Search results for "OODA loop"
showing 3 items of 3 documents
Evolution of OO Methods: the unified case
1997
This paper takes an evaluative look into OO methods and especially the evolution of the new snified method from its ancestors, OMT and OODA. The paper ries to classify the components of the earlier ethods and identify the parts that have been taken into the Unified ethod. The research applies the method metrics approach. For the sake of compactness we limit ourselves to the class diagram technique of all methods. We make observations about the number of concepts in each variation and show how the metrics can be used to analyse the changes in the techniques.
Cyber Situational Awareness in Critical Infrastructure Protection
2020
The European Union promotes collaboration between authorities and the private sector, and the providers of the most critical services to society face security related obligations. In this paper, critical infrastructure is seen as a system of systems that can be subject to cyber-attacks and other disturbances. Situational awareness (SA) enhances preparations for and decision-making during assessed and unforeseen disruptive incidents, and promoting Cyber effective situational awareness (CSA) requires information sharing between the different interest groups. This research is constructive in nature, where innovative constructions developed as solutions for domain-specific real world problem…
A Novel Method for Detecting APT Attacks by Using OODA Loop and Black Swan Theory
2018
Advanced Persistent Threat(APT) attacks are a major concern for the modern societal digital infrastructures due to their highly sophisticated nature. The purpose of these attacks varies from long period espionage in high level environment to causing maximal destruction for targeted cyber environment. Attackers are skilful and well funded by governments in many cases. Due to sophisticated methods it is highly important to study proper countermeasures to detect these attacks as early as possible. Current detection methods under-performs causing situations where an attack can continue months or even years in a targeted environment. We propose a novel method for analysing APT attacks through OO…