Publication:
Hidden Risks to Cyberspace Security from Obsolete COTS Software

dc.contributor.authorsOzkan, Baris Egemen; Bulkan, Serol
dc.contributor.editorMinarik, T
dc.contributor.editorAlatalu, S
dc.contributor.editorBiondi, S
dc.contributor.editorSignoretti, M
dc.contributor.editorTolga, I
dc.contributor.editorVisky, G
dc.date.accessioned2022-03-12T16:24:11Z
dc.date.accessioned2026-01-11T13:22:13Z
dc.date.available2022-03-12T16:24:11Z
dc.date.issued2019
dc.description.abstractObsolescence of Commercial Off The Shelf (COTS) hardware and software, with their shorter product life cycles, is one of the major concerns for cyberspace system/service providers. While hardware obsolescence has been widely studied, software obsolescence has received less attention. However, the increased number of cyber incidents globally calls for more attention to the use of COTS software in critical infrastructures and military systems: systems comprising 25+ product life cycles and dominated by sustainment concerns. The number of reported vulnerabilities of COTS software systems more than doubled in 2017 and continued to increase in 2018. It is already a challenge for system/service providers to keep up with the pace of vulnerabilities to sustain the resiliency of the systems. Increased use of COTS software in mission-critical systems exacerbates the situation because it forces system/service providers to manage the risk of not being able to receive security updates for obsolete software. In today's cyber conflict, where hybrid threats are enjoying the highly connected nature of cyberspace terrain enabled with globalization and newer technologies, if cyberspace security risks stemming from obsolete COTS software in critical systems are not addressed properly, they may easily become a national security problem. Such risks must be addressed comprehensively at both governance and management levels. This paper presents the sustainability, operational efficiency and cyberspace security risks of obsolete COTS software in critical infrastructures and military systems and proposes mitigations at both governance and management levels. At the management level, a Multi Criteria Decision Making methodology is proposed for system/service providers to balance the conflicting objective functions of reaching a cost-effective solution while maximizing the system's cyberspace security and efficiency.
dc.identifier.doidoiWOS:000484938000004
dc.identifier.isbn978-9949-9904-5-0
dc.identifier.issn2325-5366
dc.identifier.urihttps://hdl.handle.net/11424/226252
dc.identifier.wosWOS:000484938000004
dc.language.isoeng
dc.publisherIEEE
dc.relation.ispartof2019 11TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON): SILENT BATTLE
dc.relation.ispartofseriesInternational Conference on Cyber Conflict
dc.rightsinfo:eu-repo/semantics/closedAccess
dc.subjectsoftware obsolescence risks
dc.subjectCOTS
dc.subjectvulnerabilities
dc.subjectcyber security
dc.subjectsustainment-dominated systems
dc.subjectcyber conflict
dc.subjectOBSOLESCENCE MANAGEMENT
dc.subjectPART
dc.titleHidden Risks to Cyberspace Security from Obsolete COTS Software
dc.typeconferenceObject
dspace.entity.typePublication
oaire.citation.endPage79
oaire.citation.startPage61
oaire.citation.title2019 11TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON): SILENT BATTLE

Files