A Detailed Strategy for Managing Corporation Cyber War Security
نویسنده
چکیده
Modern corporations depend heavily on information and communication technologies and are becoming increasingly interconnected locally and internationally. This interconnectedness and dependency on information technology make corporations vulnerable to cyber attacks. Corporate managers therefore need to understand the growing cyber war threats and implement appropriate strategies to mitigate the risks. This research work is an attempt to develop a generic and detailed strategy to assist corporations in managing the cyber war security. The implementation of such a strategy will definitely lead to a more secure business environment and as a result will attract foreign investments to the Arab countries in the Middle East. Such a strategy can be considered as a first step toward protecting corporations from cyber war threats in an effective manner.
منابع مشابه
Cyber-Physical War Gaming
This paper presents general strategies for cyber war gaming of Cyber-Physical Systems (CPSs) that are used for cyber security research at the U.S. Army Research Laboratory (ARL). Since Supervisory Control and Data Acquisition (SCADA) and other CPSs are operational systems, it is difficult or impossible to perform security experiments on actual systems. The authors describe how table-top strateg...
متن کاملCyber Situation Awareness: Rational Methods versus Instance-Based Learning Theory for Cyber Threat Detection
Cyber-attacks pose a grave threat to corporations and disrupt their normal functioning. The number of cyber attacks has been ever increasing and due to the loss of priceless information on account of these attacks there is an urgent necessity to check their prevalence. In this regard, the role of a security analyst, a human decision maker whose task is to accurately and timely detect cyber atta...
متن کاملCyber Safety: A Systems Thinking and Systems Theory Approach to Managing Cyber Security Risks
If we are to manage security risks more effectively in today’s complex and dynamic cyber environment, then a new way of thinking is needed to complement traditional approaches. According to Symantec’s 2014 Internet Security Threat Report, in 2012 more than ten million identities that included real names, dates of birth, and social security were exposed by a single breach. In 2013 there were eig...
متن کاملStrategic Operations in the Cyber Domain and their Implications for National Cyber Security
With the public discussion mainly revolving around deterrence (either by denial or by punishment), there are actually a number of strategies which can be applied to cyber operations. A cyber strategy can be thought of as an umbrella for various individual cyber operations with the ultimate aim to achieve a strategic and / or political goal. Thus, cyber strategies can be defined as the developme...
متن کاملCombining Security Risk Assessment and Security Testing Based on Standards
Managing cyber security has become increasingly important due to the growing interconnectivity of computerized systems and their use in society. A comprehensive assessment of cyber security can be challenging as its spans across different domains of knowledge and expertise. For instance, identifying cyber security vulnerabilities requires detailed technical expertise and knowledge, while the as...
متن کامل