A critical requirement for developing a cyber capable workforce is to understand how to challenge, assess, and rapidly develop human cyber skill-sets in realistic cyber operational environments. Fortunately, cyber team competitions make use of simulated operational environments with scoring criteria of task performance that objectively define overall team effectiveness, thus providing the means and context for observation and analysis of cyber teaming. Such competitions allow researchers to address the key determinants that make a cyber defense team more or less effective in responding to and mitigating cyber attacks. For this purpose, we analyzed data collected at the 12th annual Mid-Atlantic Collegiate Cyber Defense Competition (MACCDC, http://www.maccdc.org), where eight teams were evaluated along four independent scoring dimensions: maintaining services, incident response, scenario injects, and thwarting adversarial activities. Data collected from the 13-point OAT (Observational Assessment of Teamwork) instrument by embedded observers and a cyber teamwork survey completed by all participants were used to assess teamwork and leadership behaviors and team composition and work processes, respectively. The scores from the competition were used as an outcome measure in our analysis to extract key features of team process, structure, leadership, and skill-sets in relation to effective cyber defense. We used Bayesian regression to relate scored performance during the competition to team skill composition, team experience level, and an observational construct of team collaboration. Our results indicate that effective collaboration, experience, and functional role-specialization within the teams are important factors that determine the success of these teams in the competition and are important observational predictors of the timely detection and effective mitigation of ongoing cyber attacks. These results support theories of team maturation and the development of functional team cognition applied to mastering cybersecurity.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC6252333PMC
http://dx.doi.org/10.3389/fpsyg.2018.02133DOI Listing

Publication Analysis

Top Keywords

cyber
13
cyber defense
12
team
10
cyber teaming
8
defense competition
8
operational environments
8
cyber attacks
8
data collected
8
competition
5
teaming role
4

Similar Publications

Multi-scale multi-object semi-supervised consistency learning for ultrasound image segmentation.

Neural Netw

December 2024

Department of Mechanical Engineering, National University of Singapore, 9 Engineering Drive 1, Singapore 117575, Singapore. Electronic address:

Manual annotation of ultrasound images relies on expert knowledge and requires significant time and financial resources. Semi-supervised learning (SSL) exploits large amounts of unlabeled data to improve model performance under limited labeled data. However, it faces two challenges: fusion of contextual information at multiple scales and bias of spatial information between multiple objects.

View Article and Find Full Text PDF

Enhancing the performance of 5ph-IPMSM control plays a crucial role in advancing various innovative applications such as electric vehicles. This paper proposes a new reinforcement learning (RL) control algorithm based twin-delayed deep deterministic policy gradient (TD3) algorithm to tune two cascaded PI controllers in a five-phase interior permanent magnet synchronous motor (5ph-IPMSM) drive system based model predictive control (MPC). The main purpose of the control methodology is to optimize the 5ph-IPMSM speed response either in constant torque region or constant power region.

View Article and Find Full Text PDF

The rapid growth of internet usage has led to increased cyberbullying among adolescents, with varying rates reported across countries. This study aimed to investigate the impact of cyber moral literacy on cyberbullying among late adolescents, examining both the mediating role of moral disengagement and the moderating effect of guilt on the relationship between cyber moral literacy and cyberbullying. Data were collected from 7837 late adolescent students (aged 18-21 years) at four universities in Sichuan Province, China.

View Article and Find Full Text PDF

Technology can be leveraged as a tool by perpetrators of interpersonal violence, which requires survivors to consider digital platforms as part of their safety planning processes. To explore how survivors are addressing these safety concerns, we performed secondary, qualitative content analysis of semistructured interviews with college students who used campus-based advocacy services for interpersonal violence. Participants described an array of technology-related safety strategies they implemented to protect themselves across multiple types of digital technologies.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!