<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>This lack of trained personnel is not a new problem. In</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>A Socio-Technical Framework to Improve cyber security training: A Work in Progress</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Norwegian University of Science and Technology</institution>
          ,
          <addr-line>Postboks 191, 2802 Gjøvik</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Telenor Norge AS</institution>
          ,
          <addr-line>Snarøyveien 30, 1331 Fornebu</addr-line>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2017</year>
      </pub-date>
      <volume>27</volume>
      <fpage>0000</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>In this paper we discuss a work in progress to create a socio-technical system design framework for cyber security training exercises (STSD-CSTE) to support the development of cyber security training in the Norwegian Cyber Range (NCR). The process to create the framework started by first performing a socio-technical systems root cause analysis of an Advanced Persistent Threat (APT) incident called “Operation Socialist”. Operation Socialist was the code name given by the British signals and communications agency Government Communications Headquarters (GCHQ) to an operation in which they successfully breached the infrastructure of the Belgian telecommunications company Belgacom (now Proximus Group) between 2010 and 2013. To extract relevant information from the case four socio-technical systems models were tested. The four models integrated into one framework were the Cassano-Piche Structural Hierarchy model, the “Security by Consensus” model, the Kowalski's SocioTechnical systems dynamic model and the Withword's 8 criterial model. After this framework has been reviewed by the socio-technical research community we plan to test the framework with exercises in the Norwegian Cyber Range environment. NCR will be an arena where testing, training, and exercise will be used to expose individuals, public and private organizations and government agencies to simulate socio-technical cyber security events and situations in a realistic but safe environment.</p>
      </abstract>
      <kwd-group>
        <kwd>Socio-technical models</kwd>
        <kwd>Root cause analysis</kwd>
        <kwd>Crisis-management</kwd>
        <kwd>Cyber Security simulations</kwd>
        <kwd>scenario exercises</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>and scenarios based on actual cyber incidents. In our work, we are attempting to
combining socio-technical theory with didactic theory and crisis management training
practices to cyber education and training.</p>
      <p>The paper is structured as follows: After the introduction and background in section
1 and 2, in section 3 our research approach is discussed, together with our framework
for building scenarios and exercises in cyber readiness based on real life incidents. In
section 4, we review relevant literature. Then, in section 5 we present the case and one
example of how we used socio-technical models to analyze the case, and in section 6
we exemplify the outcome of this application. In section 7 we end this paper by outline
our prospects for further research.</p>
    </sec>
    <sec id="sec-2">
      <title>Background</title>
      <p>
        Several threat-actors are focusing on telecom services and infrastructure. According
to Norwegian National Security Authority (NSM) in 2017 the NorCERT alarm on
critical national infrastructure were triggered more than 22.000 times and more than 5.200
Norwegian entities were subject to advanced cyber-attacks
        <xref ref-type="bibr" rid="ref19">(NSM, 2018)</xref>
        . In the period
May 2016 to May 2017 Telenor Norway managed 1800 cyber intrusion attempts in
own and customers networks
        <xref ref-type="bibr" rid="ref24">(Telenor, 2018)</xref>
        . Private and public entities are facing new
cyber threats day by day, and threat actors have different motivations. The most
advanced cyber-attacks are often referred to as Advanced Persistent Threat (APT). Li
defined APT as a cyber-attack launched by a group of sophisticated, determined, and
coordinated attackers who systematically compromise the network of a specific target or
entity for a prolonged period
        <xref ref-type="bibr" rid="ref17">(Li, Lai, &amp; Ddl, 2011)</xref>
        . APTs have capacity, capability
and motivation to run clandestine operations for months and years to achieve their
objectives. Most organizations are not prepared to handle those kinds of advanced
malicious cyber-attacks, and when it happens the repercussions are vast.
      </p>
      <p>
        Detecting anomalies that occur only within individual variables is often trivial, while
detecting correlation anomalies is much harder and is practically important in fault
analysis of complicated dynamic systems
        <xref ref-type="bibr" rid="ref12">(Idé, Lozano, Abe, &amp; Liu, 2013)</xref>
        . In a complex
cyber-physical system, such as a smart grid, while some of the relationships between
time series can be directly observed, other mutual dependencies are significantly
complex to extract computationally. A typical cyber-physical system may include multiple
process series with hundreds of mutual dependencies, where many of them are not
directly observable
        <xref ref-type="bibr" rid="ref22">(Rahman, Momtazpour, Zhang, Sharma, &amp; Ramakrishnan, 2015)</xref>
        .
      </p>
      <p>
        To understand and manage cyber security situations, we suggest using
socio-technical models to prepare for training and education based on real-life incidents. A
sociotechnical system (STS) is the synergistic combination of humans, machines,
environments, work activities and organizational structures and processes that comprise a given
enterprise
        <xref ref-type="bibr" rid="ref1">(Carayon et al., 2015)</xref>
        . The goal of STS is a comprehension and accounting
for the ‘joint optimization of the social and technical systems’, i.e. the different
subsystems or different system components. Workers adapt to the sociotechnical system, but,
in their turn, also serve to adapt the sociotechnical system itself.
      </p>
      <p>
        In this paper, we approach the cyber security challenges using what can be referred
to as a naive inductivist approach. The naïve inductivist approach starts by first
observing a phenomenon and then generalizing the phenomenon which leads to theories that
can be falsified or validated
        <xref ref-type="bibr" rid="ref14">(Kowalski, 1994)</xref>
        . This approach will use the methodology
outline by design science research in information systems (DSRIS)
        <xref ref-type="bibr" rid="ref15">(Kuechler &amp;
Vaishnavi, 2012)</xref>
        . This methodology uses artifact design and construction (learning
through building) to generate new knowledge and insights into a class of problems.
      </p>
      <p>
        DSRIS requires three general activities: (1) construction of an artifact where
construction is informed either by practice-based insight or theory, (2) the gathering of data
on the functional performance of the artifact (i.e., evaluation), and (3) reflection on the
construction process and on the implications the gathered data (from activity (2)) have
for the artifact informing insight(s) or theory(s)
        <xref ref-type="bibr" rid="ref15">(Kuechler &amp; Vaishnavi, 2012)</xref>
        .
      </p>
      <p>
        How to work on these steps was presented in a thesis written by Karokola
        <xref ref-type="bibr" rid="ref13">(Karokola,
2012)</xref>
        . He visualized this approach as outlined in figure 1. As we are approaching our
work in a naive inductivist approach, we modified the logical formalism in the model
from abduction to induction.
      </p>
      <p>To propose an artifact in an inductive approach we started up by analyzing an actual
cyber-incident to present the problem (first step in the 2nd column). For the next step in
this work in progress paper we suggest a model based to deal with the problem in crisis
management education in which different kind of exercises are needed to target
different aspect in a socio-technical security system (second step in the 2nd column). The goal
of the paper is to propose a tentative design (first step in the 4th column), in which we
want to test when preparing for cyber exercises at the Norwegian Cyber Range.
3.1</p>
      <sec id="sec-2-1">
        <title>Apply an Actual Incident Case study</title>
        <p>The actual incident we chose for our first attempt to design a framework was the
APT-attack “Operation Socialist” making international headlines in September 2013.
Operation Socialist was the code name given by the British signals and communications
agency Government Communications Headquarters (GCHQ) to an operation in which
they successfully breached the infrastructure of the Belgian telecommunications
company Belgacom (now Proximus Group) between 2010 and 2013.</p>
        <p>We did a root cause analysis on this incident using four different socio-technical
models. Those models were chosen based on the different approaches they have, to see
if any or all of them could be relevant for making scenarios for exercises.</p>
        <p>
          The responsible of the technical operations are often considered to be within the
organization. However, most organizations today are complex and cannot perform all
technical tasks by themselves. By entering into contracts and service level agreement
of various sort, the companies have other people and organizations to run their technical
operations and are therefore bounded by agreements and thereby regulations. Withford
&amp; Zaic describe four different system levels to analyze requirements for technical
operation with WOSP (Web of System Performance)
          <xref ref-type="bibr" rid="ref25">(Whitworth &amp; Zaic, 2018)</xref>
          :
Hardware requirements, software requirements, human requirements and communal
requirements. They define WOSP as a theoretical framework for the balanced design and
evaluation of advanced information systems. The framework analyses performance via
four fundamental system elements: Boundary, internal structure, effectors and
receptors. As this is organizational issue, we considered this model relevant when designing
scenarios for discussion exercises.
        </p>
        <p>
          The four quadrants used in the proposed framework are modeled after the naive
socio-technical system dynamic mental model proposed by Kowalski
          <xref ref-type="bibr" rid="ref14">(Kowalski, 1994)</xref>
          .
Kowalski's mental model attempts to describe how systemic security weaknesses in
socio-technical systems can be analogized as homeostatic imbalance. Homeostatic
imbalance is the disability of the internal environment to remain in equilibrium in the face
of internal, external and environmental changes
          <xref ref-type="bibr" rid="ref21">(Pelletier, Guertin, Paige Pope, &amp;
Rocchi, 2016)</xref>
          . Homeostatic imbalance is a concept that we suggest can also be used
with scenario building to model the inability of an organization to face internal and
external cyber threats.
        </p>
        <p>
          The Security by Consensus model (SBC), is a model that attempt to capture the static
and dynamic characteristics of ICT systems security
          <xref ref-type="bibr" rid="ref14">(Kowalski, 1994)</xref>
          . Moreover, the
model sub-divides security measures into subclasses. The holistic approach required
the issue of IT crime be examined, and the model was used to make computer abuse
reports. Such reports are relevant on the strategic level and as a method to define action
points in the organizations, and thereby likely to be relevant for table-top scenarios.
        </p>
        <p>
          In the Norwegian Cyber Range project, we also plan to run full-scale exercises in
Norway. Cassano-Piche et. al. Socio-technical systems analysis of the BSE Epidemic
in the UK using the Rasmussen framework helped vertically integrate a socio-technical
root cause analysis of Mad Cow Diseases across multiple levels and hierarchies of
socio-technical system in the United Kingdom as a whole
          <xref ref-type="bibr" rid="ref3">(Cassano-Piché, Vicente, &amp;
Jamieson, 2006)</xref>
          . Consequently, we believe it can be used to design scenarios for large
scale cyber security incidents and events in Norway.
        </p>
        <p>
          Suggested modelling four quadrants used in the proposed framework are modeled
after the naive socio-technical system dynamic mental model proposed d by Kowalski
          <xref ref-type="bibr" rid="ref14">(Kowalski, 1994)</xref>
          . As mentioned before, homeostatic imbalance concept can be used
with scenario building. Therefore, the model suggested consists of the four
socio-technical aspects suggested by Kowalski
          <xref ref-type="bibr" rid="ref14">(Kowalski, 1994)</xref>
          :
        </p>
        <p>
          First, we tried to see where scenarios for exercises could fit our socio-technical
model. There are several types of exercises, and in this paper, we have used the
exercise-definitions outlined by the Norwegian Directorate for Civil Protection (DSB):
discussion exercises, functional exercises, simulation exercises and full-scaled exercises.
A discussion exercise is executed under different kind of names, for example,
tabletop, dilemma-exercises or seminar-exercises
          <xref ref-type="bibr" rid="ref10 ref21 ref7 ref8 ref9">(DSB, 2016b, 2016c, 2016d, 2016a)</xref>
          . In a
discussion exercise, all participants gather in one room and all communication happens
within this room. Inputs are given oral or on paper/screen/canvas sheets. All activity is
to focus around discussion on concept and ideas and no concrete action or
communication outside the exercise is needed. The participants are not to play or simulate, but to
discuss specific and generic problems related to the scenario presented by the instructor.
Function exercises is a collective name for exercises that test one or more functions
within the organization
          <xref ref-type="bibr" rid="ref10 ref7 ref8 ref9">(DSB, 2016b)</xref>
          . It might be technique, organization or
capabilities. Attending a function exercise, it is more about what to exercise than how the
exercise is done. Function exercises are also referred to as procedure exercises. A
simulation exercise consists of two elements: The attenders and the simulation counterparts
          <xref ref-type="bibr" rid="ref10 ref7 ref8 ref9">(DSB, 2016d)</xref>
          . A simulation exercise can be illustrated as if the game is running within
a “closed bubble”, where the participants are staying in the inner bubble and the
counterparts surrounding them. The participants will normally stay in their accustom
premises, with their normally accessible tools and equipment. The simulation counterparts
are staying in other premises, and control the game based on a planned scenario. The
purpose is to convey a message with a certain effect to the participants. A full-scale
exercise consists of all the elements in a simulation exercise, and functions, normally
on a tactical level doing practical work
          <xref ref-type="bibr" rid="ref10 ref7 ref8 ref9">(DSB, 2016a)</xref>
          . A full-scale exercise is always
real time. You use the same equipment as you normally have access to, and exercise in
the places you normally are working.
        </p>
        <p>For each kind of exercise, we need relevant scenarios. A scenario is a summary of
the plot of a play, including information about its characters, scenes, or a predicted
sequence of events (The free dictionary, by Farlex). The common way of making
scenarios is to find out who is participating in the exercise and make the scenario relevant
for the participants. For example, in 2017, a group from NTNU, CCIS, The Norwegian
Cyber Defence and the Norwegian Civil Defence made a table-top cyber exercise for
the Oppland County Office management group and for the county readiness council.
We made the scenario based on the participants and their responsibility. The scenario
was based on what can happen in the society more than what has happened, and it was
all made up by ideas. As a reflection after the exercise we asked ourselves if there are
relevant theories to approach these kinds of scenarios in a better way, and we could not
find any relevant theories on this specific matter.</p>
        <p>Large companies have a similar approach for creating scenarios to run exercises.
Telenor is running annual full-scale cyber exercises including participants and
observers from the Norwegian Armed Forces, The Norwegian Police, The Norwegian
National Security Authority and other invited participants. The scenarios are meant to
reflect true-to-life cyber incidents the organization faces and put the participants to the
test. Experiences and lessons learned build operational, tactical and strategic
competence and improve the participant’s organizations in facing and managing cyber
security incidents. Telenor has similar idea-based approach for making scenarios for
exercises.</p>
        <p>By considering either Structure, Methods, Machines or Ethical/Legal i.e. culture in
the scenario for exercise build, we can determine where different exercises would be
useful. Moreover, by having performed a root cause analysis and thus determined the
underlying “real”, that is major and sine qua non - reasons for the cyber-attack, building
an appropriate scenario based on this could prove more accurate, give higher learning
quality/effect and more cost effective.</p>
        <p>To exemplify this approach, we have discussed the NATO exercise Trident juncture
executed in and hosted by Norway in 2018. The main scenario was made for the
fullscale exercise within a 3-week timeline. The strategic part of the exercise was kept
outside the full-scale exercise and started instead at the end of the full-scale exercise
timeline. The scenario for the strategic part of the exercise was in this case based only
on structure and methods. The scenario for the NATO exercise would in this case be
placed both in an overall context in the model, but the strategic part of the exercise
would be placed in the upper right part of the model.</p>
        <p>
          When planning for the annual exercise at the Oppland county readiness council in
2017, the exercise's theme was a cyber-attack against municipalities ICT-systems
          <xref ref-type="bibr" rid="ref20">(Oppland Arbeiderblad, 2017)</xref>
          . The county readiness council was given step-by-step
information about the scenario and had round table discussions based on those inputs.
The discussions were based on the structure in the organizations, laws and regulations
and ethical issues (amongst others) – a typical discussion exercise that would be placed
in the upper left corner in our model.
        </p>
        <p>When testing systems such as fire alarm systems, it requires a certain methodology
and actual use of machines. Fire-alarm exercises is typical functional exercises and you
will be placed in the lower right corner in our model. Other known exercises that is
based on methodology and machines is cyber mega games, better described as
simulation games.</p>
        <p>
          When analyzing the outlined DSB’s definitions of exercises, we found that there is
not any definition on cultural and machine exercises (lower left corner of our model).
However, there are examples of real-life incidents which has been used in teaching
strategic and ethical exercises, such as the Therax-25 case
          <xref ref-type="bibr" rid="ref5">(Computing Cases, 1983)</xref>
          .
We consider this as an area of which can be developed better in combining
exercisedefinitions and scenarios and have presented this in our future research chapter.
        </p>
        <p>Our scenario for exercise perception is shown in figure 2.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Relevant literature</title>
      <p>
        Today we witness rapid developments of APT tools and systems. Future scenarios
include attack vectors orchestrating sets of APT tools in mixed interaction with
networks of military units and civilian infrastructures. Carlsson &amp; Gustavsson state that
we must prepare ourselves to cope with these threats through awareness and education
        <xref ref-type="bibr" rid="ref2">(Carlsson &amp; Gustavsson, 2018)</xref>
        .
      </p>
      <p>
        Most organizations are not prepared to handle the vast implications of these crises.
A challenge in crises is to transfer the accumulated knowledge flowing from concrete
experiences, well-documented by crisis management researchers, to learning models in
which organizational actors will be actively engaged. One of the avenues to better
integrate this learning can be found in organizational development approaches
        <xref ref-type="bibr" rid="ref16">(Lalonde,
2007)</xref>
        .
      </p>
      <p>
        Since the start of the 1980s, the field of crisis management has been characterized
by two main trends: planning in crisis management and the analysis of organizational
contingencies during a crisis
        <xref ref-type="bibr" rid="ref16">(Lalonde, 2007)</xref>
        . Based on vast relevant research on crisis
management, Lalonde created a synthesis of results from academic research and
classified the results with reference to:
• types or contents of lessons, returning to the question what have we
learned?, whether new information, the consolidation of existing
organizational routines stemming either from crisis plans or routines learned within
the organization, or tacit knowledge coming from socialization in a trade or
profession or from an organizational cultural environment, etc.;
learning conditions, returning to the question how or in what conditions did
we learn?, including experimentation in real time in “real” situations,
simulations of the experience, training, confrontation and sharing of experiences,
etc.;
the potential to transfer knowledge within the organization, aiming to
respond to the question how can we incorporate this knowledge in an
organizational learning model?
      </p>
      <p>In our ongoing research, we use an actual APT-attack to extract the consequences
from the attack and figure out what we can learn from such attacks, and how to
implement lessons learned in exercises enable also other organizations learn from it.</p>
      <p>
        Scenarios are tools for improving the decision-making process on a background of
possible future environments. The scenarios should not be treated as predictions
capable of influencing the future nor science fiction stories prepared merely to titillate the
imagination
        <xref ref-type="bibr" rid="ref23">(Schoemaker &amp; van der Heijden, 2008)</xref>
        . In a study to describe how
scenarios used in an environmental science program function in terms of the type of
questions they evoked, the results gave that questioning in different ways all bring learning
to participants
        <xref ref-type="bibr" rid="ref6">(Dahlgren &amp; Öberg, 2001)</xref>
        .
      </p>
    </sec>
    <sec id="sec-4">
      <title>Case background and example</title>
      <p>5.1</p>
      <sec id="sec-4-1">
        <title>Operation Socialist</title>
        <p>
          Belgacom operates a substantial number of data links internationally and it serves
millions of people across Europe as well as officials from top institutions including the
European Commission, the European Parliament, the European Council and the NATO
HQ Europe. When Belgacom’s internal security team began to suspect that their system
was infected with a virus, they hired in outside experts, and after a while the Belgian
military intelligence to handle the situation
          <xref ref-type="bibr" rid="ref18">(Marquis-Boire, Guarnieri, &amp; Gallagher,
2014)</xref>
          . Some anomalies where detected already in 2012, but Belgacom's security team
was unable to identify the cause.
        </p>
        <p>
          The operation's existence were revealed in documents leaked by the former National
Security Agency contractor Edward Snowden in 2013. The malware disguised as
legitimate Microsoft software, where identified as the source of the problems. The leakage
stated that it was the Government Communications Headquarters (GCHQ) who had
infiltrated Belgacom’s systems. GCHQ is the British intelligence and security
organization responsible for providing signals intelligence (SIGINT) and information
assurance to the government and armed forces of the United Kingdom. According to the
leaked documents, from Snowden, GCHQ had probed Belgacom's infrastructure for
years. Additionally, the documents suggested that Operation Socialist had been
recognized by the head of the GCHQ's Network Analysis Centre as a success. Snowden
subsequently described Operation Socialist as the "first documented example to show one
EU member state executing a cyber-attack on another…"
          <xref ref-type="bibr" rid="ref18">(Marquis-Boire et al., 2014)</xref>
          .
        </p>
        <p>According to the leakage, GCHQ had been able to get access to vital data within the
mentioned organizations. This led to both political and organizational difficulties for
multiple stakeholders.</p>
        <p>
          GCHQ had allegedly used Quantum Inserts technology to target Belgacom and
GPRS roaming exchange (GRX) providers like the Comfone, Syniverse, and Starhome.
Quantum Insert is the process of injecting TCP sessions into a TPC stream and sending
the victim in the wrong direction towards a malicious website that infects their
computers with malware at lightning pace
          <xref ref-type="bibr" rid="ref18">(Marquis-Boire et al., 2014)</xref>
          . The combination of
an IP address and a port is strictly known as an endpoint and is sometimes called a
socket. A TCP connection is defined by two endpoints a.k.a. sockets. The Quantum
Insert attack started by finding that way into the Belgacom systems by targeting their
engineers use of passwords on LinkedIn
          <xref ref-type="bibr" rid="ref18">(Marquis-Boire et al., 2014)</xref>
          , the APT
killchain was as follows:
• Reconnaissance: The APT choose targets of interest and surveil for a period
their use of services on the internet, i.e. Belgacom system administrators
active on LinkedIn.
• First stage: Drivers which act as loaders for a second stage. When started
loading, loads and executes stage 2.
• Second stage: When launched it cleans traces of the initial loader, and then
loads the next part and monitors its execution (NB! May disinfect by failure).
• Orchestrator: Service orchestrator working in Windows' kernel. Loads the
next part of the malware.
• Information harvesters: Include data collectors, self-defense engine,
functionality for encrypted communications, network capture programs, and
remote controllers of different kinds.
• Stealth implants: Pointers that reference specific locations in memory.
Difficult to find, as it is very much alike pool scanning from kernel memory (used
by Windows).
        </p>
        <p>
          Technically Quantum Inserts are categorized as “man-on-the-side attacks” which is
a subcategory to “waterhole attacks”. As such APT-attacks are very difficult to
discover, the exact time of when the stealth implants were in place is uncertain, but the
investigators suggested an approximately startup in 2010. The Intercept summered up
the story timewise in 2018
          <xref ref-type="bibr" rid="ref11">(Gallagher, 2018)</xref>
          . The timeline of the incident is shown in
figure 3.
        </p>
        <p>
          One of the models we used for analyzing the case was the BSE Structural Hierarchy
model based on Rasmussen structural hierarchy model
          <xref ref-type="bibr" rid="ref3">(Cassano-Piché et al., 2006)</xref>
          . In
this paper it is presented as an acci-map. An acci-map is a systems-based technique
for accident analysis, specifically for analyzing the causes of accidents and incidents
that occur in complex Socio-technical systems. In figure 4 we present the different
layers in the society in the left column, then some analyzed impacts in the second column
and a flow-chart to show how events relate to each other in the right column.
        </p>
        <p>We analyzed what impact the incident had on the different layers and moreover
used the flowchart to show how decisions were made and had impact on other layers
both in Belgacom and in other societal organizations.</p>
        <p>The socio-technical models appear useful in understanding and defining training
scenarios as it gives us a good indication on both social and technical challenges from real
life cases.</p>
        <p>The SBC Model appears to be a good model for making scenarios for table top
exercise regarding the Belgacom incident, since it helps to indicate were the organization
is vulnerable from a strategic level within the organization. By using the SBC model,
we can make exercise that show the relationship between different both technical and
social functions within (in this case) Belgacom, and a scenario could be made to support
this.</p>
        <p>
          For Kowalski’s socio-technical model we choose organizational and national level,
but we think that for writing scenarios, we could have chosen both local government
and other third-parties. We figured this model would be excellent for making scenarios
for discussion exercises and table-top exercises. This model gives the
instructors/trainers possibility to both focus and train the company and a third party. The idea of the
model is though in a continual state of surface flux, it is also striving to reach a state of
equilibrium or homeostasis
          <xref ref-type="bibr" rid="ref14">(Kowalski, 1994)</xref>
          . In our incident, this means that when we
find the weakest link in the model, which might be the place to start modeling a scenario
for exercise, by using this model, you may end up with different kind of scenarios and
exercises.
        </p>
        <p>The BSE-model with the flow-chart shows how well aligned the different events are
between different levels in this hierarchy, and we also see a scenario involving all these
levels. This model shows that all levels are connected and gives us the reason to believe
that this model can be used for making scenarios for full-scaled exercises, but also be
toned down and used for all other types of exercises.</p>
        <p>When we analyzed the Withword 8 criteria-model we found that this is related to
organizational level in first, and as the WOSP are made to follow up on strategic
decisions, this model can be used for discussions exercises. This assumes Information
Security as part of the WOSP’s.</p>
        <p>Below is a table outline the four different models and the type of exercise the actual
incident can be applied.</p>
        <p>In figure 5 we map the different socio-technical models together with the scenarios
for exercises mapped in figure 2, to attempt to visualize and compare. We may conclude
that by changing the models in one or another direction, they will be more suitable for
the different kind of exercises. For example, the Kowalski model can float across the
diagram based on the situation in the organization, and by that approach decide what
exercise to consider.</p>
        <p>We are proposing to name this comparing model a socio-technical system design
framework for cyber security training exercises (STSD-CSTE).</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Future Directions</title>
      <p>Social-technical models enables us to introduce more holistic and near-to-life
elements needed to be factored in designing scenarios. We need to verify and validate the
findings we already have made, and to enhance and improve the STSD-CSTE model
proposed. To validate the framework, we plan to test it when setting up exercises in the
NCR environment. NCR will be an arena where testing, training, and exercise are tools
to expose people, businesses, and units to realistic events and situations in a realistic
but safe environment. The arena ensures efficient transfer of knowledge and building
of real-world competence, that links together the strategic, operational, tactical and
technical levels of decision making, by simulating the impacts of cyber security events
on the levels of society, digital value chains and cyber infrastructure without harming
the entities involved and their critical infrastructure.</p>
      <p>In this paper we describe a root-cause analysis by using only four socio-technical
models. In future work we will do a systematic-literature review of socio-technical
modeling in general and select the models that best meets when designing exercise and
scenario in the Norwegian Cyber Range.</p>
      <p>To ensure the best possible effect in the cyber-range arena in Norway, current
existing information systems tools used in the community will be, for example, ISCMS
(information security crises management systems) systems, and facilitate accurate
comprehension of scenarios fitted the different systems. Additionally, there will be need of
preparedness learning based on real life incidents.</p>
      <p>When analyzing the outlined DSB’s definitions of exercises, we found that there is
no clear definition on cultural and machine exercises (lower left corner of our model).
However, as mentioned there are examples of real-life incidents which has been used
in teaching strategic and ethical exercises. We consider this as an area of which can be
developed better in combining exercise-definitions and scenarios and have a work in
progress in this matter.</p>
      <p>As illustrated in figure 6, the more complex and capabilities involved in the training
exercise, the more effort and resources must be put into planning.</p>
      <p>Figure 6 also illustrates another adjacent topic; cost. A full-scale exercise requires
far more resources than simple discussion meetings or tabletop exercises. By using a
more granular (STSD-CTF) model, time and cost can be saved by facilitating
management to help them identifying and choose appropriate test scenarios for the participating
organization. By structured use of the (STSD-CTF) model scenario repository can be
constructed. Scenario repository can be used to both re-use and exchange scenario and
exercise. This may reduce costs of cyber security training and help to fill the existing
competence gap for cyber security personnel in two ways: Directly to provide
customized training exercise at low cost and secondly by allowing none security specialists to
participate in organizational learning exercises. Moreover, consequently distribute the
knowledge to handle the cyber security problem across the organization.</p>
      <p>Being a working in progress paper it is difficult to have clear conclusions yet.
However as indicate in figure 1 there are 5 distinct steps in the design science research
process, problem analysis step, solutions suggestion step, development step, evaluations
step and conclusion. This paper has outlined a work in progress in step 1 and step 2. In
the next step we will develop scenario exercises and refine the evaluation criteria to
measure the effectiveness of these exercise to help deal with the problem of fill the gap
between the demand and supply of cyber security specialist and cyber security trained
users.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <surname>Carayon</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hancock</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leveson</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Noy</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sznelwar</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          , &amp; van Hootegem,
          <string-name>
            <surname>G.</surname>
          </string-name>
          (
          <year>2015</year>
          ).
          <article-title>Advancing a sociotechnical systems approach to workplace safety - developing the conceptual framework</article-title>
          .
          <source>Ergonomics</source>
          . https://doi.org/10.1080/00140139.
          <year>2015</year>
          .1015623
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <surname>Carlsson</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Gustavsson</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>The art of war in the cyber world</article-title>
          .
          <source>In 2017 4th International Scientific-Practical Conference Problems of Infocommunications Science and Technology</source>
          , PIC S and T 2017 -
          <article-title>Proceedings</article-title>
          . https://doi.org/10.1109/INFOCOMMST.
          <year>2017</year>
          .8246345
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <surname>Cassano-Piché</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vicente</surname>
            ,
            <given-names>K. J.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Jamieson</surname>
            ,
            <given-names>G. A.</given-names>
          </string-name>
          (
          <year>2006</year>
          ).
          <article-title>A SOCIOTECHNICAL SYSTEMS ANALYSIS OF THE BSE EPIDEMIC IN THE UK THROUGH CASE STUDY</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <surname>Cisco.</surname>
          </string-name>
          (
          <year>2018</year>
          ).
          <source>Annual cyber security report.</source>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <given-names>Computing</given-names>
            <surname>Cases</surname>
          </string-name>
          . (
          <year>1983</year>
          ). Therac-
          <volume>25</volume>
          . Retrieved from https://computingcases.org/case_materials/therac/teaching_intro/Teaching_Intro .html
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <surname>Dahlgren</surname>
            ,
            <given-names>M. A.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Öberg</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          (
          <year>2001</year>
          ).
          <article-title>Questioning to learn and learning to question: Structure and function of problem-based learning scenarios in environmental science education</article-title>
          .
          <source>Higher Education</source>
          (Vol.
          <volume>41</volume>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <surname>DSB.</surname>
          </string-name>
          (
          <year>2016a</year>
          ). Fullskalaøvelser. Retrieved from https://www.dsb.no/globalassets/dokumenter/risiko-sarbarhet-ogberedskap/ovingsveileder/metodehefte_-fullskalaovelse.pdf
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <surname>DSB.</surname>
          </string-name>
          (
          <year>2016b</year>
          ). Funksjonsøvelser. Retrieved from https://www.dsb.no/globalassets/dokumenter/risiko-sarbarhet-ogberedskap/ovingsveileder/metodehefte_funksjonsovelse.pdf
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <surname>DSB.</surname>
          </string-name>
          (
          <year>2016c</year>
          ).
          <article-title>Metodehefte diskusjonsøvelse</article-title>
          . Retrieved from https://www.dsb.no/globalassets/dokumenter/risiko-sarbarhet-ogberedskap/ovingsveileder/metodehefte_diskusjonsovelse.pdf
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <string-name>
            <surname>DSB.</surname>
          </string-name>
          (
          <year>2016d</year>
          ). Spilløvelser. Retrieved from https://www.dsb.no/veiledere-handbokerog-informasjonsmateriell/metodehefte-spillovelse/
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <string-name>
            <surname>Gallagher</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          (
          <year>2018</year>
          , February 17).
          <article-title>How U.K. spies hacked a European ally and got away with it. The Intercept_</article-title>
          . Retrieved from https://theintercept.com/
          <year>2018</year>
          /02/17/gchq-belgacom
          <article-title>-investigation-europe-hack/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <string-name>
            <surname>Idé</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lozano</surname>
            ,
            <given-names>A. C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Abe</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          (
          <year>2013</year>
          ).
          <article-title>Proximity-Based Anomaly Detection using Sparse Structure Learning</article-title>
          . https://doi.org/10.1137/1.9781611972795.9
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <string-name>
            <surname>Karokola</surname>
            ,
            <given-names>G. R.</given-names>
          </string-name>
          (
          <year>2012</year>
          ).
          <article-title>A framework for Securing a-</article-title>
          <string-name>
            <surname>Government</surname>
            <given-names>Services</given-names>
          </string-name>
          ,
          <source>The case of Tanzania</source>
          . Stockholm University.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <string-name>
            <surname>Kowalski</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          (
          <year>1994</year>
          ). IT Insecurity:
          <article-title>A Multi-disiplinary Inquiry</article-title>
          . Stockholm University.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <string-name>
            <surname>Kuechler</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Vaishnavi</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          (
          <year>2012</year>
          ).
          <article-title>A Framework for Theory Development in Design Science Research: Multiple Perspectives</article-title>
          .
          <source>Journal of the Association for Information Systems</source>
          (Vol.
          <volume>13</volume>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <string-name>
            <surname>Lalonde</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          (
          <year>2007</year>
          ).
          <source>Proceedings of OLKC</source>
          <year>2007</year>
          -
          <article-title>"Learning Fusion" CRISIS MANAGEMENT AND ORGANIZATIONAL DEVELOPMENT: TOWARDS THE CONCEPTION OF A LEARNING MODEL IN CRISIS MANAGEMENT</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lai</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Ddl</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          (
          <year>2011</year>
          ).
          <article-title>Evidence of advanced persistent threat: A case study of malware for political espionage</article-title>
          .
          <source>In Proceedings of the 2011 6th International Conference on Malicious and Unwanted Software</source>
          ,
          <year>Malware 2011</year>
          . https://doi.org/10.1109/MALWARE.
          <year>2011</year>
          .6112333
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <string-name>
            <surname>Marquis-Boire</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Guarnieri</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Gallagher</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          (
          <year>2014</year>
          , November 24). Secret Malware in European Union Attack Liked to U.S. and
          <string-name>
            <given-names>British</given-names>
            <surname>Intelligence</surname>
          </string-name>
          . Retrieved from https://theintercept.com/
          <year>2014</year>
          /11/24/secret-regin
          <article-title>-malwarebelgacom-nsa-gchq/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <string-name>
            <surname>NSM.</surname>
          </string-name>
          (
          <year>2018</year>
          ). Et sikkert digitalt Norge-IKT-risikobilde
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          <string-name>
            <given-names>Oppland</given-names>
            <surname>Arbeiderblad</surname>
          </string-name>
          . (
          <year>2017</year>
          ).
          <article-title>Øvelse på kritsk dataangrep</article-title>
          . Retrieved from https://www.oa.no/fylkesmannen/beredskap/oppland/ovelse-pa-kritiskdataangrep/s/5-35-545812
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          <string-name>
            <surname>Pelletier</surname>
            ,
            <given-names>L. G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Guertin</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Paige</surname>
            <given-names>Pope</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            , &amp;
            <surname>Rocchi</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          (
          <year>2016</year>
          ).
          <article-title>Homeostasis balance, homeostasis imbalance or distinct motivational processes? Comments on marks (</article-title>
          <year>2015</year>
          )
          <article-title>'homeostatic theory of obesity</article-title>
          .' Health Psychology Open,
          <volume>3</volume>
          (
          <issue>1</issue>
          ). https://doi.org/10.1177/2055102915624512
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          <string-name>
            <surname>Rahman</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Momtazpour</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhang</surname>
          </string-name>
          , J.,
          <string-name>
            <surname>Sharma</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Ramakrishnan</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          (
          <year>2015</year>
          ).
          <article-title>Analyzing Invariants in Cyber-Physical Systems using Latent Factor Regression</article-title>
          . https://doi.org/10.1145/2783258.2788605
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          <string-name>
            <surname>Schoemaker</surname>
            ,
            <given-names>P. J. H.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>van der Heijden</surname>
            ,
            <given-names>C. A. J. M.</given-names>
          </string-name>
          (
          <year>2008</year>
          ).
          <article-title>Integrating scenarios into strategic planning at Royal Dutch/Shell</article-title>
          . Planning Review. https://doi.org/10.1108/eb054360
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          <string-name>
            <surname>Telenor.</surname>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>Digital Sterkere sammen</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          <string-name>
            <surname>Whitworth</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Zaic</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>The WOSP Model: Balanced Information System Design and Evaluation. Communications of the Association for Information Systems</article-title>
          . https://doi.org/10.17705/1cais.01217
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>