Strategic Cyber Environment Management with Zero Trust and Cyber Counterintelligence
Bodström, T. T. (2022). Strategic Cyber Environment Management with Zero Trust and Cyber Counterintelligence. Journal of Information Warfare, 21(3), 1-12. https://www.jinfowar.com/subscribers/journal/volume-21-issue-3/strategic-cyber-environment-management-zero-trust-cyber-counterintelligence
Julkaistu sarjassa
Journal of Information WarfareTekijät
Päivämäärä
2022Oppiaine
TekniikkaSecure Communications Engineering and Signal ProcessingEngineeringSecure Communications Engineering and Signal ProcessingTekijänoikeudet
© Author, 2022
Organisations need to improve their information security practices, given the volume of successful cyberattacks and crimes. To enhance security in an organisation, information security must be considered a business issue, instead of a technical problem. Hence, organisations must change the security protocol from reactive action to proactive operation; must develop information security strategies that support the business; should implement better controls, systems, and services; and must create a process to proactively gather information about the possible threats and adversaries. This study proposes a novel method for combining a zero-trust strategy with cyber counterintelligence to gain the required security level and situational awareness to encounter modern threats.
Julkaisija
Peregrine Technical SolutionsISSN Hae Julkaisufoorumista
1445-3312Asiasanat
Alkuperäislähde
https://www.jinfowar.com/subscribers/journal/volume-21-issue-3/strategic-cyber-environment-management-zero-trust-cyber-counterintelligenceJulkaisu tutkimustietojärjestelmässä
https://converis.jyu.fi/converis/portal/detail/Publication/150974168
Metadata
Näytä kaikki kuvailutiedotKokoelmat
Lisenssi
Samankaltainen aineisto
Näytetään aineistoja, joilla on samankaltainen nimeke tai asiasanat.
-
Protecting against social engineering attacks in a corporate environment
Ali-Kovero, Jouni (2020)Tämän Pro gradu –tutkielman tarkoitus on tutkia yritysten tapoja suojautua käyttäjän manipulointiin (eng. Social Engineering) pyrkiviltä hyökkäyksiltä. Tutkielma toteutettiin kirjallisuuskatsauksen ja haastatteluihin ... -
Ulkoisten kyberturvallisuuden riskien arviointi finanssialan organisaatiossa
Takala, Niko (2019)Riskienhallintaa ja riskien arviointia voidaan tarkastella useasta eri näkökulmasta ja sitä ohjaavat useat erilaiset tekijät. Ohjaaviksi tekijöiksi voidaan tunnistaa organisaation strategia, organisaatiokulttuuri, ... -
Information Security Governance in Civil Aviation
Salmenpää, Tomi (Springer, 2022)This chapter focuses mainly to proactive means in information security and more specifically governance of information security in civil aviation. The reason is that, to find sustainable, coherent and holistic way to ... -
Citizens' Cybersecurity Behavior : Some Major Challenges
Li, Ying; Xin, Tong; Siponen, Mikko (Institute of Electrical and Electronics Engineers (IEEE), 2022)Citizens’ cybersecurity behaviors are an important concern in the modern age. This work discusses the challenges of studying citizen cybersecurity behaviors and the directions for future research. -
Components of defence strategies in society’s information environment : a case study based on the grounded theory
Mustonen-Ollila, Erja Birgitta; Lehto, Martti; Heikkonen, Jukka (War Studies University, 2020)Objectives: The goal of this study is to explore the components of defence strategies faced by society in its information environment, and how these strategies are inter-related. Methods: This qualitative in-depth ...
Ellei toisin mainittu, julkisesti saatavilla olevia JYX-metatietoja (poislukien tiivistelmät) saa vapaasti uudelleenkäyttää CC0-lisenssillä.