Page 189 - ITU KALEIDOSCOPE, ATLANTA 2019
P. 189

ICT for Health: Networks, standards and innovation




           [44]  C. Douris, “Cyber Threat Data Sharing Needs  [54]  C. Douris, “As Cyber Threats to the Electric Grid
                 Refinement”, Lexington Institute white paper for   Rise, Utilities and Regulators Seek Solutions”,
                 Energy Industry, Aug 2017. Available:              Forbes, Jan 16, 2018. Available:
                 https://www.lexingtoninstitute.org/cyber-threat-   https://www.forbes.com/sites/constancedouris/2018/
                 data-sharing-needs-refinement/ .                   01/16/as-cyber-threats-to-the-electric-grid-rise-
                                                                    utilities-regulators-seek-solutions/#624559c1343e .
           [45]  U.S. Senate. 114th Congress, (2015, Oct. 27). “The
                 Cybersecurity Information Sharing Act”. Available:  [45]  W. Peters, “IACD Overview and IACD
                 https://www.congress.gov/bill/114th-               Framework”, IACD Community Day, Laurel,
                 congress/senate-bill/754 .                         Maryland, 23-March-2017.

           [46]  T. Spring, “NSA-Backed OpenC2.org Aims to    [56]  P. Royer, “Orchestration and Automation”,
                 Defend Systems at Machine Speed”, Threatpost,      OpenC2 Forum, 29-Sep-2016.
                 June 22, 2017. Available https://threatpost.com/nsa-
                 backed-openc2-org-aims-to-defend-systems-at-  [57]  A. Bradbury, “OpenC2 and OrchID – Using
                 machine-speed/126454/ .                            OpenC2 in a Managed Security Services Provider”,
                                                                    OpenC2 Forum, 29-Sep-2016.
           [47]  J. Romano, D. Sparrell, “Open Command and
                 Control (OpenC2) Language Specification Version  [58]  S. Yu, “The Future of Orchestration” Integrated
                 1.0”, OASIS Committee Specification, 11-July-      Cyber, Laurel, Maryland, 1-2-May-2018.
                 2019. Available https://www.oasis-
                 open.org/standards#oc2-ls-v1.0 .             [59]  “Symantec Integrate Cyber Defense Exchange”,
                                                                    Symantec, 2019. Available
           [48]  D. Sparrell, “Defense at Machine Speed,”           https://www.symantec.com/content/dam/symantec/d
                 Borderless Cyber USA Conference, New York, NY      ocs/data-sheets/integrated-cyber-defense-exchange-
                 USA, June 21-22, 2017.                             en.pdf .

           [49]  J. Hiner, “The four types of cybersecurity threats  [60]  M. Sherif, D. Sparrell, “Standards and innovation
                 and a formula to fight them”, June 22, 2017.       in telecommunications”, Communications
                 Available:                                         Magazine, IEEE Volume 30, Issue 7, Jul 1992
                 https://www.techrepublic.com/article/the-4-types-  Page(s):22- 29.
                 of-cybersecurity-threats-and-a-formula-to-fight-
                 them/ .                                      [61]  J. Gurney, “OpenC2 AWS Actuator”. Available:
                                                                    https://github.com/newcontext-oss/openc2-aws-
           [50]  “OASIS Collaborative Automated Course of Action    actuator .
                 Operations (CACAO) for Cyber Security Technical
                 Committee”. Available https://www.oasis-     [62]  W. Trost, “OpenC2 AWS Reference
                 open.org/committees/cacao/charter.php .            Implementation”. Available:
                                                                    https://github.com/att/openc2-aws .
           [51]  “The Cyber-Physical Systems Revolution” in IEEE
                 Computing Edge, Vol. 4, No. 5, May, 2018, pp. 10-  [63]  M. Stair, D. Hamilton, “OpenC2 Lycan for Python”.
                 13. Available:                                     Available: https://github.com/oasis-open/openc2-
                 https://www.computer.org/cms/computing-edge/ce-    lycan-python .
                 may18-final.pdf .
                                                              [64]  E. Ortiz, “A Web Self Service Application for
           [52]  R. Corrigan, “California Energy Systems for the    Generating OpenC2 Commands”, available:
                 21st Century (CES-21)”, presented at IACD          https://github.com/netcoredor/openc2-cmdgen .
                 Community Day, Laurel, Maryland, March 23,
                 2017. Available:                             [65]  E. Ortiz, “GUI Tool for OpenC2 Command
                 https://drive.google.com/file/d/1NWtwUN4Uv2LFk     Generation”, DefCon 26 Demolabs, Las Vegas,
                 TUdTfL5q-TfWATDgUMi/view .                         Nevada, 12-Aug-2018. Available:
                                                                    https://www.defcon.org/html/defcon-26/dc-26-
           [53]  J. Van Randwyk, et al., ‘California Energy Systems  demolabs.html .
                 for the 21st Centruy 2016 Annual Report”,
                 Lawrence Livermore National Laboratory, March  [66]  D. Sparrell, “OpenC2 API Simulator (OCAS)”.
                 29, 2017. Available: https://e-reports-            Available: https://github.com/oasis-open/openc2-
                 ext.llnl.gov/pdf/878504.pdf .                      ocas .









                                                          – 169 –
   184   185   186   187   188   189   190   191   192   193   194