Jeb Webb’s research while affiliated with University of Melbourne and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (10)


Figure 2: The APTOL
Figure 3: Disinformation to Exploit SA Vulnerability
Strategically-Motivated Advanced Persistent Threat: Definition, Process, Tactics and a Disinformation Model of Counterattack
  • Preprint
  • File available

March 2021

·

360 Reads

·

Jeb Webb

·

·

James Boorman

Advanced persistent threat (APT) is widely acknowledged to be the most sophisticated and potent class of security threat. APT refers to knowledgeable human attackers that are organized, highly sophisticated and motivated to achieve their objectives against a targeted organization(s) over a prolonged period. Strategically-motivated APTs or S-APTs are distinct in that they draw their objectives from the broader strategic agenda of third parties such as criminal syndicates, nation-states, and rival corporations. In this paper we review the use of the term - Advanced Persistent Threat - and present a formal definition. We then draw on military science, the science of organized conflict, for a theoretical basis to develop a rigorous and holistic model of the stages of an APT operation which we subsequently use to explain how S-APTs execute their strategically motivated operations using tactics, techniques and procedures. Finally, we present a general disinformation model, derived from situation awareness theory, and explain how disinformation can be used to attack the situation awareness and decision making of not only S-APT operators, but also the entities that back them.

Download

Figure 2: The APTOL
Figure 3: Disinformation to Exploit SA Vulnerability
Strategically-Motivated Advanced Persistent Threat: Definition, Process, Tactics and a Disinformation Model of Counterattack

July 2019

·

4,534 Reads

·

142 Citations

Computers & Security

Advanced persistent threat (APT) is widely acknowledged to be the most sophisticated and potent class of security threat. APT refers to knowledgeable human attackers that are organized, highly sophisticated and motivated to achieve their objectives against a targeted organization(s) over a prolonged period. Strategically-motivated APTs or S-APTs are distinct in that they draw their objectives from the broader strategic agenda of third parties such as criminal syndicates, nation-states, and rival corporations. In this paper we review the use of the term “advanced persistent threat,” and present a formal definition. We then draw on military science, the science of organized conflict, for a theoretical basis to develop a rigorous and holistic model of the stages of an APT operation which we subsequently use to explain how S-APTs execute their strategically motivated operations using tactics, techniques and procedures. Finally, we present a general disinformation model, derived from situation awareness theory, and explain how disinformation can be used to attack the situation awareness and decision making of not only S-APT operators, but also the entities that back them.




Fig. 1. Conceptual architectural model for the intelligent warning app 
Intelligent Warning Systems: 'Nudges' as a Form of User Control for Internet of Things Data Collection and Use

August 2017

·

187 Reads

·

1 Citation

The modern digital world of networking and connectivity makes possible a new era of computing in which users exert greater control over the collection and use of their personal data through the Internet of Things (IoT). Our recent empirical work indicates that traditional forms of consent are inadequate and that users are looking for different levels of and greater involvement in controlling the collection and use of their personal data – with some participants voicing particular concerns about collection and use of sensitive data, such as health information, and others pointing to particular risks, such as insecure storage in the Cloud. In response to these needs we propose a new Intelligent Warning Application in the form of a conceptual architecture for an App that empowers users to control their IoT data collection through users: 1) identifying their own levels of risk, 2) customizing the App allowing for the setting of their identified risk levels, and 3) situated use of the App warning users of risk-averse situations through 'nudges'. We conclude with a discussion illustrating scenarios of the App's.


Figure 1 of 1
Towards responsive regulation of the Internet of Things: Australian perspectives

March 2017

·

198 Reads

·

9 Citations

Internet Policy Review

Megan Richardson

·

·

Karin Clark

·

[...]

·

The Internet of Things (IoT) is considered to be one of the most significant disruptive technologies of modern times, and promises to impact our lives in many positive ways. At the same time, its interactivity and interconnectivity poses significant challenges to privacy and data protection. Following an exploratory interpretive qualitative case study approach, we interviewed 14 active IoT users plus ten IoT designers/developers in Melbourne, Australia to explore their experiences and concerns about privacy and data protection in a more networked world enabled by the IoT. We conclude with some recommendations for ‘responsive regulation’ of the IoT in the Australian context.



Figure 1: Endsley’s Situation Awareness Model (Adapted from Endsley 1995) 
Figure 3: Intelligence-Driven ISRM at the Business Process Level 
Information Security Risk Management: An Intelligence-Driven Approach

November 2014

·

2,215 Reads

·

30 Citations

Australasian Journal of Information Systems

Three deficiencies exist in the organisational practice of information security risk management: risk assessments are commonly perfunctory, security risks are estimated without investigation; risk is assessed on an occasional (as opposed to continuous) basis. These tendencies indicate that important data is being missed and that the situation awareness of decision-makers in many organisations is currently inadequate. This research-in-progress paper uses Endsley's situation awareness theory, and examines how the structure and functions of the US national security intelligence enterprise—a revelatory case of enterprise situation awareness development in security and risk management—correspond with Endsley’s theoretical model, and how facets of the US enterprise might be adapted to improve situation awareness in the information security risk management process of organisations.


A Situation Awareness Model for Information Security Risk Management

July 2014

·

4,323 Reads

·

187 Citations

Computers & Security

Information security risk management (ISRM) is the primary means by which organizations preserve the confidentiality, integrity and availability of information resources. A review of ISRM literature identified deficiencies in the practice of information security risk assessment that inevitably lead to poor decision-making and inadequate or inappropriate security strategies. In this conceptual paper, we propose a situation aware ISRM (SA-ISRM) process model to complement the information security risk management process. Our argument is that the model addresses the aforementioned deficiencies through an enterprise-wide collection, analysis and reporting of risk-related information. The SA-ISRM model is adapted from Endsley's situation awareness model and has been refined using our findings from a case study of the US national security intelligence enterprise.


Towards an Intelligence-Driven Information Security Risk Management Process for Organisations

December 2013

·

147 Reads

·

8 Citations

Three deficiencies exist in information security under prevailing practices: organisations tend to focus on compliance over protection; to estimate risk without investigating it; and to assess risk on an occasional (as opposed to continuous) basis. These tendencies indicate that important data is being missed and that the situation awareness of decision-makers in many organisations is currently inadequate. This research-in-progress paper uses Endsley's situation awareness theory, and examines how the structure and functions of the US national security intelligence enterprise—a revelatory case of enterprise situation awareness development in security and risk management—correspond with Endsley's theoretical model, and how facets of the US enterprise might be adapted to improve situation awareness in the information security risk management process of organisations.

Citations (6)


... It argues that automation of various types boosts the signal strength of poor-quality information, thus putting individual citizens at greater risk. In some instances, foreign states and domestic operators use trolls, bots, and sock puppets as super-spreaders of disinformation on social media platforms (Ahmad et al. 2019;Bradshaw and Howard 2019;Jamieson 2020;Keller et al. 2019;Linvill and Warren 2020;Weissmann et al. 2021;Woolley and Guilbeault 2017;Zannettou et al. 2019). ...

Reference:

Platforms, Politics, and the Crisis of Democracy: Connective Action and the Rise of Illiberalism
Strategically-Motivated Advanced Persistent Threat: Definition, Process, Tactics and a Disinformation Model of Counterattack

Computers & Security

... To address this issue, manufacturers must adopt clear, simple, and concise privacy policies that directly communicate how users' personal data is being handled. The use of clear opt-in mechanisms for data sharing and regular updates on changes to privacy policies also enhances transparency and trust (Binns, 2018). ...

Privacy and the Internet of Things
  • Citing Article
  • December 2016

... Increased technological capacity for data collection and predictive analytics enables business to individualize their approach to consumers through targeted advertising and differential pricing, and to vary these strategies promptly in response to granular information about consumer responses (see further Milgrom and Tadelis 2019, p. 21;Thomas 2017, p. 35;Milgrom and Tadelis 2019, p. 21;Tsesis 2019). The result is a form of digital "manipulation" or "hyper nudging," which promotes an illusion of choice where none actually exists (Calo 2014;Mik 2016;Richardson et al. 2017;Yeung 2017). The data collection and analytics now utilized by online marketing firms allows them to identify precisely the situational and constitutional vulnerabilities of consumers and to use those insights to promote amenable products, while ceasing to display other choices (Calo 2014;Clifford 2020;Helberger 2016;OECD 2017, p. 6;Vranaki 2017). ...

Towards responsive regulation of the Internet of Things: Australian perspectives

Internet Policy Review

... There exists a prevalent misconception that compliance to standards and regulation equals strong cybersecurity [29,31,67]. However, attackers don't care whether an organization is fully compliant or not, they will try to find vulnerabilities anyway. ...

Information Security Risk Management: An Intelligence-Driven Approach

Australasian Journal of Information Systems

... In addition, learning processes can help raise awareness, especially situational awareness. Situational awareness is the ability of an individual to observe, comprehend, learn from, and act on the elements of their environment or situations, to project possible future events in the same environment [20], [21], [22]. Therefore, an individual's failure to observe, comprehend, learn from and or act on the elements of the environment to project possible future events and plan future actions in their environment constitutes a lack of awareness. ...

A Situation Awareness Model for Information Security Risk Management

Computers & Security

... As a response to the benefits it provides and the present market trend, CTI has attracted the attention of most organizations. Consequently, CTI alters the organization's processes and actions as it faces various issues [6,7]. Therefore, the current research will document state-of-the-art cyber threat intelligence. ...

Towards an Intelligence-Driven Information Security Risk Management Process for Organisations