[PDF][PDF] A logical model for multi-sector cyber risk management
T Tagarev, SM Pappalardo, N Stoianov - Information & Security, 2020 - connections-qj.org
The increasing reliance on digital infrastructures makes whole sectors of the economy and
public services vulnerable to attacks through cyberspace. Some progress has been made in …
public services vulnerable to attacks through cyberspace. Some progress has been made in …
Exploration of Defensive Strategies, Detection Mechanisms, and Response Tactics against Advanced Persistent Threats APTs
N Ibrahim, NR Rajalakshmi… - Nanotechnology …, 2024 - nano-ntp.com
This study thoroughly examines Advanced Persistent Threats APTs by investigating
defensive strategies, detection mechanisms, and response tactics against these evolving …
defensive strategies, detection mechanisms, and response tactics against these evolving …
[PDF][PDF] Explainable intelligence for comprehensive interpretation of cybersecurity data in incident management
N AfzaliSeresht - 2022 - vuir.vu.edu.au
On a regular basis, a variety of events take place in computer systems: program launches,
firewall updates, user logins, and so on. To secure information resources, modern …
firewall updates, user logins, and so on. To secure information resources, modern …
Moving Beyond Traditional Incident Response: Combating APTs with Warfare-Enabled Continuous Response.
AH Shah - … Journal of Advanced Computer Science & …, 2024 - search.ebscohost.com
Critically examining the cybersecurity management practices, it can be concluded that
security management used by the organizations is mostly control-centered against a wide …
security management used by the organizations is mostly control-centered against a wide …
Moving Beyond Traditional Incident Response: Combating APTs with Warfare-Enabled Continuous
AH Shah - search.proquest.com
Critically examining the cybersecurity management practices, it can be concluded that
security management used by the organizations is mostly control-centered against a wide …
security management used by the organizations is mostly control-centered against a wide …
Enhancing Strategic Information Security Management in Organizations through Information Warfare Practices
In this short paper we argue that to combat APTs, organizations need a strategic level shift
away from a traditional prevention centered approach to that of a response centered one …
away from a traditional prevention centered approach to that of a response centered one …