Näytä suppeat kuvailutiedot

dc.contributor.authorBodström, Tero T.
dc.date.accessioned2022-08-16T08:25:21Z
dc.date.available2022-08-16T08:25:21Z
dc.date.issued2022
dc.identifier.citationBodström, T. T. (2022). Strategic Cyber Environment Management with Zero Trust and Cyber Counterintelligence. <i>Journal of Information Warfare</i>, <i>21</i>(3), 1-12. <a href="https://www.jinfowar.com/subscribers/journal/volume-21-issue-3/strategic-cyber-environment-management-zero-trust-cyber-counterintelligence" target="_blank">https://www.jinfowar.com/subscribers/journal/volume-21-issue-3/strategic-cyber-environment-management-zero-trust-cyber-counterintelligence</a>
dc.identifier.otherCONVID_150974168
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/82580
dc.description.abstractOrganisations need to improve their information security practices, given the volume of successful cyberattacks and crimes. To enhance security in an organisation, information security must be considered a business issue, instead of a technical problem. Hence, organisations must change the security protocol from reactive action to proactive operation; must develop information security strategies that support the business; should implement better controls, systems, and services; and must create a process to proactively gather information about the possible threats and adversaries. This study proposes a novel method for combining a zero-trust strategy with cyber counterintelligence to gain the required security level and situational awareness to encounter modern threats.en
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherPeregrine Technical Solutions
dc.relation.ispartofseriesJournal of Information Warfare
dc.relation.urihttps://www.jinfowar.com/subscribers/journal/volume-21-issue-3/strategic-cyber-environment-management-zero-trust-cyber-counterintelligence
dc.rightsIn Copyright
dc.subject.otherinformation security strategy
dc.subject.otherzero trust, cyber counterintelligence
dc.titleStrategic Cyber Environment Management with Zero Trust and Cyber Counterintelligence
dc.typeresearch article
dc.identifier.urnURN:NBN:fi:jyu-202208164124
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineTekniikkafi
dc.contributor.oppiaineSecure Communications Engineering and Signal Processingfi
dc.contributor.oppiaineEngineeringen
dc.contributor.oppiaineSecure Communications Engineering and Signal Processingen
dc.type.urihttp://purl.org/eprint/type/JournalArticle
dc.type.coarhttp://purl.org/coar/resource_type/c_2df8fbb1
dc.description.reviewstatuspeerReviewed
dc.format.pagerange1-12
dc.relation.issn1445-3312
dc.relation.numberinseries3
dc.relation.volume21
dc.type.versionacceptedVersion
dc.rights.copyright© Author, 2022
dc.rights.accesslevelopenAccessfi
dc.type.publicationarticle
dc.subject.ysoennakointi
dc.subject.ysovastavakoilu
dc.subject.ysotietoturvapolitiikka
dc.subject.ysotietoturva
dc.subject.ysorikollisuus
dc.subject.ysoriskienhallinta
dc.subject.ysokybersodankäynti
dc.subject.ysoturvallisuus
dc.subject.ysokyberturvallisuus
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p17353
jyx.subject.urihttp://www.yso.fi/onto/yso/p21817
jyx.subject.urihttp://www.yso.fi/onto/yso/p25795
jyx.subject.urihttp://www.yso.fi/onto/yso/p5479
jyx.subject.urihttp://www.yso.fi/onto/yso/p11490
jyx.subject.urihttp://www.yso.fi/onto/yso/p3134
jyx.subject.urihttp://www.yso.fi/onto/yso/p27779
jyx.subject.urihttp://www.yso.fi/onto/yso/p7349
jyx.subject.urihttp://www.yso.fi/onto/yso/p26189
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en
dc.type.okmA1


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

In Copyright
Ellei muuten mainita, aineiston lisenssi on In Copyright