کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
1699512 1519318 2015 8 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Axiomatic Design/Design Patterns Mashup: Part 2 (Cyber Security)
موضوعات مرتبط
مهندسی و علوم پایه سایر رشته های مهندسی مهندسی صنعتی و تولید
پیش نمایش صفحه اول مقاله
Axiomatic Design/Design Patterns Mashup: Part 2 (Cyber Security)
چکیده انگلیسی

Part 1 established the theoretical framework for undertaking a top-down/bottom-up mash-up between the Axiomatic Design/Complexity Theory (AD/CT) and the Design Patterns (ÐP) framework. It synthesized an integrated N-model from the top-down V-Model and its antipodal/bottom-up Λ-model. Part 2 illustrates the approach in the domain of Cybersecurity. Recent trends in Cybersecurity indicates that our modern socio-technical systems are increasingly vulnerable to both external as well as internal threats. As the cost of defending our cyberstructures as well as the payoffs from successful attacks keeps rising, the cost of launching an attack simultaneously keeps decreasing. Cyber warfare is fundamentally asymmetric. Designing and managing modern socio-technical systems will demand greater appreciation for the language of threat-patterns and its defence. This paper applies the N-model to arrive at a generic pattern-language compositional technique using the Axiomatic Design Matrix. It then shows how one may splice the FR↔DP mappings with the FR↔ÐP mappings. Transcending the technical and into the socio, it is increasingly clear that wars of the future will be fought in the crucible of each individual human mind. Cognitive Biases are the patterns of weaknesses in this domain. The paper illustrates that patterns of cognitive biases can lead to patterns of cyber insecurity.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Procedia CIRP - Volume 34, 2015, Pages 276-283