Academic literature on the topic 'Strategic cyber security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Strategic cyber security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Strategic cyber security"
Kuusisto, Tuija, and Rauno Kuusisto. "Strategic Communication for Supporting Cyber-Security." International Journal of Cyber Warfare and Terrorism 3, no. 3 (July 2013): 72–79. http://dx.doi.org/10.4018/ijcwt.2013070105.
Full textBorum, Randy, John Felker, Sean Kern, Kristen Dennesen, and Tonya Feyes. "Strategic cyber intelligence." Information & Computer Security 23, no. 3 (July 13, 2015): 317–32. http://dx.doi.org/10.1108/ics-09-2014-0064.
Full textFischer, Bruno, Dirk Meissner, Richard Nyuur, and David Sarpong. "Guest Editorial: Cyber-Attacks, Strategic Cyber-Foresight, and Security." IEEE Transactions on Engineering Management 69, no. 6 (December 2022): 3660–63. http://dx.doi.org/10.1109/tem.2022.3204165.
Full textLehto, Martti. "The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies." International Journal of Cyber Warfare and Terrorism 3, no. 3 (July 2013): 1–18. http://dx.doi.org/10.4018/ijcwt.2013070101.
Full textJuurvee, Ivo, and Uku Arold. "Psychological Defence and Cyber Security." Revista ICONO14 Revista científica de Comunicación y Tecnologías emergentes 19, no. 1 (January 1, 2021): 70–94. http://dx.doi.org/10.7195/ri14.v19i1.1628.
Full textRomashkina, Nataliya, and Dmitry Stefanovich. "Strategic Risks and Problems of Cyber Security." Voprosy kiberbezopasnosti, no. 5(39) (2020): 77–86. http://dx.doi.org/10.21681/2311-3456-2020-05-77-86.
Full textJames, Lee. "Making cyber-security a strategic business priority." Network Security 2018, no. 5 (May 2018): 6–8. http://dx.doi.org/10.1016/s1353-4858(18)30042-4.
Full textAlghamdi, Mohammed I. "A Strategic Vision to Reduce Cybercrime to Enhance Cyber Security." Webology 17, no. 2 (December 21, 2020): 289–95. http://dx.doi.org/10.14704/web/v17i2/web17031.
Full textBarber, Craig. "Cyber Security Predicting the Future." ITNOW 62, no. 1 (February 17, 2020): 30–31. http://dx.doi.org/10.1093/itnow/bwaa013.
Full textMANUILOV, Y. "Overview of novels of domestic legislation in the field of cyber security (on the example of the Cyber Security Strategy of Ukraine for 2021 – 2025)." INFORMATION AND LAW, no. 4(39) (December 9, 2021): 98–105. http://dx.doi.org/10.37750/2616-6798.2021.4(39).248821.
Full textDissertations / Theses on the topic "Strategic cyber security"
Smeets, Max. "Going cyber : the dynamics of cyber proliferation and international security." Thesis, University of Oxford, 2017. https://ora.ox.ac.uk/objects/uuid:ab28f9fc-dd21-4b34-809e-e0d100125e84.
Full textHerpig, Sven [Verfasser]. "Anti-War and the Cyber Triangle : Strategic Implications of Cyber Operations and Cyber Security for the State / Sven Herpig." Berlin : epubli GmbH, 2016. http://d-nb.info/1081304472/34.
Full textIheagwara, Charles M. "The strategic implications of the current Internet design for cyber security." Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/67554.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (p. 87-89).
In the last two decades, the Internet system has evolved from a collection point of a few networks to a worldwide interconnection of millions of networks and users who connect to transact virtually all kinds of business. The evolved network system is also known as Cyberspace. The use of Cyberspace is now greatly expanded to all fields of human endeavor by far exceeding the original design projection. And even though, the Internet architecture and design has been robust enough to accommodate the extended domains of uses and applications, it has also become a medium used to launch all sorts of Cyber attacks that results into several undesirable consequences to users. This thesis analyzes the current Internet system architecture and design and how their flaws are exploited to launch Cyber attacks; evaluates reports from Internet traffic monitoring activities and research reports from several organizations; provides a mapping of Cyber attacks to Internet architecture and design flaw origin; conducts Internet system stakeholder analysis; derives strategic implications of the impact of Internet system weaknesses on Cyber security; and makes recommendations on the broader issues of developing effective strategies to implement Cyber security in enterprise systems that have increasingly become complex. From a global architectural design perspective, the study conducted demonstrates that although the Internet is a robust design, the lack of any means of authentication on the system is primarily responsible for the host of Cyber security issues and thus has become the bane of the system. Following the analysis, extrapolation of facts and by inferences we conclude that the myriad of Cyber security problems will remain and continue on the current exponential growth path until the Internet and in particular the TCP/IP stack is given the ability to authenticate and that only through a collaborative effort by all stakeholders of the Internet system can the other major Cyber security issues be resolved especially as it relates to envisioning and fashioning new Cyber security centric technologies.
by Charles M. Iheagwara.
S.M.in Engineering and Management
Cho, Yiseul. "Strategic philanthropy for cyber security : an extended cost-benefit analysis framework to study cybersecurity." Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/72880.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (p. 74-79).
The international climate of cyber security is dramatically changing and thus unpredictable. As such, agile yet sustainable solutions are needed, along with an effective and a pragmatic evaluation framework to assess and demonstrate the value and efficacy of international development collaboration. Currently, no mature frameworks are available for evaluating such non-conventional, new, and complex international activities as they exist today, and thus this study aims to provide an innovative and pragmatic approach to study cybersecurity. This study recognizes the lack of institutionalized solutions, and aims to provide a novel framework with which to evaluate emerging solutions. In particular, this study evaluates the effectiveness of international development activities and public-private partnerships as a way to improve cyber security. Guided by literature on strategic philanthropy and international development, this study develops an extended cost-benefit analysis framework and applies it to an in-depth case study of a Korean security agency, its Computer Emergency Response Team (CERT.) This newly extended framework can be used for assessing international programs and activities aimed at improving cyber security, where the costs and benefits are not restricted by traditional boundaries. Unlike conventional approaches, this study explicitly includes three additional critical aspects, which are neglected in the conventional cost benefit analysis framework: 1) synergic effect (such as public-private partnership), 2) indirect impact, and 3) shared value. An in-depth case study with field interviews and technology reviews was conducted to test the applicability of this extended framework. Based on the application to the case of the international development activities of the Korean CERT, this study presents two findings. First, private companies can benefit from participating in government-led international development programs. Second, international development activities are effective solutions to improving global and local cyber security. Repeated applications of this framework to other cases will further assess the generalizability of the framework. Cumulated evidence from evaluating the effectiveness of international development activities will also inform the development of future activities for establishing partnerships of strategic philanthropy to improve cyber security.
by Yiseul Cho.
S.M.in Technology and Policy
Cook, Kimberly Diane. "Effective Cyber Security Strategies for Small Businesses." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3871.
Full textBarosy, Wileen. "Successful Operational Cyber Security Strategies for Small Businesses." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/6969.
Full textSaber, Jennifer. "Determining Small Business Cybersecurity Strategies to Prevent Data Breaches." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/4991.
Full textPsaroulis, Georgia. "Leadership in Organisational Cyber Security." Thesis, 2022. https://hdl.handle.net/2440/136018.
Full textThesis (Ph.D.) -- University of Adelaide, Business School, 2022
Hasan, Mahmudul. "Cybersecurity Planning Insight: CSCD (Cyber Security and Cyber Defense) Control: Framework For Strategic Direction and Governance." Master's thesis, 2021. http://hdl.handle.net/10362/126392.
Full textIn this recent time, the importance of cybersecurity and cyber defense is sky-high. Everyone uses different devices, IT infrastructures, and applications for various purposes at school, office, home, hospitals everywhere. With the enlightenment of technology, the nature of cyber-attack has been changed dramatically, and that is why the number of cyber-attacks have been increased. Enterprises face billions of Euros loss from such incidents; even the data loss and operational hazard may have a devastating impact not only on the service, security, privacy, brand image but also upon overall business. A constrictive and realistic CSCD (cyber security and cyber defense) strategy along with the proper implementation of it, can safeguard the enterprises and strongly from cyber attacks. In this paper, we prepare an improved CSCD control framework based on several hundreds of scientific papers and frameworks. Moreover, we identify different aspects and strategic elements by holistic CSCD control risk assessment and data analysis for preparing CSCD strategy and planning of different levels of organizations to maintain effective CSCD governance and cyber resilience.
Persoglia, Davide. "Between Defence and Offence: An Analysis Of The US "Cyber Strategic Culture"." Master's thesis, 2018. http://www.nusl.cz/ntk/nusl-388122.
Full textBooks on the topic "Strategic cyber security"
Army War College (U.S.). Strategic Studies Institute and Army War College (U.S.). Press, eds. Making strategic sense of cyber power: Why the sky is not falling. Carlisle, PA: Strategic Studies Institute and U.S. Army War College Press, 2013.
Find full textOperating in the digital domain: Organizing the military departments for cyber operations : hearing before the Subcommittee on Terrorism, Unconventional Threats and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Eleventh Congress, second session, hearing held September 23, 2010. Washington: U.S. G.P.O., 2010.
Find full textCapabilities, United States Congress House Committee on Armed Services Subcommittee on Emerging Threats and. Digital warriors: Improving military capabilities for cyber operations : hearing before the Subcommittee on Emerging Threats and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Twelfth Congress, second session, hearing held July 25, 2012. Washington: U.S. Government Printing Office, 2013.
Find full textHearing on National Defense Authorization Act for Fiscal Year 2012 and oversight of previously authorized programs before the Committee on Armed Services, House of Representatives, One Hundred Twelfth Congress, first session: Subcommittee on Emerging Threats and Capabilities hearing on budget request for U.S. Cyber Command, hearing held March 16, 2011. Washington: U.S. G.P.O., 2011.
Find full textTrim, Peter, and Yang-Im Lee. Strategic Cyber Security Management. Routledge, 2022.
Find full textStrategic Cyber Security Management. Taylor & Francis Group, 2022.
Find full textTrim, Peter, and Yang-Im Lee. Strategic Cyber Security Management. Taylor & Francis Group, 2022.
Find full textTrim, Peter, and Yang-Im Lee. Strategic Cyber Security Management. Taylor & Francis Group, 2022.
Find full textTrim, Peter, and Yang-Im Lee. Strategic Cyber Security Management. Routledge, 2022.
Find full textStrategic Cyber Deterrence. Rowman & Littlefield Publishers, Incorporated, 2017.
Find full textBook chapters on the topic "Strategic cyber security"
Trim, Peter, and Yang-Im Lee. "Cyber Security Management." In Strategic Cyber Security Management, 209–19. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003244295-11.
Full textTrim, Peter, and Yang-Im Lee. "Strategic Cyber Security Management and Strategic Intelligence." In Strategic Cyber Security Management, 56–80. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003244295-4.
Full textTrim, Peter, and Yang-Im Lee. "A Cyber Security Awareness Programme." In Strategic Cyber Security Management, 220–38. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003244295-12.
Full textTrim, Peter, and Yang-Im Lee. "Integrated Security and a Risk Management Communication Strategy." In Strategic Cyber Security Management, 175–89. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003244295-9.
Full textTrim, Peter, and Yang-Im Lee. "Strategic Cyber Security Management and the Stakeholder Approach." In Strategic Cyber Security Management, 10–32. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003244295-2.
Full textTrim, Peter, and Yang-Im Lee. "Bridging the Government, Industry and Society Divide." In Strategic Cyber Security Management, 33–55. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003244295-3.
Full textTrim, Peter, and Yang-Im Lee. "Business Continuity Management." In Strategic Cyber Security Management, 132–53. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003244295-7.
Full textTrim, Peter, and Yang-Im Lee. "Organizational Learning, Managing Change and Security Culture." In Strategic Cyber Security Management, 190–208. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003244295-10.
Full textTrim, Peter, and Yang-Im Lee. "An Introduction to Strategic Cyber Security Management." In Strategic Cyber Security Management, 1–9. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003244295-1.
Full textTrim, Peter, and Yang-Im Lee. "Threat Identification and Risk Assessment." In Strategic Cyber Security Management, 81–114. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003244295-5.
Full textConference papers on the topic "Strategic cyber security"
Halouzka, Kamil, and Ladislav Burita. "Cyber Security Strategic Documents Analysis." In 2019 International Conference on Military Technologies (ICMT). IEEE, 2019. http://dx.doi.org/10.1109/miltechs.2019.8870088.
Full textCanbek, Gurol, and Seref Sagiroglu. "Strategic cyber-security perspective in smart grids." In 2018 6th International Symposium on Digital Forensic and Security (ISDFS). IEEE, 2018. http://dx.doi.org/10.1109/isdfs.2018.8355346.
Full textSaydjari, O. Sami. "Structuring for Strategic Cyber Defense: A Cyber Manhattan Project Blueprint." In 2008 Annual Computer Security Applications Conference (ACSAC). IEEE, 2008. http://dx.doi.org/10.1109/acsac.2008.53.
Full textAtstāja, Līga, Didzis Rūtītis, Sintija Deruma, and Eduards Aksjoņenko. "Cyber Security Risks And Challenges In Remote Work Under The Covid-19 Pandemic." In 16th International Strategic Management Conference. European Publisher, 2021. http://dx.doi.org/10.15405/epsbs.2021.12.04.2.
Full textJayanthi, M. K. "Strategic Planning for Information Security -DID Mechanism to befriend the Cyber Criminals to assure Cyber Freedom." In 2017 2nd International Conference on Anti-Cyber Crimes (ICACC). IEEE, 2017. http://dx.doi.org/10.1109/anti-cybercrime.2017.7905280.
Full textCvitić, Ivan, Dragan Peraković, Marko Periša, and Mate Botica. "An Overview of the Cyber Security Strategic Management in Republic of Croatia." In The 5th International Virtual Research Conference In Technical Disciplines. Publishing Society, 2017. http://dx.doi.org/10.18638/rcitd.2017.5.1.107.
Full textSchlenker, Aaron, Haifeng Xu, Mina Guirguis, Christopher Kiekintveld, Arunesh Sinha, Milind Tambe, Solomon Sonya, Darryl Balderas, and Noah Dunstatter. "Don't Bury your Head in Warnings: A Game-Theoretic Approach for Intelligent Allocation of Cyber-security Alerts." In Twenty-Sixth International Joint Conference on Artificial Intelligence. California: International Joint Conferences on Artificial Intelligence Organization, 2017. http://dx.doi.org/10.24963/ijcai.2017/54.
Full textAziminejad, Arash. "A Cyber-Physical Security Framework for Rail Transportation Data Systems." In 2022 Joint Rail Conference. American Society of Mechanical Engineers, 2022. http://dx.doi.org/10.1115/jrc2022-78167.
Full textCooper, K. P., and D. Lindley. "Global safety culture, or strategic chains of co-operation?" In 8th IET International System Safety Conference incorporating the Cyber Security Conference 2013. Institution of Engineering and Technology, 2013. http://dx.doi.org/10.1049/cp.2013.1717.
Full textAn, Bo. "Game Theoretic Analysis of Security and Sustainability." In Twenty-Sixth International Joint Conference on Artificial Intelligence. California: International Joint Conferences on Artificial Intelligence Organization, 2017. http://dx.doi.org/10.24963/ijcai.2017/732.
Full textReports on the topic "Strategic cyber security"
Cary, Dakota. China’s National Cybersecurity Center: A Base for Military-Civil Fusion in the Cyber Domain. Center for Security and Emerging Technology, July 2021. http://dx.doi.org/10.51593/2020ca016.
Full textBuchanan, Ben. A National Security Research Agenda for Cybersecurity and Artificial Intelligence. Center for Security and Emerging Technology, May 2020. http://dx.doi.org/10.51593/2020ca001.
Full text