JavaScript is disabled for your browser. Some features of this site may not work without it.
Please note that UPSpace will be unavailable from Friday, 2 May at 18:00 (South African Time) until Sunday, 4 May at 20:00 due to scheduled system upgrades. We apologise for any inconvenience this may cause and appreciate your understanding.
The whole of cyber defense : syncing practice and theory
De Nobrega, Kristel M.; Rutkowski, Anne-F.; Saunders, Carol S.
This review explores the problems Chief Information Security Officers (CISOs) and other cyber
professionals face when defending their organization against cyberattacks. Using a Cyber Defense
Grid, which was developed based on military science and cybersecurity concepts and terminology,
we coded 125 articles published in Information Systems (IS) journals. We also employed
three avenues (i.e., lenses) from cybernetic theory to frame the coding results to derive cyber
defense strategies. In particular, we propose three strategic cyber defense modes: reactive, heuristic,
and proactive. Taken together, these three modes suggest ways in which organizations can
react strategically within the whole cyber defense domain.
Description:
The paper is drawn in part from and extends the dissertation of the lead author: de Nobrega, K. (2023). Cyber defensive capacity and capability: A perspective from the financial sector of a small state. [Doctoral Thesis, Tilburg University]. CentER, Center for Economic Research.
The present generation lives in the new information age as a result of rapid computer developments and the accessibility of the internet. Therefore, in the 21st century the world has to come to grips with the cyber space ...
Zhang, Huifeng; Yu, Chengqian; Zeng, Meilian; Ye, Tao; Yue, Dong; Dou, Chunxia; Xie, Xiangpeng; Hancke, Gerhard P.(Institute of Electrical and Electronics Engineers, 2024-09)
Privacy disclosures and malevolent data intrusions targeting adversarial agents pose significant menaces to cyber-physical systems, a reality that extends to the intricate realm of micro-grid energy management. This paper ...
Klopper, Christiaan; Eloff, Jan H.P.(Institute of Electrical and Electronics Engineers, 2024-10)
Artificial intelligence (AI)-assisted cyber-attacks have evolved to become increasingly
successful in every aspect of the cyber-defence life cycle. For example, in the reconnaissance phase, AI-enhanced tools such as MalGAN ...