Strategic Cyber Environment Management with Zero Trust and Cyber Counterintelligence
Bodström, T. T. (2022). Strategic Cyber Environment Management with Zero Trust and Cyber Counterintelligence. Journal of Information Warfare, 21(3), 1-12. https://www.jinfowar.com/subscribers/journal/volume-21-issue-3/strategic-cyber-environment-management-zero-trust-cyber-counterintelligence
Published in
Journal of Information WarfareAuthors
Date
2022Discipline
TekniikkaSecure Communications Engineering and Signal ProcessingEngineeringSecure Communications Engineering and Signal ProcessingCopyright
© Author, 2022
Organisations need to improve their information security practices, given the volume of successful cyberattacks and crimes. To enhance security in an organisation, information security must be considered a business issue, instead of a technical problem. Hence, organisations must change the security protocol from reactive action to proactive operation; must develop information security strategies that support the business; should implement better controls, systems, and services; and must create a process to proactively gather information about the possible threats and adversaries. This study proposes a novel method for combining a zero-trust strategy with cyber counterintelligence to gain the required security level and situational awareness to encounter modern threats.
Publisher
Peregrine Technical SolutionsISSN Search the Publication Forum
1445-3312Keywords
Original source
https://www.jinfowar.com/subscribers/journal/volume-21-issue-3/strategic-cyber-environment-management-zero-trust-cyber-counterintelligencePublication in research information system
https://converis.jyu.fi/converis/portal/detail/Publication/150974168
Metadata
Show full item recordCollections
License
Related items
Showing items with similar title or keywords.
-
Protecting against social engineering attacks in a corporate environment
Ali-Kovero, Jouni (2020)Tämän Pro gradu –tutkielman tarkoitus on tutkia yritysten tapoja suojautua käyttäjän manipulointiin (eng. Social Engineering) pyrkiviltä hyökkäyksiltä. Tutkielma toteutettiin kirjallisuuskatsauksen ja haastatteluihin ... -
Ulkoisten kyberturvallisuuden riskien arviointi finanssialan organisaatiossa
Takala, Niko (2019)Riskienhallintaa ja riskien arviointia voidaan tarkastella useasta eri näkökulmasta ja sitä ohjaavat useat erilaiset tekijät. Ohjaaviksi tekijöiksi voidaan tunnistaa organisaation strategia, organisaatiokulttuuri, ... -
Information Security Governance in Civil Aviation
Salmenpää, Tomi (Springer, 2022)This chapter focuses mainly to proactive means in information security and more specifically governance of information security in civil aviation. The reason is that, to find sustainable, coherent and holistic way to ... -
Components of defence strategies in society’s information environment : a case study based on the grounded theory
Mustonen-Ollila, Erja Birgitta; Lehto, Martti; Heikkonen, Jukka (War Studies University, 2020)Objectives: The goal of this study is to explore the components of defence strategies faced by society in its information environment, and how these strategies are inter-related. Methods: This qualitative in-depth ... -
Citizens' Cybersecurity Behavior : Some Major Challenges
Li, Ying; Xin, Tong; Siponen, Mikko (Institute of Electrical and Electronics Engineers (IEEE), 2022)Citizens’ cybersecurity behaviors are an important concern in the modern age. This work discusses the challenges of studying citizen cybersecurity behaviors and the directions for future research.