gain confidence in their ability to handle all risks ef-
fectively.
It’s important to note that mitigating every single
risk may not be necessary, but being aware of all risks
and making informed management decisions about
whether to accept or mitigate them is crucial. By con-
fidently producing a comprehensive risk management
report using this model, a NOC manager can instill
trust in top management, reassuring them that the net-
work and/or service is in capable hands.
In conclusion, while existing certification stan-
dards have their merits, our proposed 10-layer model
offers a practical and comprehensive approach to risk
discovery and management. It empowers the NOC
with a familiar framework, facilitates risk classifica-
tion, and ultimately contributes to a more confident
and capable handling of network and service risks.
REFERENCES
Anderson, J. P. (1972). Computer security technol-
ogy planning study. Technical report, ANDERSON
(JAMES P) AND CO FORT WASHINGTON PA
FORT WASHINGTON.
AWS (2017). Summary of the amazon S3 ser-
vice disruption in the northern virginia (us-
east-1) region. aws.amazon.com, https:
//aws.amazon.com/message/41926/?ascsubtag=
[]vx[p]14556677[t]w[r]google.com[d]D.
AWS (2021). Summary of the AWS service event
in the northern virginia (US-EAST-1) region.
aws.amazon.com, https://aws.amazon.com/message/
12721/.
Barrett, M. (2018). Framework for improving critical in-
frastructure cybersecurity version 1.1.
Barton, J. (2022). Networks down in lebanon
as ogero workers strike. developingtele-
coms.com, https://developingtelecoms.com/telecom-
business/operator-news/13926-networks-down-in-
lebanon-as-ogero-workers-strike.html.
Belson, D. (2022). AAE-1 & SMW5 cable cuts im-
pact millions of users across multiple countries.
blog.cloudflare.com, https://blog.cloudflare.com/aae-
1-smw5-cable-cuts/.
Burgess, M. (2022). The Most Vulnerable Place on the
Internet. www.wired.com, https://www.wired.com/
story/submarine-internet-cables-egypt/.
Bush, R. and Austein, R. (2013). The Resource Public Key
Infrastructure (RPKI) to Router Protocol. RFC 6810.
C/LM - LAN/MAN Standards Committee (2000). IEEE
standard for information technology - local and
metropolitan area networks - part 3: Carrier sense
multiple access with collision detection (CSMA/CD)
access method and physical layer specifications-
aggregation of multiple link segments. IEEE Std
802.3ad-2000, pages 1–184.
Durand, A. (2020). Resource public key infrastructure
(RPKI) technical analysis.
Evang, J. M., Ahmed, A. H., Elmokashfi, A., and Bryhni,
H. (2022). Crosslayer network outage classification
using machine learning. In Proceedings of the Work-
shop on Applied Networking Research, ANRW ’22,
New York, NY, USA. Association for Computing Ma-
chinery.
Freedman, D., Foust, B., Greene, B., Maddison, B.,
Robachevsky, A., Snijders, J., and Steffann, S. (2019).
Mutually agreed norms for routing security (MANRS)
implementation guide.
Goovaerts, D. (2021). Extended AWS outage disrupts
services across the globe. www.fiercetelecom.com,
https://www.fiercetelecom.com/cloud/extended-aws-
outage-disrupts-services-across-globe.
Goyal, R. (2022). Zscaler digital experience
detects outage. www.zscaler.com, https:
//www.zscaler.com/blogs/product-insights/zoom-
outage-detected-zscaler-digital-experience-zdx.
Graham-Cumming, J. (2022). Partial cloudflare out-
age on october 25, 2022. blog.cloudflare.com,
https://blog.cloudflare.com/partial-cloudflare-outage-
on-october-25-2022/.
Hinden, B. (2004). Virtual Router Redundancy Protocol
(VRRP). RFC 3768.
Hunter, P. (2008). Pakistan youtube block exposes fun-
damental internet security weakness: Concern that
pakistani action affected youtube access elsewhere in
world. Computer Fraud & Security, 2008(4):10–11.
ICANN (2007). Factsheet root server attack on
6 february 2007. www.icann.org, https:
//www.icann.org/en/system/files/files/factsheet-
dns-attack-08mar07-en.pdf.
Imbriaco, M. (2012). Downtime last Saturday. github.blog,
https://github.blog/2012-12-26-downtime-last-
saturday/.
Integrated Human Factors (2022). Facebook & instagram
outage likely caused by human error. www.ihf.co.uk,
https://www.ihf.co.uk/facebook-instagram-outage-
by-human-error/.
ISO (2002). ISO/IEC 10589:2002 Information technol-
ogy — Telecommunications and information exchange
between systems — Intermediate System to Interme-
diate System intra-domain routeing information ex-
change protocol for use in conjunction with the pro-
tocol for providing the connectionless-mode network
service. International Organization for Standardiza-
tion, Geneva, Switzerland.
ISO (2015). ISO/IEC 27017:2015 Information technology
— Security techniques — Code of practice for infor-
mation security controls based on ISO/IEC 27002 for
cloud services. International Organization for Stan-
dardization Geneva, Switzerland.
ISO (2018). ISO 31000:2018(en) Risk management —
Guidelines. International Organization for Standard-
ization, Geneva, Switzerland.
ISO (2022a). ISO/IEC 27001:2022(en) Information se-
curity, cybersecurity and privacy protection — In-
formation security management systems — Require-
SECRYPT 2023 - 20th International Conference on Security and Cryptography
722