Article Review 2

Anthony Thompson

Professor Diwakar Yalpi

CYSE201S

November 2nd, 2023

“Simulation for cybersecurity: state of the art and future directions”

Journal of Cybersecurity

By Hamdi Kavak, Jose Padilla, Daniele Vernon-Bido, Saikou Diallo, Ross Gore, Sachin Shetty

March 2021

Introduction

This focus of this article is simulation technologies and their application and importance to the field of Cybersecurity. A simulation model in this context is a technological tool used to study cybersecurity scenarios. This is typically done by simulating an attack using various tools and then practicing ways to defend against it. The article includes an informative summary of cybersecurity, done generally to help the reader with context. It explains the importance of simulation methods in conducting research in the field. It explains the categories of simulation models and how they are used. It also examines the role of humans in all of this and how human error can be better accounted for in simulations. It posits that as cyberthreats evolve, these research methods must also evolve. The readers take the view that a holistic, comprehensive approach to developing these simulation systems is necessary to meet the cybersecurity challenges of present and future.

Summary

This article starts by helping familiarize the reader with the concept of cybersecurity. Basic concepts like targets and threats are discussed in this context. As the world continues to immerse itself in networks and technology, the role of cybersecurity increases in importance. The advancements in technology inherently mean that the threats from cybercriminals become more advanced and more consequential as time progresses. Cybersecurity experts have various methods of researching these threats and developing defense and mitigation strategies.

One such area of research can be described as “simulation”. In essence, simulation is using technological tools to create cyberthreat scenarios, practice defending against them and learning from them. Simulation is a broad umbrella term to describe three subcategories of research.

The three types of these models are physical, emulated and simulated. The physical models use actual hardware and networks. Real world environments are setup and attacked. Emulated models use software to operate representations of the real-world environment. Instead of using an actual physical device, researchers use a programmed version of that device. The emulated models accomplish the same goals as the physical simulations but are far less expensive and resource intensive. Finally, the simulated models are more abstract and meant to sort out theoretical problems pertaining to cybersecurity. There are a limitless number of scenarios that can be created and learned from, and the article explains that governments must use these technologies to conduct crucial research into protecting technological infrastructure and assets.

The article also places emphasis on the role that humans play in cybersecurity and describes this as understudied. This is important because human behavior and error play a crucial role in cybersecurity and the models don’t sufficiently account for their behavior. This presents an opportunity for development that must be addressed to comprehensively understand and meet new and evolving cybersecurity challenges.

Finally, the article has a forward-looking section that lays out a path forward for the development of these systems. It states that simulations are the most important tools we have for this research and offers three ways to improve them. Advancing data collection, creating new theoretical constructs, and improving the behavioral models in simulation are their three main points of emphasis. By addressing these three areas of opportunity, researchers can properly use simulations to mitigate cyber threats moving forward.

Conclusion:

This article was well written. The overviews of the field make the content accessible to a less knowledgeable audience. Someone with very little understanding of cybersecurity could digest and understand the concepts. The article describes cybersecurity as both a technological and sociological concept. It places emphasis on the cognitive and behavioral aspects of humans which have been very prevalent in our class. The way these play a role in cyber systems is often referred to as “human factors”, a term we have studied this semester. It was interesting to learn about the different types of simulations that can be done. I do not have any criticism to offer. The article was well written, detailed, and informative. All the questions I would have thought to ask, especially about research, are already addressed.  

References

https://academic.oup.com/cybersecurity/article/7/1/tyab005/6170701?searchresult=1

Leave a Reply

Your email address will not be published. Required fields are marked *