Using agility to combat cyber attacks.

J Bus Contin Emer Plan

Published: June 2017

Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

Download full-text PDF

Source

Publication Analysis

Top Keywords

cyber criminals
16
cyber attacks
12
incident response
8
cyber
7
agility combat
4
combat cyber
4
attacks incident
4
response practitioners
4
practitioners feel
4
feel locked
4

Similar Publications

Metaverse forensics framework: A NIST based investigation framework for metaverse.

Sci Justice

November 2024

Department of Artificial Intelligence, Lviv Polytechnic National University, S. Bandera st. 29, Lviv, 79013, Ukraine. Electronic address:

The Metaverse is an intersection of virtual, augmented, and mixed reality that offers users an interactive virtual environment. This new technology has enormous possibilities for both people and companies. However, owing to the existence of inherent vulnerabilities associated with Metaverse, misconduct is a major concern.

View Article and Find Full Text PDF

Introduction: The effectiveness of human-centric cybersecurity largely depends on end-users' adherence to security and privacy behaviors. Understanding and predicting variations in the adoption of these safeguards is crucial for both theoretical advancement and practical application. While existing frameworks are often adapted from health science literature, there is potential to enhance these models by incorporating criminological constructs relevant to online victimization.

View Article and Find Full Text PDF

Cyberattacks pose a significant business risk to organizations. Although there is ample literature focusing on why people pose a major risk to organizational cybersecurity and how to deal with it, there is surprisingly little we know about cyber and information security decision-makers who are essentially the people in charge of setting up and maintaining organizational cybersecurity. In this paper, we study cybersecurity awareness of cyber and information security decision-makers, and investigate factors associated with it.

View Article and Find Full Text PDF

This study evaluated the prevalence rates and risk factors for cyberbullying victimization and perpetration among 7th-12th grade students ( = 3,396) enrolled in 22 public school districts across Southern Illinois. Risk factors included victimization by traditional bullying, gender identity, cell phone use, and social media usage. We also examined perceptions of school climate and safety.

View Article and Find Full Text PDF

In contemporary times, there has been a rapid increase in the utilization of the Internet and information technology by students. As a result, educational instructors worldwide have encountered a significant issue due to an unprecedented level of reliance and, to a large extent, dependency on such technology. Furthermore, akin to any analogous emerging social phenomenon, this dependency on technology has engendered novel spectrums of unlawful and illicit conduct.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!