that uncertainty
predict to adequately evaluate an event and classify it as an
depends on the structure of the teamwork and the interaction
incident if it is the case, and establish the most appropriate
of the members.
decision to reduce the impact of an attack. Concretely, in
In the context of the 21st Century education, there are four
this layer, we have proposed two sub-components that allow
main aspects, as illustrated in Fig. 3, that must be worked in
establishing the situation awareness: i) the sub-component
the education of computer science engineering students in the
of automatic learning and ii) the teamwork. These two
field of cybersecurity.
sub-components share a direct communication aiming at
IV. C YBERSECURITY AUTOMATED R ESPONSE BASED ON generating the labels that serve to train the supervised learning
C OGNITIVE S KILLS algorithms based on the knowledge generated by the analysts
based on the interaction and exchange of ideas. On the other
Our proposal for the automation of incident response is hand, unsupervised learning algorithms can detect patterns
based on the importance of establish situation awareness to or anomalies that are not easily detectable and alert security
make the right decision based on an understanding of the analysts to determine if they correspond to a security attack
positive and negative aspects of security of organization. Our jointly.
proposal takes advantage of the collaborative approach for the A framework is designed based on processes for data
generation of self-awareness and decision-making, is based on management that ensure the integrity and quality of the data
the importance of the cognitive processes of security analysts in the different layers; then, it includes:
to be able to determine a security incident in the multiple
events between which it has to be identified an anomalous • Collection;
behavior that can alert about an attack. One aspect that • Preparation;
we consider in our proposal is that in order to strengthen • Analyze;
cognitive processes. At the 2017 RSA conference, IBM [31] • Visualization;
presented the cognitive tasks that a security analyst must • Access.
perform in the investigation of an incident, in the table III we In the following, we present a detailed description of the
propose an association between cybersecurity cognitive tasks layers that compose our proposed framework in Fig. 4.
and cognitive processes. a) Cyber Collect Layer: It covers the sources of
For the process of automation of response to security information that will be used to create cybersecurity situation
incidents, we have proposed a layered architecture depicted awareness. Among the sources of information, the following

ISBN: 1-60132-491-X, CSREA Press ©


Int'l Conf. on Advances on Applied Cognitive Computing | ACC'19 | 23

Table III
TASKS AND S KILLS IN CYBERSECURITY OPERATIONS .

Tasks Cognitive skills


TC-1. Review incident data. Perception
TC-2. Review the events by aspects of interest Perception
TC-3. Pivot in the data to find atypical values or outliers Comprehension
TC-4. Expand the search to find more data Projection
TC-5. Investigate the threat to develop experience Comprehension
TC-6. Discover new threats Projection
TC-7. Determine indicators of commitment in other sources Comprehension
TC-8. Apply intelligence to investigate the incident Projection
TC-9. Discover IPs potentially infected Awareness
TC-10. Qualify the incident based on the knowledge generated based on the investigation of the threat Comprehension
TC-11. Prescriptive analysis in base of attack profile Awareness
TC-12. Analysis of lessons learned based on the dispersion map of the attack Awareness

for the load balancing process, and high availability.


• Indexing servers, in these servers the process of indexing
the data is performed, for which the attributes are defined
on the basis of which the process of debugging the
data and processing it is performed for the generation
of information in the visualization layer . At least two
servers are considered for the load balancing and high
availability process.
• Queue management servers, this server establishes the
processes to manage the processing resources of the
Big Data solution when several requests for information
are executed simultaneously Reporting servers and data
visualization, this server handles the tools for data
visualization and allows the interaction with the analyst
to be able to perform information queries.
• Intrusion Detection server, in this server the rules for
the detection of patterns related to security attacks are
defined, the server has access with the security sensors.
• Alert management server, in this server the alert
management is defined to notify the analyst when
anomalous patterns are detected, in this server the
inclusion of an incident management system that allows
the flow control of escalations in front of the detection
of security incidents.
Figure 4. Cybersecurity Automated Response based on Cognitive Skills.
c) Indexing Layer: It contributes to define search
dictionary.
d) Situation Awareness Layer: This layer is the core our
can be considered: proposal. In this layer the objective is establish a baseline
of the security status of an organization, for this purpose
• Cyber simulations platforms;
we consider two components, the first consisting of learning
• Sensors;
machine algorithms that allow to identify patterns or anomalies
• Intrusion detection systems;
based on pre-processed data from different sources as server
• Vulnerability analysis;
logs, the second component called teamwork generates the
• Security portals, blogs or feeds;
establishment of self-awareness based on the collaborative
• Netflow;
work of CSIRT security analysts. Based on the generation
• Servers and networking appliances logs.
of knowledge produced by the teamwork you can train the
b) Infrastructure Layer: The following components are learning algorithms to improve their accuracy.
included in the infrastructure layer: e) Triage Layer: It defines the alerts that are generated
• Servers of data collection, in these servers the process towards security analysts, CSIRT or other actors in the incident
of data ingestion of the different sources of information management process. In accordance with good practices, it is
will be carried out. At least three servers are considered advisable to define a categorization of alert levels.

ISBN: 1-60132-491-X, CSREA Press ©


24 Int'l Conf. on Advances on Applied Cognitive Computing | ACC'19 |

f) Automated Response Layer: It defines the response control processes, generate safety commitment indicators, and
actions that can be automated, for this is necessary to establish define the update data times.
a security incident management plan. To establish situation awareness from the information that
can be processed by security analysts, we have proposed
V. D ISCUSSION a framework composed of four modules as illustrated in
In psychology research, job performance is a topic that Fig. 5: sources, cognitive processes, collaborative security
seeks to improve performance at work thought of personal and tasks, and soft-skills. The teamwork supports the four modules.
environmental variables. The variables that we have analyzed In [23], the authors mention that the goal of a team is
in this study are the cognitive skills in the professionals to encourage the members to analyze the way they work
who perform incident management in the cybersecurity field. together, identify their weaknesses, and develop new forms of
We consider that the higher cognitive processes linked to collaboration. To achieve this, it is essential that the learning
executive function produce higher performance of the tasks process focuses on tasks. Following the Newstrom model of
solved for security analyst, due to the high demand in the equipment construction [23], we propose the following in the
quick response to reduce the impact of attacks. For this reason, cybersecurity field:
it is essential strengthening cognitive flexibility in order to i) • Trained Specialist to identify the problem;
expand the analysis of the incidents’ data, ii) being able to • Data collection;
visualize a more significant number of possibilities to face • Feedback for the development of action plans;
the cyber attacks, ii) develop of inhibitory control to improve • Generation of situational awareness;
the degree of precision and effectiveness in their decisions. • Solution experience;
On the other hand, working memory plays a vital role in • Continuous improvement.
the storage of experiences and the subsequent use of this
information, so this cognitive process also contributes to the VI. C ONCLUSIONS AND F UTURE WORK
development of the awareness of the situation of risks and The technological and social changes generate dynamic
threats to which organizations are exposed. Another critical and complex environments that produce large amounts of
variable is linked to the management of stress in the work of data. This fact poses new challenges to security analysts who
incident management professionals to develop strategies that must process the data to determine patterns or anomalies
allow them to counteract labor demands. that allow identifying threats or security attacks. The use
Analyzing if executive functions integrates the perception, of Cognitive Security is proposed as a new alternative to
comprehension and projection process, in the cybersecurity improve the effectiveness of security operations by providing
management model based on situation awareness for the ability to process large volumes of data of different formats
improving task’s performance, could enhanced the decision in a short time. In the field of cybersecurity, Big Data is
making process. There are several aspects where non-technical applied majority to monitoring operations and detection of
skills play a crucial role because without adequate anomalies which focus on reactive security strategies, but other
communication and the ability to build shared knowledge, security activities could be enhanced by Big Data analytics for
cybersecurity teams will not reach the effectiveness they need proactive strategies such as threat hunting or cyber deception.
to face security attacks. For instance, handling complexity Cybersecurity tasks for incident management include
when facing the events or problems that come up should identifying data about the incident to have an amplitude of the
not be all led to simplistic reasoning by the security analyst attack scenario. Developing experiences from the data about
but to be able to generate mental models that represent the threats and attacks allow establishing the awareness of the
the complexity and working as a team. This understanding cybersecurity situation. Establishing cybersecurity situation
can be complicated, so proposals such as the management awareness require cognitive and emotional skills in which the
of shared mental maps can be significant. Another fact is ability of cognitive processes are essential; perception and
multidisciplinary work where specialists from different areas attention are the first filters that allow security analyst to
must participate together, but there are problems of interaction collect information from the external environment. The higher
due to limited knowledge of the area of knowledge of the cognitive processes linked to working memory, cognitive
pair, different technical vocabularies, and heterogeneous work flexibility, and inhibitory control, have a participation in the
methodologies. Finally, handling the uncertainty of knowing decision making and in the behaviors that are externalized in
at the end the result of an activity or the interaction with other the incident management tasks.
team members. Continuous improvement of cognitive process in security
The proposed model of Big Data cover the different analysts can be achieved through these two skills:
components that must be considered for the generation of 1) Process control that is an important skill within a
knowledge regarding the cybersecurity status (Cybersecurity team member because it helps members to perceive,
Situation Awareness). Just implementing a Big Data understand and react constructively.
architecture is not enough to solve the problem of dealing with 2) Feedback that allows you to have data in which to
the processing of large amounts of data, we should work on sustain your decisions, self-correction based on how they
identifying reliable information sources, establish data quality see other members of the team.

ISBN: 1-60132-491-X, CSREA Press ©


Int'l Conf. on Advances on Applied Cognitive Computing | ACC'19 | 25

Figure 5. Cybersecurity Teamwork Framework

There are different proposals in the commercial and [14] R. Greenstadt and J. Beal, “Cognitive security for personal devices,”
academic field regarding the use of Big Data and machine in Proceedings of the 1st ACM Workshop on Workshop on AISec, ser.
AISec ’08. New York, NY, USA: ACM, 2008, pp. 27–30. [Online].
learning in the security field; however, they have not been Available: http://doi.acm.org/10.1145/1456377.1456383
widely implemented. We consider that a possible future work [15] M. Möstl, J. Schlatow, R. Ernst, H. Hoffmann, A. Merchant, and
is to analyze the reasons for that, in general perspective, could A. Shraer, “Self-aware systems for the internet-of-things,” in 2016
International Conference on Hardware/Software Codesign and System
be budget, personnel experience, lack of technical support. Synthesis (CODES+ISSS), Oct 2016, pp. 1–9.
Furthermore, a review through a focus group could be an [16] D. B. Abeywickrama and E. Ovaska, “A survey of autonomic
important contribution to complement the present study. computing methods in digital service ecosystems,” Serv. Oriented
Comput. Appl., vol. 11, no. 1, pp. 1–31, Mar. 2017. [Online]. Available:
ACKNOWLEDGMENT https://doi.org/10.1007/s11761-016-0203-8
[17] S. Baker, “The identification of the self,” Psychological Review, no. 3,
The authors would like to thank the financial support of the pp. 272–284, May 1897.
Ecuadorian Corporation for the Development of Research and [18] P. R. Lewis, A. Chandra, and Parsons, “Self-awareness and
the Academy (RED CEDIA) for the development of this work, self-expression: Inspiration from psychology,” in Self-awareness and
Self-expression: Inspiration from Psychology. Springer, Cham, 2016.
under Project Grant GT-II-2017. [19] J. Camara, S. Kounevand, J. Kephart, A. Milenkoski, and X. Zhu,
“Self-aware computing systems: Related concepts and research areas,” in
R EFERENCES Self-aware Computing Systems: Related Concepts and Research Areas.
[1] M. Review. (2019) Las cinco nuevas ciberamenazas más peligrosas que Springer, Cham, 2017.
veremos en 2019. [Online]. Available: https://www.technologyreview.es [20] J. Timonen, “Improving situational awareness of cyber physical systems
[2] FIRST. (2019) Forum of incident response and security teams. [Online]. based on operator’s goals,” 06 2015, pp. 1–6.
Available: https://www.first.org [21] R. Breton and R. Rousseau, “The c-ooda: A cognitive version of the
[3] IBM. (2018) Ai for cybersecurity. [Online]. Available: ooda loop to represent c2 activities. topic: C2 process modelling,” 03
https://www.ibm.com/security/artificial-intelligence 2019.
[4] NIST. (2018) Big data public working group. [Online]. Available: [22] CSIAC. (2018) National cyber security awareness month. [Online].
https://www.nist.gov/el/cyber-physical-systems/big-data-pwg Available: https://www.csiac.org
[5] MIT. (2018) Cognitive science. [Online]. Available: [23] K. Davis and J. W. Newstrom, “Comportamiento humano en el trabajo
https://bcs.mit.edu/research/cognitive-science / k. davis, j.w. newstrom ; tr. por antonio núñez ramos.” 03 2019.
[6] J. Steinke, “Improving cybersecurity incident response team [24] E. Morin and A. Sátiro, “Edgar morin y los siete
effectiveness using teams-based research,” IEEE Security and Privacy, saberes necesarios para la educación del futuro,”
vol. 13, no. 4, pp. 20–29, Jul. 2015. http://www.redined.mec.es/oai/indexg.php?registro=018200430039,
[7] P. Kyllonen, “Measurement of 21st century skills within the common 03 1999.
core state standards,” 01 2012. [25] M. D. Mumford, E. Todd, C. Higgs, and T. Mcintosh, “Cognitive skills
[8] ACM. (2017) Cibersecurity curricula 2017. [Online]. Available: and leadership performance: The nine critical skills,” The Leadership
https://www.acm.org Quarterly, vol. 28, 11 2016.
[9] R. Karasek, C. Brisson, N. Kawakami, I. Houtman, P. Bongers, [26] NICSS. (2018) Cybersecurity workforce framework. [Online]. Available:
and B. Amick, “The job content questionnaire (jcq): An instrument https://niccs.us-cert.gov/
for internationally comparative assessments of psychosocial job [27] H. Ziv and D. Richardson, “The uncertainty principle in software
characteristics,” Journal of occupational health psychology, vol. 32, pp. engineering,” 09 1996.
322–55, 1998. [28] H. Ibrahim, B. H. Far, A. Eberlein, and Y. Daradkeh, “Uncertainty
[10] A. Miyake and M. J. W. A. H. H. A. W. T. D. Friedman, N. management in software engineering: Past, present, and future,” in 2009
P.and Emerson, “The unity and diversity of executive functions and their Canadian Conference on Electrical and Computer Engineering, May
contributions to complex “frontal lobe” tasks: A latent variable analysis.” 2009, pp. 7–12.
Cognitive Psychology, vol. 41, p. 49–100, 2000. [29] Y. Engel, M. Kaandorp, and T. Elfring, “Toward a dynamic process
[11] MIT. (2018) Tr10: La ciudad sensible. [Online]. Available: model of entrepreneurial networking under uncertainty,” Journal of
https://www.technologyreview.es/s/10023/tr10-la-ciudad-sensible Business Venturing, vol. 32, pp. 35–51, 01 2017.
[12] Gartner. (2017) Press release. [Online]. Available: [30] P. Nowell and K. Williams-Middleton, “Trust-control relationships in
https://www.gartner.com new venture teams during organizational emergence,” 11 2016.
[13] L. Jagadeesan, A. Mc Bride, V. K. Gurbani, and J. Yang, [31] IBM. (2017) Applied cognitive security complementing the security
“Cognitive security: Security analytics and autonomics for analyst. [Online]. Available: https://www.rsaconference.com
virtualized networks,” in Proceedings of the Principles Systems
and Applications on IP Telecommunications, ser. IPTComm ’15.
New York, NY, USA: ACM, 2015, pp. 43–50. [Online]. Available:
http://doi.acm.org/10.1145/2843491.2843837

ISBN: 1-60132-491-X, CSREA Press ©


View publication stats

You might also like