SlideShare a Scribd company logo
1 of 2
Download to read offline
The Role of
Social Networks in
Securing Cyberspace:
Opportunities
v and Threats
Advisory Board Member,
Cyber Security Forum Initiative
Founder, Military Cyber
Professionals Association
Many in American society today equate social networks with
online communities such as Google+ and Linkedln. However,
social networks have existed since the dawn of man. While the
prominence of social networks continues to grow and has proven
to be a rich research area, we already know a lot about their
characteristics. For those of us interested in securing cyberspace
(with an understanding that citizens typically do not want the most
vulnerable among us required to fend for themselves in a lawless world),
we can make use of what we know about social networks. By recognizing the
role of social networks in securing cyberspace, we can better exploit techniques
like crowdsourcing and manage threats with more confidence in each other.
What we casually call crowdsourcing is in fact a complex series of interactions
that capitalizes on diverse perspectives being applied to common problems.
Creating an environment that enables this type of synergy or collective
intelligence takes deliberate effort to design effectively. Some considerations
for designing effective crowdsourcing networks include:
Increasing cognitive diversity and range of expertise
Modularizing collaboration
Reducing barriers to participation
Encouraging small contributions
Developing a rich and well-structured information commons1
The Cyber Security Forum Initiative (CSFI) and the Military Cyber Professionals
Association (MCPA) were created to help professionals connect, crowdsource,
and better secure cyberspace as a team. Although their approaches
differ in scale and focus, with CSFI embracing a much wider
membership base than the DoD-centric MCPA, both were
designed to enable communication and partnership. For
example, both organizations leverage well-structured
information commons like Linkedln, attract relatively diverse
personnel, and reduce barriers to participation by offering
free membership.2-3
If
© United States Cybersecurity Magazine
By creating potential ties between personnel with very different
backgrounds, social networks such as CSFI and MCPA greatly
increase the speed of problem-solving and information flow from
one part of the social network to another. The strength of weak
ties such as these is in the value of the new information that a local
community would otherwise never be exposed to.4 Once such a community is
cultivated to the point of critical mass, such connections (online and off) become
commonplace and happen organically, and new professional identities begin to
emerge. These identities are important to developing norms, elevating the level
of discussions, and making for a more attractive community (think recruitment and
retention).5These goals, applied to the grand effort of securing cyberspace, have
been identified for years and remain valid.6Luckily, organizations such as CSFI and
MCPA are making steady progress in this area.7
Every piece of modern information technology is essentially hackable, and every
online persona is potentially false. With this reality in mind, building social networks
that people trust enough to participate in is risky business. However, social networks
enable a web of trust to emerge that can address very real threats, such as those
posed by malicious impostors. The foundations of this trust are the strong ties
between individuals who know each other online and off. These are colleagues
who can pick up a phone or walk over to each other and fact-check. While multiple
parallel efforts to verify online personas come at a real cost, it is an investment
that minimizes risk and enables a certain level of trust to emerge.
Since security and prosperity are the most vital of interests to every country,
securing cyberspace to allow for these continued benefits is common ground. As we
move forward together towards this shared goal, CSFI and MCPA look forward
to the emergence and growth of many more social networks that they can
proudly call partners,
Sources______________
1. Nielsen, Michael. Reinventing Discovery: The New Era of
Networked Science. Princeton University Press, 2011.
2. Fortner, Amanda. "Defense in the Age of Cyber-Warfare:
The Cyber Security Forum Initiative." Edited by Paul De
Souza. United States Cybersecurity Magazine, April 2015,
40-45.
3. Billingsley, Joseph L. "An Innovation Framework Applied
to a Military Cyber Professionals Association." Master's
thesis, Naval Postgraduate School, 2013. Calhoun: The
NPS Institutional Archive, September 2013. https://calhoun.
nps.edu/bitstream/handle/10945/37587/13Sep_Billingsley_
Joseph.pdf?sequence=1.
4. Granovetter, Mark S. "The Strength of Weak Ties." American
Journal of Sociology 78, no. 6 (May 01,1973): 1360-380.
Accessed September 23, 2015. http://www.jstor.org/
stable/10.2307/2776392?ref=no-x-route:49055104fa44cd3ee
64ddf42cb968ae1.
5. Kuhn, Thomas S. The Structure of Scientific Revolutions.
Chicago: University of Chicago Press, 1970.
6. United States of America. Department of Defense. THE
DEPARTMENT OF DEFENSE CYBER STRATEGY. April 2015.
http://www.defense.g0v/P0rtals/l /features/2015/0415_cyber-
strategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdf.
7. See csfi.us and https://milcyber.org.
About the Author:
J. L. Billingsley serves on the
advisory board o f the Cyber
Security Forum Initiative.
He is the founder o f the
Military Cyber Professionals
Association, an officer in the U.S. Army,
and an Information Sciences Ph.D. student
with the Naval Postgraduate School.

More Related Content

What's hot

Week 2 Slidecast: Networked Information
Week 2 Slidecast: Networked InformationWeek 2 Slidecast: Networked Information
Week 2 Slidecast: Networked InformationAxel Bruns
 
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...Connie White
 
An Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementAn Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementConnie White
 
Andrew Chadwick and Simon Collister (2014) "Boundary-Drawing Power and the Re...
Andrew Chadwick and Simon Collister (2014) "Boundary-Drawing Power and the Re...Andrew Chadwick and Simon Collister (2014) "Boundary-Drawing Power and the Re...
Andrew Chadwick and Simon Collister (2014) "Boundary-Drawing Power and the Re...andrewchadwick
 
Towards building trusted multinational civil
Towards building trusted multinational civilTowards building trusted multinational civil
Towards building trusted multinational civilBruce Forrester
 
Extreme Democracy: Politics And Networks
Extreme Democracy: Politics And NetworksExtreme Democracy: Politics And Networks
Extreme Democracy: Politics And NetworksPaul Schumann
 
Social media - enterprise2.0 - course 2010 2011
Social media - enterprise2.0 - course 2010   2011Social media - enterprise2.0 - course 2010   2011
Social media - enterprise2.0 - course 2010 2011guillaume ereteo
 
Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...
Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...
Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...Paul Gilbreath
 
20130917-CyberInitiativeJointLetter
20130917-CyberInitiativeJointLetter20130917-CyberInitiativeJointLetter
20130917-CyberInitiativeJointLetterDoug DePeppe, Esq.
 
Dissertation Conclusion Sample
Dissertation Conclusion SampleDissertation Conclusion Sample
Dissertation Conclusion SampleAlex Baldwin
 
Sharma social crear red
Sharma social crear redSharma social crear red
Sharma social crear redkeuvoh7883
 
Sharma Social Networks (Tin180 Com)
Sharma Social Networks (Tin180 Com)Sharma Social Networks (Tin180 Com)
Sharma Social Networks (Tin180 Com)Tin180 VietNam
 
Knowledge Management
Knowledge ManagementKnowledge Management
Knowledge ManagementBarbora P
 
Social media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social NetworkingSocial media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social NetworkingIshfaq Majid
 
Practical Applications for Social Network Analysis in Public Sector Marketing...
Practical Applications for Social Network Analysis in Public Sector Marketing...Practical Applications for Social Network Analysis in Public Sector Marketing...
Practical Applications for Social Network Analysis in Public Sector Marketing...Mike Kujawski
 
Setting The Stage For Empirical Research In Virtual Social Networks
Setting The Stage For Empirical Research In Virtual Social NetworksSetting The Stage For Empirical Research In Virtual Social Networks
Setting The Stage For Empirical Research In Virtual Social Networksvia fCh
 
Social media for financial institutions
Social media for financial institutionsSocial media for financial institutions
Social media for financial institutionsDesmond Ese-Omovie
 

What's hot (20)

Week 2 Slidecast: Networked Information
Week 2 Slidecast: Networked InformationWeek 2 Slidecast: Networked Information
Week 2 Slidecast: Networked Information
 
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...
 
An Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementAn Online Social Network for Emergency Management
An Online Social Network for Emergency Management
 
Andrew Chadwick and Simon Collister (2014) "Boundary-Drawing Power and the Re...
Andrew Chadwick and Simon Collister (2014) "Boundary-Drawing Power and the Re...Andrew Chadwick and Simon Collister (2014) "Boundary-Drawing Power and the Re...
Andrew Chadwick and Simon Collister (2014) "Boundary-Drawing Power and the Re...
 
Towards building trusted multinational civil
Towards building trusted multinational civilTowards building trusted multinational civil
Towards building trusted multinational civil
 
Extreme Democracy: Politics And Networks
Extreme Democracy: Politics And NetworksExtreme Democracy: Politics And Networks
Extreme Democracy: Politics And Networks
 
Social media - enterprise2.0 - course 2010 2011
Social media - enterprise2.0 - course 2010   2011Social media - enterprise2.0 - course 2010   2011
Social media - enterprise2.0 - course 2010 2011
 
Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...
Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...
Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...
 
Social media
Social mediaSocial media
Social media
 
20130917-CyberInitiativeJointLetter
20130917-CyberInitiativeJointLetter20130917-CyberInitiativeJointLetter
20130917-CyberInitiativeJointLetter
 
Dissertation Conclusion Sample
Dissertation Conclusion SampleDissertation Conclusion Sample
Dissertation Conclusion Sample
 
Sharma social crear red
Sharma social crear redSharma social crear red
Sharma social crear red
 
Sharma Social Networks (Tin180 Com)
Sharma Social Networks (Tin180 Com)Sharma Social Networks (Tin180 Com)
Sharma Social Networks (Tin180 Com)
 
Knowledge Management
Knowledge ManagementKnowledge Management
Knowledge Management
 
Social Networks
Social NetworksSocial Networks
Social Networks
 
Social media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social NetworkingSocial media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social Networking
 
Practical Applications for Social Network Analysis in Public Sector Marketing...
Practical Applications for Social Network Analysis in Public Sector Marketing...Practical Applications for Social Network Analysis in Public Sector Marketing...
Practical Applications for Social Network Analysis in Public Sector Marketing...
 
Setting The Stage For Empirical Research In Virtual Social Networks
Setting The Stage For Empirical Research In Virtual Social NetworksSetting The Stage For Empirical Research In Virtual Social Networks
Setting The Stage For Empirical Research In Virtual Social Networks
 
Dv31821825
Dv31821825Dv31821825
Dv31821825
 
Social media for financial institutions
Social media for financial institutionsSocial media for financial institutions
Social media for financial institutions
 

Similar to Role of Social Networks in Securing Cyberspace

Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyCSCJournals
 
https://seranking.com/?ga=2626307&source=link
https://seranking.com/?ga=2626307&source=linkhttps://seranking.com/?ga=2626307&source=link
https://seranking.com/?ga=2626307&source=linkrazaqueali320
 
Community Evolution in the Digital Space and Creation of Social Information C...
Community Evolution in the Digital Space and Creation of SocialInformation C...Community Evolution in the Digital Space and Creation of SocialInformation C...
Community Evolution in the Digital Space and Creation of Social Information C...Saptarshi Ghosh
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTAimee Shuck
 
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhiResearch paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhiShreedeep Rayamajhi
 
Framework for cybersecurity info sharing
Framework for cybersecurity info sharingFramework for cybersecurity info sharing
Framework for cybersecurity info sharingRoy Ramkrishna
 
Net Effectiveness April7
Net Effectiveness April7Net Effectiveness April7
Net Effectiveness April7dianascearce
 
Detecting fake news_with_weak_social_supervision
Detecting fake news_with_weak_social_supervisionDetecting fake news_with_weak_social_supervision
Detecting fake news_with_weak_social_supervisionSuresh S
 
Pillars of the Digital Age [v4] #AXASocial
Pillars of the Digital Age [v4] #AXASocialPillars of the Digital Age [v4] #AXASocial
Pillars of the Digital Age [v4] #AXASocialMichael Netzley, Ph.D.
 
Social capital and virtual communities
Social capital and virtual communitiesSocial capital and virtual communities
Social capital and virtual communitiesMiia Kosonen
 
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASC
Cyber-enabled Information Operations --   Inglis 04 27-17 -- SASCCyber-enabled Information Operations --   Inglis 04 27-17 -- SASC
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASCDavid Sweigert
 
Social Media for the Government
Social Media for the GovernmentSocial Media for the Government
Social Media for the GovernmentKady Chiu
 
Unit 7. Social trend 1: The emerging of new forms of communities
Unit 7. Social trend 1: The emerging of new forms of communitiesUnit 7. Social trend 1: The emerging of new forms of communities
Unit 7. Social trend 1: The emerging of new forms of communitiesNadia Gabriela Dresscher
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Kunihiro Maeda
 
The Design of an Online Social Network Site for Emergency Management: A One-S...
The Design of an Online Social Network Site for Emergency Management: A One-S...The Design of an Online Social Network Site for Emergency Management: A One-S...
The Design of an Online Social Network Site for Emergency Management: A One-S...guest636475b
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationrrepko
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethetecnologico de tuxtepec
 

Similar to Role of Social Networks in Securing Cyberspace (20)

ISACA UW Handbook 2016
ISACA UW Handbook 2016ISACA UW Handbook 2016
ISACA UW Handbook 2016
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
 
https://seranking.com/?ga=2626307&source=link
https://seranking.com/?ga=2626307&source=linkhttps://seranking.com/?ga=2626307&source=link
https://seranking.com/?ga=2626307&source=link
 
Community Evolution in the Digital Space and Creation of Social Information C...
Community Evolution in the Digital Space and Creation of SocialInformation C...Community Evolution in the Digital Space and Creation of SocialInformation C...
Community Evolution in the Digital Space and Creation of Social Information C...
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
 
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhiResearch paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
 
Framework for cybersecurity info sharing
Framework for cybersecurity info sharingFramework for cybersecurity info sharing
Framework for cybersecurity info sharing
 
Net Effectiveness April7
Net Effectiveness April7Net Effectiveness April7
Net Effectiveness April7
 
Detecting fake news_with_weak_social_supervision
Detecting fake news_with_weak_social_supervisionDetecting fake news_with_weak_social_supervision
Detecting fake news_with_weak_social_supervision
 
Pillars of the Digital Age [v4] #AXASocial
Pillars of the Digital Age [v4] #AXASocialPillars of the Digital Age [v4] #AXASocial
Pillars of the Digital Age [v4] #AXASocial
 
Social capital and virtual communities
Social capital and virtual communitiesSocial capital and virtual communities
Social capital and virtual communities
 
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASC
Cyber-enabled Information Operations --   Inglis 04 27-17 -- SASCCyber-enabled Information Operations --   Inglis 04 27-17 -- SASC
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASC
 
Social Media for the Government
Social Media for the GovernmentSocial Media for the Government
Social Media for the Government
 
Unit 7. Social trend 1: The emerging of new forms of communities
Unit 7. Social trend 1: The emerging of new forms of communitiesUnit 7. Social trend 1: The emerging of new forms of communities
Unit 7. Social trend 1: The emerging of new forms of communities
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212
 
The Design of an Online Social Network Site for Emergency Management: A One-S...
The Design of an Online Social Network Site for Emergency Management: A One-S...The Design of an Online Social Network Site for Emergency Management: A One-S...
The Design of an Online Social Network Site for Emergency Management: A One-S...
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperation
 
204
204204
204
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethe
 
Social– isms
Social– ismsSocial– isms
Social– isms
 

Recently uploaded

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Recently uploaded (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

Role of Social Networks in Securing Cyberspace

  • 1. The Role of Social Networks in Securing Cyberspace: Opportunities v and Threats Advisory Board Member, Cyber Security Forum Initiative Founder, Military Cyber Professionals Association Many in American society today equate social networks with online communities such as Google+ and Linkedln. However, social networks have existed since the dawn of man. While the prominence of social networks continues to grow and has proven to be a rich research area, we already know a lot about their characteristics. For those of us interested in securing cyberspace (with an understanding that citizens typically do not want the most vulnerable among us required to fend for themselves in a lawless world), we can make use of what we know about social networks. By recognizing the role of social networks in securing cyberspace, we can better exploit techniques like crowdsourcing and manage threats with more confidence in each other. What we casually call crowdsourcing is in fact a complex series of interactions that capitalizes on diverse perspectives being applied to common problems. Creating an environment that enables this type of synergy or collective intelligence takes deliberate effort to design effectively. Some considerations for designing effective crowdsourcing networks include: Increasing cognitive diversity and range of expertise Modularizing collaboration Reducing barriers to participation Encouraging small contributions Developing a rich and well-structured information commons1 The Cyber Security Forum Initiative (CSFI) and the Military Cyber Professionals Association (MCPA) were created to help professionals connect, crowdsource, and better secure cyberspace as a team. Although their approaches differ in scale and focus, with CSFI embracing a much wider membership base than the DoD-centric MCPA, both were designed to enable communication and partnership. For example, both organizations leverage well-structured information commons like Linkedln, attract relatively diverse personnel, and reduce barriers to participation by offering free membership.2-3 If © United States Cybersecurity Magazine
  • 2. By creating potential ties between personnel with very different backgrounds, social networks such as CSFI and MCPA greatly increase the speed of problem-solving and information flow from one part of the social network to another. The strength of weak ties such as these is in the value of the new information that a local community would otherwise never be exposed to.4 Once such a community is cultivated to the point of critical mass, such connections (online and off) become commonplace and happen organically, and new professional identities begin to emerge. These identities are important to developing norms, elevating the level of discussions, and making for a more attractive community (think recruitment and retention).5These goals, applied to the grand effort of securing cyberspace, have been identified for years and remain valid.6Luckily, organizations such as CSFI and MCPA are making steady progress in this area.7 Every piece of modern information technology is essentially hackable, and every online persona is potentially false. With this reality in mind, building social networks that people trust enough to participate in is risky business. However, social networks enable a web of trust to emerge that can address very real threats, such as those posed by malicious impostors. The foundations of this trust are the strong ties between individuals who know each other online and off. These are colleagues who can pick up a phone or walk over to each other and fact-check. While multiple parallel efforts to verify online personas come at a real cost, it is an investment that minimizes risk and enables a certain level of trust to emerge. Since security and prosperity are the most vital of interests to every country, securing cyberspace to allow for these continued benefits is common ground. As we move forward together towards this shared goal, CSFI and MCPA look forward to the emergence and growth of many more social networks that they can proudly call partners, Sources______________ 1. Nielsen, Michael. Reinventing Discovery: The New Era of Networked Science. Princeton University Press, 2011. 2. Fortner, Amanda. "Defense in the Age of Cyber-Warfare: The Cyber Security Forum Initiative." Edited by Paul De Souza. United States Cybersecurity Magazine, April 2015, 40-45. 3. Billingsley, Joseph L. "An Innovation Framework Applied to a Military Cyber Professionals Association." Master's thesis, Naval Postgraduate School, 2013. Calhoun: The NPS Institutional Archive, September 2013. https://calhoun. nps.edu/bitstream/handle/10945/37587/13Sep_Billingsley_ Joseph.pdf?sequence=1. 4. Granovetter, Mark S. "The Strength of Weak Ties." American Journal of Sociology 78, no. 6 (May 01,1973): 1360-380. Accessed September 23, 2015. http://www.jstor.org/ stable/10.2307/2776392?ref=no-x-route:49055104fa44cd3ee 64ddf42cb968ae1. 5. Kuhn, Thomas S. The Structure of Scientific Revolutions. Chicago: University of Chicago Press, 1970. 6. United States of America. Department of Defense. THE DEPARTMENT OF DEFENSE CYBER STRATEGY. April 2015. http://www.defense.g0v/P0rtals/l /features/2015/0415_cyber- strategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdf. 7. See csfi.us and https://milcyber.org. About the Author: J. L. Billingsley serves on the advisory board o f the Cyber Security Forum Initiative. He is the founder o f the Military Cyber Professionals Association, an officer in the U.S. Army, and an Information Sciences Ph.D. student with the Naval Postgraduate School.