
3.5.2 Situational Awareness
Situation Awareness is the main prerequisite towards
cyber security. Without situation awareness, it is
impossible to systematically prevent, identify, and
protect the system from the cyber incidents and if, for
example, a cyber-attack happens, to recover from the
attack. Situation awareness involves being aware of
what is happening around your system to understand
how information, events, and how your own actions
affect the goals and objectives, both now and in the
near future. It also enables to select effective and
efficient countermeasures, and thus, to protect the
system from varying threats and attacks.
Situational awareness is needed for creating a
sound basis for the development and utilization of
countermeasures (controls), where resiliency
focuses. For the related decision-making, relevant
information collected from different sources of the
cyber environment or cyberspace, e.g., networks, risk
trends, and operational parameters, are needed. This
requires information exchange between different
stakeholders. And always, when dealing with
information exchange, the main question is “trust”.
3.5.2 Security technology
Security technologies include all technical means
towards cyber security, such as secure system
architectures, protocols and implementation, as well
as tools and platforms for secure system development
and deployment. Security technologies are needed
for fulfilling the recognized security requirements,
and for building resilient infrastructures and systems
with dependable hardware and software that can also
meet future security challenges.
Security technologies enable technical protection
of infrastructures, platforms, devices, services, and
data. The technical protection starts with secure user
identification and authorization that are necessary
features in most secure infrastructures, platforms,
devices and services. Fortunately, well-known
technologies exist for their implementation.
Typically, processes and data objects are associated
with an owner, represented in the computer system
by a user account, who sets the access rights for
others. A global trend is to increase the use of cloud
service technology when providing critical services.
Data go into a cloud and will not come back to end-
users’ devices. Also, government data has already
gone to a cloud, and in the future more and more
government data will migrate to cloud servers and
services. Partnerships between cloud service
providers and security solution providers are
becoming more common. We will see the emergence
of cloud service-specific-solution providers as well.
Identity management and encryption will be the most
important cloud security services to be offered. These
services will be eventually offered for small to
medium-sized businesses as well. We will also see
emergence of cloud security standards. Challenges
are that quite often cloud service providers believe
that security is just an end user issue and firewall
means security. Therefore, currently, we do not have
proper cloud security standards and we lack
awareness of a true understanding of comprehensive
cloud security.
Security technologies are needed also then if
something has happened. For example, forensics can
lead to the sources of the attack/mistake and provide
information for legal and other ramifications of the
issue. Forensics also facilitates the analysis of the
causes of the incident, which in turn, makes it
possible to learn and avoid similar attacks in the
future.
3.5.3 Security management and governance
The well-known fact of live is that people are the
rock-bottom of cyber security. Security management
and governance, “the brain and Intelligence of cyber
security” takes care the human and organizational
aspects of cyber security.
Security policy is currently the main element used
to communicate secure work practices to employees
and ICT stakeholders. It is a declaration of the
significance of security in the business of the
organization in question. Additionally, the security
policy defines the organization’s policies and
practices for personnel collaboration. However,
people still often fail to comply with security
policies, exposing the organization to various risks.
One challenge is to promote methods and techniques
that can support the development of comprehensible
security policies in the emerging ICT paradigms, e.g.,
cloud computing and multiple devices. Developing
of policies that can defeat the main reasons driving
non-compliance, such as a habit, is challenging.
ISMS provides controls to protect organizations’
most fundamental asset, information. Many
organizations apply audits and certification for their
ISMS to convince their stakeholders that security of
organization is properly managed and meets
regulatory security requirements [8]. An information
security audit is an audit on the level of information
security in an organization. Security aware customers
may require ISMS certification before business
WSEAS TRANSACTIONS on COMPUTERS
DOI: 10.37394/23205.2022.21.14