U C B E R K E L E Y C E N T E R F O R L O N G - T E R M C Y B E R S E C U R I T Y C L T C W H I T E P A P E R S E R I E S A Swarm Intelligence Approach to Prioritizing the CIS Controls V8.0 Implementation H A Y A T A B D U L L A A S A D C U E , T H I R I M A C H O S B O U R L A I , M A R K L U P O C L T C W H I T E P A P E R S E R I E S C L T C W H I T E P A P E R S E R I E S A Swarm Intelligence. [...] 2 A S W A R M I N T E L L I G E N C E A P P R O A C H T O P R I O R I T I Z I N G T H E C I S C O N T R O L S V 8. [...] 4 A S W A R M I N T E L L I G E N C E A P P R O A C H T O P R I O R I T I Z I N G T H E C I S C O N T R O L S V 8. [...] 7 A S W A R M I N T E L L I G E N C E A P P R O A C H T O P R I O R I T I Z I N G T H E C I S C O N T R O L S V 8. [...] 10 A S W A R M I N T E L L I G E N C E A P P R O A C H T O P R I O R I T I Z I N G T H E C I S C O N T R O L S V 8.
Related Organizations
- Pages
- 38
- Published in
- United States of America
Table of Contents
- A Swarm Intelligence 1
- Approach to Prioritizing the 1
- CIS Controls V8.0 Implementation 1
- U C B E R K E L E Y 1
- C E N T E R F O R L O N G - T E R M C Y B E R S E C U R I T Y 1
- A Swarm Intelligence 3
- Approach to Prioritizing the 3
- CIS Controls V8.0 Implementation 3
- Contents 5
- EXECUTIVE SUMMARY 7
- INTRODUCTION 9
- SECTION 1 11
- UGA CyberArch 11
- THE CIS CONTROLS V8.0 AS A BASE FRAMEWORK FOR CYBERSECURITY RISK REVIEWS 12
- FROM QUALITATIVE TO QUANTITATIVE ASSESSMENT 14
- THE CIS CONTROLS V8.0 SECURITY CRITERIA PRIORITIZATION 16
- The CIS Community Defense Model 17
- The CIS Cost of Cyber Defense 18
- SECTION 2 20
- Practical Application of Swarm Intelligence SI Algorithms in 20
- Cybersecurity 20
- SWARM INTELLIGENCE SI AND CYBERSECURITY OVERVIEW 20
- PARTICLE SWARM OPTIMIZATION PSO APPLICATIONS IN CYBERSECURITY 22
- PROPOSED APPROACH SWARM OPTIMIZATION AND THE CIS CONTROLS V8.0 PRIORITIZATION 23
- SECTION 3 25
- A City School System Case Study 25
- Conclusions 30
- References 31
- Acknowledgments 36
- About the Authors 37