Latest News

Note on Cyber Risk and Cyber Security

By Tuncer Ören, Professor Emeritus of Computer Science, University of Ottawa

As the Achilles heel of the digital era, the importance of cyber risk is increasing for industrialized countries [1]. A recent publication [2] at Forbes was titled, “If You Don’t Know Much about Cybersecurity, You’re Not Alone.” Amazingly, even some of the conferences on complex systems also do not consider cyber security as part of their themes [3, 4]. A situation, which will hopefully be changed soon. On the other hand, October is declared Cyber Security Awareness Month, in Canada [5] and in the USA [6].

Simulation-based approaches are gaining momentum for several disciplines [7] as well as in cyber security studies. Even cyber security modeling and simulation engineer jobs are already in demand [8].

At SIMULTECH’17 (The seventh International Conference on Simulation and Modeling Methodologies, Technologies and Applications) [9] two events were worth noting from cyber security point of view:

Dr. Jerry Couretas, the Editor-in-chief of JDMS (The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology of SCS) was one of the invited speakers and his speech was titled: “Cyber Systems Risk – an Opportunity for Model Based Engineering & Design.”

His excellent presentation is available at the conference site [10]. (You may also be interested to the Special Issue of JDMS on “Cyber Modeling and Simulation (vol. 14, July 2017 issue, pp. 197-324) [11].)

The traditional opening panel of SIMULTECH’17 organized by Prof. Mohammad Obaidat was very pertinent to cyber security and was titled, “Challenges and Directions in Modeling and Simulation of Computer Networks and Systems.”

One of the good sources of books (both printed and pdf versions) is NAP (National Academic Press) [12]. Most of the publications of NAP on cyber security can be accessed from [13].

To assure high level of reliability of simulation studies of cyber security issues, in addition to traditional V&V and QA, one can also consider Failure Avoidance (FA) [14].

References: (All links are accessed on 2017-11-20)

[1] D. Antonucci (2017). The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities, Wiley.
[2] Forbes: If You Don’t Know Much About Cybersecurity, You’re Not Alone
[3] Adaptive 2018: Tenth International Conference on Adaptive and Self-Adaptive Systems and Applications
[4] ICCASP 2018: 20th International Conference on Complex Adaptive Systems and Properties
[5] Public Safety Canada: Cyber Security Awareness Month
[6] Department of Homeland Security: National Cyber Security Awareness Month
[7] Guide to Simulation-Based Disciplines: Advancing Our Computational Future
[8] Indeed.com: Cyber Security Modeling Simulation Jobs
[9] SIMULTECH 2017: 7th International Conference on Simulation and Modeling Methodologies, Technologies and Applications
[10] SIMULTECH 2017: A Developing Science of Cyber Security–An Opportunity for Model Based Engineering & Design
[11] The Journal of Defense Modeling and Simulation
[12] The National Academies Press
[13] The National Academies Press: Cyber Security
[14] Ören, T.I. and L. Yilmaz (2009). Failure Avoidance in Agent-Directed Simulation: Beyond Conventional V&V and QA. In L. Yilmaz and T.I. Ören (eds.). Agent-Directed Simulation and Systems Engineering. Systems Engineering Series, Wiley-Berlin, Germany, pp. 189-217.