Premium
ARCHITECTING COMPOSABLE SECURITY
Author(s) -
Dōne Brian K.,
Willett Keith D.,
Benjamin Bruce P.,
Sterne Dan F.,
Tally Gregg W.,
Viel David W.
Publication year - 2016
Publication title -
insight
Language(s) - English
Resource type - Journals
eISSN - 2156-4868
pISSN - 2156-485X
DOI - 10.1002/inst.12091
Subject(s) - cyberspace , interoperability , computer security , reuse , computer science , automation , engineering , the internet , world wide web , mechanical engineering , waste management
Cyber adversaries' reuse similar tools and techniques. Cyberspace‐attack response times are currently too slow because existing response solutions require humans in the loop. Many cyber alerts are never analyzed due to lack of available analyst time, which enable attacks to gain a deeper penetration before detection and remediation. Today's existing cyber defense approaches cannot be scaled due to the labor‐intensive nature. Integrated Adaptive Cyberspace Defense (IACD) seeks to improve cyber security automation, increase information sharing, and encourage interoperability between commercial tools to achieve composable security where the right tools are engaged at the right time for the right reasons.