dc.contributor.author | Bodström, Tero T. | |
dc.date.accessioned | 2022-08-16T08:25:21Z | |
dc.date.available | 2022-08-16T08:25:21Z | |
dc.date.issued | 2022 | |
dc.identifier.citation | Bodström, T. T. (2022). Strategic Cyber Environment Management with Zero Trust and Cyber Counterintelligence. <i>Journal of Information Warfare</i>, <i>21</i>(3), 1-12. <a href="https://www.jinfowar.com/subscribers/journal/volume-21-issue-3/strategic-cyber-environment-management-zero-trust-cyber-counterintelligence" target="_blank">https://www.jinfowar.com/subscribers/journal/volume-21-issue-3/strategic-cyber-environment-management-zero-trust-cyber-counterintelligence</a> | |
dc.identifier.other | CONVID_150974168 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/82580 | |
dc.description.abstract | Organisations need to improve their information security practices, given the volume of successful cyberattacks and crimes. To enhance security in an organisation, information security must be considered a business issue, instead of a technical problem. Hence, organisations must change the security protocol from reactive action to proactive operation; must develop information security strategies that support the business; should implement better controls, systems, and services; and must create a process to proactively gather information about the possible threats and adversaries. This study proposes a novel method for combining a zero-trust strategy with cyber counterintelligence to gain the required security level and situational awareness to encounter modern threats. | en |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Peregrine Technical Solutions | |
dc.relation.ispartofseries | Journal of Information Warfare | |
dc.relation.uri | https://www.jinfowar.com/subscribers/journal/volume-21-issue-3/strategic-cyber-environment-management-zero-trust-cyber-counterintelligence | |
dc.rights | In Copyright | |
dc.subject.other | information security strategy | |
dc.subject.other | zero trust, cyber counterintelligence | |
dc.title | Strategic Cyber Environment Management with Zero Trust and Cyber Counterintelligence | |
dc.type | research article | |
dc.identifier.urn | URN:NBN:fi:jyu-202208164124 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Tekniikka | fi |
dc.contributor.oppiaine | Secure Communications Engineering and Signal Processing | fi |
dc.contributor.oppiaine | Engineering | en |
dc.contributor.oppiaine | Secure Communications Engineering and Signal Processing | en |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | |
dc.type.coar | http://purl.org/coar/resource_type/c_2df8fbb1 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 1-12 | |
dc.relation.issn | 1445-3312 | |
dc.relation.numberinseries | 3 | |
dc.relation.volume | 21 | |
dc.type.version | acceptedVersion | |
dc.rights.copyright | © Author, 2022 | |
dc.rights.accesslevel | openAccess | fi |
dc.type.publication | article | |
dc.subject.yso | ennakointi | |
dc.subject.yso | vastavakoilu | |
dc.subject.yso | tietoturvapolitiikka | |
dc.subject.yso | tietoturva | |
dc.subject.yso | rikollisuus | |
dc.subject.yso | riskienhallinta | |
dc.subject.yso | kybersodankäynti | |
dc.subject.yso | turvallisuus | |
dc.subject.yso | kyberturvallisuus | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p17353 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p21817 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p25795 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5479 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p11490 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p3134 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p27779 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p7349 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p26189 | |
dc.rights.url | http://rightsstatements.org/page/InC/1.0/?language=en | |
dc.type.okm | A1 | |