Добірка наукової літератури з теми "Strategic cyber security"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Strategic cyber security".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Strategic cyber security"
Kuusisto, Tuija, and Rauno Kuusisto. "Strategic Communication for Supporting Cyber-Security." International Journal of Cyber Warfare and Terrorism 3, no. 3 (July 2013): 72–79. http://dx.doi.org/10.4018/ijcwt.2013070105.
Повний текст джерелаBorum, Randy, John Felker, Sean Kern, Kristen Dennesen, and Tonya Feyes. "Strategic cyber intelligence." Information & Computer Security 23, no. 3 (July 13, 2015): 317–32. http://dx.doi.org/10.1108/ics-09-2014-0064.
Повний текст джерелаFischer, Bruno, Dirk Meissner, Richard Nyuur, and David Sarpong. "Guest Editorial: Cyber-Attacks, Strategic Cyber-Foresight, and Security." IEEE Transactions on Engineering Management 69, no. 6 (December 2022): 3660–63. http://dx.doi.org/10.1109/tem.2022.3204165.
Повний текст джерелаLehto, Martti. "The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies." International Journal of Cyber Warfare and Terrorism 3, no. 3 (July 2013): 1–18. http://dx.doi.org/10.4018/ijcwt.2013070101.
Повний текст джерелаJuurvee, Ivo, and Uku Arold. "Psychological Defence and Cyber Security." Revista ICONO14 Revista científica de Comunicación y Tecnologías emergentes 19, no. 1 (January 1, 2021): 70–94. http://dx.doi.org/10.7195/ri14.v19i1.1628.
Повний текст джерелаRomashkina, Nataliya, and Dmitry Stefanovich. "Strategic Risks and Problems of Cyber Security." Voprosy kiberbezopasnosti, no. 5(39) (2020): 77–86. http://dx.doi.org/10.21681/2311-3456-2020-05-77-86.
Повний текст джерелаJames, Lee. "Making cyber-security a strategic business priority." Network Security 2018, no. 5 (May 2018): 6–8. http://dx.doi.org/10.1016/s1353-4858(18)30042-4.
Повний текст джерелаAlghamdi, Mohammed I. "A Strategic Vision to Reduce Cybercrime to Enhance Cyber Security." Webology 17, no. 2 (December 21, 2020): 289–95. http://dx.doi.org/10.14704/web/v17i2/web17031.
Повний текст джерелаBarber, Craig. "Cyber Security Predicting the Future." ITNOW 62, no. 1 (February 17, 2020): 30–31. http://dx.doi.org/10.1093/itnow/bwaa013.
Повний текст джерелаMANUILOV, Y. "Overview of novels of domestic legislation in the field of cyber security (on the example of the Cyber Security Strategy of Ukraine for 2021 – 2025)." INFORMATION AND LAW, no. 4(39) (December 9, 2021): 98–105. http://dx.doi.org/10.37750/2616-6798.2021.4(39).248821.
Повний текст джерелаДисертації з теми "Strategic cyber security"
Smeets, Max. "Going cyber : the dynamics of cyber proliferation and international security." Thesis, University of Oxford, 2017. https://ora.ox.ac.uk/objects/uuid:ab28f9fc-dd21-4b34-809e-e0d100125e84.
Повний текст джерелаHerpig, Sven [Verfasser]. "Anti-War and the Cyber Triangle : Strategic Implications of Cyber Operations and Cyber Security for the State / Sven Herpig." Berlin : epubli GmbH, 2016. http://d-nb.info/1081304472/34.
Повний текст джерелаIheagwara, Charles M. "The strategic implications of the current Internet design for cyber security." Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/67554.
Повний текст джерелаCataloged from PDF version of thesis.
Includes bibliographical references (p. 87-89).
In the last two decades, the Internet system has evolved from a collection point of a few networks to a worldwide interconnection of millions of networks and users who connect to transact virtually all kinds of business. The evolved network system is also known as Cyberspace. The use of Cyberspace is now greatly expanded to all fields of human endeavor by far exceeding the original design projection. And even though, the Internet architecture and design has been robust enough to accommodate the extended domains of uses and applications, it has also become a medium used to launch all sorts of Cyber attacks that results into several undesirable consequences to users. This thesis analyzes the current Internet system architecture and design and how their flaws are exploited to launch Cyber attacks; evaluates reports from Internet traffic monitoring activities and research reports from several organizations; provides a mapping of Cyber attacks to Internet architecture and design flaw origin; conducts Internet system stakeholder analysis; derives strategic implications of the impact of Internet system weaknesses on Cyber security; and makes recommendations on the broader issues of developing effective strategies to implement Cyber security in enterprise systems that have increasingly become complex. From a global architectural design perspective, the study conducted demonstrates that although the Internet is a robust design, the lack of any means of authentication on the system is primarily responsible for the host of Cyber security issues and thus has become the bane of the system. Following the analysis, extrapolation of facts and by inferences we conclude that the myriad of Cyber security problems will remain and continue on the current exponential growth path until the Internet and in particular the TCP/IP stack is given the ability to authenticate and that only through a collaborative effort by all stakeholders of the Internet system can the other major Cyber security issues be resolved especially as it relates to envisioning and fashioning new Cyber security centric technologies.
by Charles M. Iheagwara.
S.M.in Engineering and Management
Cho, Yiseul. "Strategic philanthropy for cyber security : an extended cost-benefit analysis framework to study cybersecurity." Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/72880.
Повний текст джерелаCataloged from PDF version of thesis.
Includes bibliographical references (p. 74-79).
The international climate of cyber security is dramatically changing and thus unpredictable. As such, agile yet sustainable solutions are needed, along with an effective and a pragmatic evaluation framework to assess and demonstrate the value and efficacy of international development collaboration. Currently, no mature frameworks are available for evaluating such non-conventional, new, and complex international activities as they exist today, and thus this study aims to provide an innovative and pragmatic approach to study cybersecurity. This study recognizes the lack of institutionalized solutions, and aims to provide a novel framework with which to evaluate emerging solutions. In particular, this study evaluates the effectiveness of international development activities and public-private partnerships as a way to improve cyber security. Guided by literature on strategic philanthropy and international development, this study develops an extended cost-benefit analysis framework and applies it to an in-depth case study of a Korean security agency, its Computer Emergency Response Team (CERT.) This newly extended framework can be used for assessing international programs and activities aimed at improving cyber security, where the costs and benefits are not restricted by traditional boundaries. Unlike conventional approaches, this study explicitly includes three additional critical aspects, which are neglected in the conventional cost benefit analysis framework: 1) synergic effect (such as public-private partnership), 2) indirect impact, and 3) shared value. An in-depth case study with field interviews and technology reviews was conducted to test the applicability of this extended framework. Based on the application to the case of the international development activities of the Korean CERT, this study presents two findings. First, private companies can benefit from participating in government-led international development programs. Second, international development activities are effective solutions to improving global and local cyber security. Repeated applications of this framework to other cases will further assess the generalizability of the framework. Cumulated evidence from evaluating the effectiveness of international development activities will also inform the development of future activities for establishing partnerships of strategic philanthropy to improve cyber security.
by Yiseul Cho.
S.M.in Technology and Policy
Cook, Kimberly Diane. "Effective Cyber Security Strategies for Small Businesses." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3871.
Повний текст джерелаBarosy, Wileen. "Successful Operational Cyber Security Strategies for Small Businesses." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/6969.
Повний текст джерелаSaber, Jennifer. "Determining Small Business Cybersecurity Strategies to Prevent Data Breaches." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/4991.
Повний текст джерелаPsaroulis, Georgia. "Leadership in Organisational Cyber Security." Thesis, 2022. https://hdl.handle.net/2440/136018.
Повний текст джерелаThesis (Ph.D.) -- University of Adelaide, Business School, 2022
Hasan, Mahmudul. "Cybersecurity Planning Insight: CSCD (Cyber Security and Cyber Defense) Control: Framework For Strategic Direction and Governance." Master's thesis, 2021. http://hdl.handle.net/10362/126392.
Повний текст джерелаIn this recent time, the importance of cybersecurity and cyber defense is sky-high. Everyone uses different devices, IT infrastructures, and applications for various purposes at school, office, home, hospitals everywhere. With the enlightenment of technology, the nature of cyber-attack has been changed dramatically, and that is why the number of cyber-attacks have been increased. Enterprises face billions of Euros loss from such incidents; even the data loss and operational hazard may have a devastating impact not only on the service, security, privacy, brand image but also upon overall business. A constrictive and realistic CSCD (cyber security and cyber defense) strategy along with the proper implementation of it, can safeguard the enterprises and strongly from cyber attacks. In this paper, we prepare an improved CSCD control framework based on several hundreds of scientific papers and frameworks. Moreover, we identify different aspects and strategic elements by holistic CSCD control risk assessment and data analysis for preparing CSCD strategy and planning of different levels of organizations to maintain effective CSCD governance and cyber resilience.
Persoglia, Davide. "Between Defence and Offence: An Analysis Of The US "Cyber Strategic Culture"." Master's thesis, 2018. http://www.nusl.cz/ntk/nusl-388122.
Повний текст джерелаКниги з теми "Strategic cyber security"
Army War College (U.S.). Strategic Studies Institute and Army War College (U.S.). Press, eds. Making strategic sense of cyber power: Why the sky is not falling. Carlisle, PA: Strategic Studies Institute and U.S. Army War College Press, 2013.
Знайти повний текст джерелаOperating in the digital domain: Organizing the military departments for cyber operations : hearing before the Subcommittee on Terrorism, Unconventional Threats and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Eleventh Congress, second session, hearing held September 23, 2010. Washington: U.S. G.P.O., 2010.
Знайти повний текст джерелаCapabilities, United States Congress House Committee on Armed Services Subcommittee on Emerging Threats and. Digital warriors: Improving military capabilities for cyber operations : hearing before the Subcommittee on Emerging Threats and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Twelfth Congress, second session, hearing held July 25, 2012. Washington: U.S. Government Printing Office, 2013.
Знайти повний текст джерелаHearing on National Defense Authorization Act for Fiscal Year 2012 and oversight of previously authorized programs before the Committee on Armed Services, House of Representatives, One Hundred Twelfth Congress, first session: Subcommittee on Emerging Threats and Capabilities hearing on budget request for U.S. Cyber Command, hearing held March 16, 2011. Washington: U.S. G.P.O., 2011.
Знайти повний текст джерелаTrim, Peter, and Yang-Im Lee. Strategic Cyber Security Management. Routledge, 2022.
Знайти повний текст джерелаStrategic Cyber Security Management. Taylor & Francis Group, 2022.
Знайти повний текст джерелаTrim, Peter, and Yang-Im Lee. Strategic Cyber Security Management. Taylor & Francis Group, 2022.
Знайти повний текст джерелаTrim, Peter, and Yang-Im Lee. Strategic Cyber Security Management. Taylor & Francis Group, 2022.
Знайти повний текст джерелаTrim, Peter, and Yang-Im Lee. Strategic Cyber Security Management. Routledge, 2022.
Знайти повний текст джерелаStrategic Cyber Deterrence. Rowman & Littlefield Publishers, Incorporated, 2017.
Знайти повний текст джерелаЧастини книг з теми "Strategic cyber security"
Trim, Peter, and Yang-Im Lee. "Cyber Security Management." In Strategic Cyber Security Management, 209–19. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003244295-11.
Повний текст джерелаTrim, Peter, and Yang-Im Lee. "Strategic Cyber Security Management and Strategic Intelligence." In Strategic Cyber Security Management, 56–80. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003244295-4.
Повний текст джерелаTrim, Peter, and Yang-Im Lee. "A Cyber Security Awareness Programme." In Strategic Cyber Security Management, 220–38. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003244295-12.
Повний текст джерелаTrim, Peter, and Yang-Im Lee. "Integrated Security and a Risk Management Communication Strategy." In Strategic Cyber Security Management, 175–89. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003244295-9.
Повний текст джерелаTrim, Peter, and Yang-Im Lee. "Strategic Cyber Security Management and the Stakeholder Approach." In Strategic Cyber Security Management, 10–32. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003244295-2.
Повний текст джерелаTrim, Peter, and Yang-Im Lee. "Bridging the Government, Industry and Society Divide." In Strategic Cyber Security Management, 33–55. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003244295-3.
Повний текст джерелаTrim, Peter, and Yang-Im Lee. "Business Continuity Management." In Strategic Cyber Security Management, 132–53. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003244295-7.
Повний текст джерелаTrim, Peter, and Yang-Im Lee. "Organizational Learning, Managing Change and Security Culture." In Strategic Cyber Security Management, 190–208. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003244295-10.
Повний текст джерелаTrim, Peter, and Yang-Im Lee. "An Introduction to Strategic Cyber Security Management." In Strategic Cyber Security Management, 1–9. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003244295-1.
Повний текст джерелаTrim, Peter, and Yang-Im Lee. "Threat Identification and Risk Assessment." In Strategic Cyber Security Management, 81–114. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003244295-5.
Повний текст джерелаТези доповідей конференцій з теми "Strategic cyber security"
Halouzka, Kamil, and Ladislav Burita. "Cyber Security Strategic Documents Analysis." In 2019 International Conference on Military Technologies (ICMT). IEEE, 2019. http://dx.doi.org/10.1109/miltechs.2019.8870088.
Повний текст джерелаCanbek, Gurol, and Seref Sagiroglu. "Strategic cyber-security perspective in smart grids." In 2018 6th International Symposium on Digital Forensic and Security (ISDFS). IEEE, 2018. http://dx.doi.org/10.1109/isdfs.2018.8355346.
Повний текст джерелаSaydjari, O. Sami. "Structuring for Strategic Cyber Defense: A Cyber Manhattan Project Blueprint." In 2008 Annual Computer Security Applications Conference (ACSAC). IEEE, 2008. http://dx.doi.org/10.1109/acsac.2008.53.
Повний текст джерелаAtstāja, Līga, Didzis Rūtītis, Sintija Deruma, and Eduards Aksjoņenko. "Cyber Security Risks And Challenges In Remote Work Under The Covid-19 Pandemic." In 16th International Strategic Management Conference. European Publisher, 2021. http://dx.doi.org/10.15405/epsbs.2021.12.04.2.
Повний текст джерелаJayanthi, M. K. "Strategic Planning for Information Security -DID Mechanism to befriend the Cyber Criminals to assure Cyber Freedom." In 2017 2nd International Conference on Anti-Cyber Crimes (ICACC). IEEE, 2017. http://dx.doi.org/10.1109/anti-cybercrime.2017.7905280.
Повний текст джерелаCvitić, Ivan, Dragan Peraković, Marko Periša, and Mate Botica. "An Overview of the Cyber Security Strategic Management in Republic of Croatia." In The 5th International Virtual Research Conference In Technical Disciplines. Publishing Society, 2017. http://dx.doi.org/10.18638/rcitd.2017.5.1.107.
Повний текст джерелаSchlenker, Aaron, Haifeng Xu, Mina Guirguis, Christopher Kiekintveld, Arunesh Sinha, Milind Tambe, Solomon Sonya, Darryl Balderas, and Noah Dunstatter. "Don't Bury your Head in Warnings: A Game-Theoretic Approach for Intelligent Allocation of Cyber-security Alerts." In Twenty-Sixth International Joint Conference on Artificial Intelligence. California: International Joint Conferences on Artificial Intelligence Organization, 2017. http://dx.doi.org/10.24963/ijcai.2017/54.
Повний текст джерелаAziminejad, Arash. "A Cyber-Physical Security Framework for Rail Transportation Data Systems." In 2022 Joint Rail Conference. American Society of Mechanical Engineers, 2022. http://dx.doi.org/10.1115/jrc2022-78167.
Повний текст джерелаCooper, K. P., and D. Lindley. "Global safety culture, or strategic chains of co-operation?" In 8th IET International System Safety Conference incorporating the Cyber Security Conference 2013. Institution of Engineering and Technology, 2013. http://dx.doi.org/10.1049/cp.2013.1717.
Повний текст джерелаAn, Bo. "Game Theoretic Analysis of Security and Sustainability." In Twenty-Sixth International Joint Conference on Artificial Intelligence. California: International Joint Conferences on Artificial Intelligence Organization, 2017. http://dx.doi.org/10.24963/ijcai.2017/732.
Повний текст джерелаЗвіти організацій з теми "Strategic cyber security"
Cary, Dakota. China’s National Cybersecurity Center: A Base for Military-Civil Fusion in the Cyber Domain. Center for Security and Emerging Technology, July 2021. http://dx.doi.org/10.51593/2020ca016.
Повний текст джерелаBuchanan, Ben. A National Security Research Agenda for Cybersecurity and Artificial Intelligence. Center for Security and Emerging Technology, May 2020. http://dx.doi.org/10.51593/2020ca001.
Повний текст джерела