Introduction to the Cyber Ranges
eBook - ePub

Introduction to the Cyber Ranges

  1. 176 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Introduction to the Cyber Ranges

About this book

Introduction to the Cyber Ranges provides a comprehensive, integrative, easy-to-comprehend overview of different aspects involved in the cybersecurity arena. It expands on various concepts like cyber situational awareness, simulation and emulation environments, and cybersecurity exercises. It also focuses on detailed analysis and the comparison of various existing cyber ranges in military, academic, and commercial sectors. It highlights every crucial aspect necessary for developing a deeper insight about the working of the cyber ranges, their architectural design, and their need in the market. It conveys how cyber ranges are complex and effective tools in dealing with advanced cyber threats and attacks.

Enhancing the network defenses, resilience, and efficiency of different components of critical infrastructures is the principal objective of cyber ranges. Cyber ranges provide simulations of possible cyberattacks and training on how to thwart such attacks. They are widely used in urban enterprise sectors because they present a sturdy and secure setting for hands-on cyber skills training, advanced cybersecurity education, security testing/training, and certification.

Features:

  • A comprehensive guide to understanding the complexities involved with cyber ranges and other cybersecurity aspects
  • Substantial theoretical knowhow on cyber ranges, their architectural design, along with case studies of existing cyber ranges in leading urban sectors like military, academic, and commercial
  • Elucidates the defensive technologies used by various cyber ranges in enhancing the security setups of private and government organizations
  • Information organized in an accessible format for students (in engineering, computer science, and information management), professionals, researchers, and scientists working in the fields of IT, cybersecurity, distributed systems, and computer networks

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Introduction to the Cyber Ranges by Bishwajeet Pandey,Shabeer Ahmad in PDF and/or ePUB format, as well as other popular books in Computer Science & Computer Networking. We have over one million books available in our catalogue for you to explore.

1Introduction

DOI: 10.1201/​9781003206071-1

1.1 CSA

In everyday context, SA can be defined as being alert and having information of the happenings in one's surrounding. The notion of SA is not constricted to any domain. For example, the corporations covet to be responsive of the susceptibilities that may be present in their business models or assets with the purpose of overcoming any kinds of manipulations of its vulnerabilities. Endsley gave a more sophisticated definition of situational awareness. According to her, SA involves perceiving physical elements of an environment, comprehending their meanings and predicting how they developed.. The four focal elements of SA that make it advantageous for decision-making are:
  • Perception encompasses the awareness of the individual's own locus concerning the setting of additional entities and environmental factors.
  • Comprehension of the causes, impacts, and consequences of the external influences to the systems with analyzing the changes in the situations/surroundings over time.
  • Projection or predictions of the likely developments from the existing to approaching situation.
  • Resolution includes the recovery and repair of the damage caused to the system.
CSA is a novel and emergent methodology used to tackle sophisticated cyberattacks and exploitation of existing weaknesses in computer networks, CPSs, and companies’ infrastructures. In the academic, military, and commercial arenas, CSA is regarded as the leading edge to deal with cybersecurity issues (Onwubiko 2016). It tries to apply the focal elements of SA in context of cyberspace and cybersecurity. SA proves to be an essential constituent of cybersecurity to deal with threat exchanges for everybody like individuals, businesses, and response teams (Gutzwiller et al. 2020). The following examples emphasize the significance of SA in cyber systems:
  1. Managing e-commercial enterprises
    Nowadays, a lot of transactions on e-commerce websites (like eBay and Amazon) are being processed on daily basis. For smooth flow of business, it is crucial to monitor and analyze all kinds of possible cyber threats and the vulnerabilities in the cyber infrastructure and components.
  2. GSA
    GSA monitor millions of a country's citizens’ assets, national critical infrastructures, as they are accountable for protecting the citizens within the country as well as overseas. The security of the database containing every citizen's record should not be compromised.
CSA incorporates people (operator/team), technology, and processes required for obtaining knowledge over time of all situations in cyber systems with earlier described factors of situational awareness:
  1. Network components such as IDs, firewalls, monitoring systems, and scanners collect the data, report alerts, and generate logs. Security operator/team uses this data to perceive the situation and keep track of potential cyber threats.
  2. Next, the security operator/team uses technology and processes to combine, evaluate, integrate, and compare the perceived data to comprehend the current situation and update the knowledge-base as well.
  3. After this step, based on the data perceived and comprehended, the security operator/team can now put forth accurate predictions of the patterns of cyberattacks. They can now answer the questions like, what kind of cyber scenarios are probable, what are the feasible methods by which the current susceptibilities can be manipulated or worsened, and what measures can be implemented?
  4. Lastly, the security operator/team is able to propose and employ the required sequence of action and countermeasure controls for resolving in-built risks or cyberattacks in cybernetworks.
CSA provides overall as well as a specific vista of cyber threats and liabilities in the systems, conceding organizations the proficiency for identifying, processing, and comprehending this information in instantaneously. CR platforms and testbed tools incorporate the CSA factors and help security analysts introduce a detailed insight of the advancement of a cyberattack and the techniques to implement highly impactful countermeasure controls to impede breaches. A CSA system must comprise test environments for delivering simultaneous sensor data, languages for describing the environment at various stages of abstraction, and integration of adversarial narrative with the setup (Okolica et al. 2009). CSA and cybersecurity also concern reliable risk management assessments that may be based on susceptibilities found in data, network, systems, or applications affecting mission assurance (Matthews et al. 2016).
Following is the list of some of the uses cases of CSA systems:
  • Data source: the CSA system can be used for generating complete and high-quality data. This ensures the authenticity of the data for other users, stakeholders, and other systems.
  • Assets organization and interconnectivity: the system is a common platform for assets sharing and organizing. Organizing assets and their dependencies and associations makes them easily identifiable by the users. They can be shared between the physical and the logical units of the network. New components and CSA scenarios can also be developed from the knowledge and usage of preexisting assets of the network.
  • Assessing risks: situation comprehension and projection, both can be achieved by assessing the potential impact of a network threat scenarios. This assessment can be performed using scenario simulations or by using data on previous cyberattacks. This may help the system to better adapt measures for cyber defense.
  • System monitoring: the users can observe the performance of the various components of the system and means of a virtual environment or visualization. This may be useful for detecting and analyzing any suspicious activities.
  • Incident handling: for appropriate response actions, it is important to comprehend the current scenario by either spotting any issues or inspections which may elucidate any possible cyber incidents. This may help the user in drawing an in-depth analysis of the situation like identifying the sources of any attacks or the later possible consequences of an attack.

1.2 Definition

CRs are intricate virtual setups that provide a prototype of complexities of cybersecurity situations (like cyberattacks, cyberwarfare) in the real-world and execute utmost quality training in cybersecurity, deliver an environment for research as well as for the study of diverse schemas, and teach practical incident management as well as response expertise. An ideal CR as shown in Figure 1.1 provides instantaneous feedback with reliable simulation, a virtual setting where different teams can participate for training, a research environment where various teams can test their strategies, and a performance-based evaluation metrics (Urias et al. 2018).
A triangle depicting the inter-relations between Cyber labs, CR exercises and Performance based assessment.
FIGURE 1.1 CR environment.
Long Description for Figure 1.1
One edge of the triangle depicts the learning type of relation between Cyber Labs and CR exercises. Second edge of the triangle depicts the training typ...

Table of contents

  1. Cover Page
  2. Half-Title Page
  3. Series Page
  4. Title Page
  5. Copyright Page
  6. Contents
  7. Preface
  8. About the Authors
  9. List of Abbreviations
  10. Glossary
  11. 1 Introduction
  12. 2 Architectural Design and Tools of Cyber Ranges
  13. 3 Motivations for Construction of Cyber Ranges
  14. 4 Types of Cyber Ranges
  15. 5 Roles of Cyber Ranges: Testing, Training, and Research
  16. 6 Cybersecurity Exercises and Teams Definition
  17. 7 Simulation and Emulation Environments
  18. 8 Designing a Cyber Range
  19. 9 Military Cyber Ranges
  20. 10 Existing Cyber Ranges in Academic Sector
  21. Index