Cyber Security Resilience in Business Informatics: An Exploratory Paper

被引:0
|
作者
Mouratidis, Haralambos [1 ,2 ]
Zdravkovic, Jelena [2 ]
Stirna, Janis [2 ]
机构
[1] Univ Brighton, Ctr Secure Intelligent & Usable Syst, Brighton, England
[2] Stockholm Univ, Dept Comp & Syst Sci, Stockholm, Sweden
关键词
Resilience; Security; Context; Capability; Enterprise modeling; REQUIREMENTS; MODEL;
D O I
10.1007/978-3-030-61140-8_4
中图分类号
F [经济];
学科分类号
02 ;
摘要
Although considerable effort is made to secure organisational infrastructures and to protect organizational assets, it is widely acknowledged that it is equally important to ensure that organisations need to define appropriate ways to harden their overall resilience including recovery from security incidents. In this exploratory paper we outline research challenges and we present the motivation and the foundations of a novel framework that is based on security resilience and capability modelling theory.
引用
收藏
页码:53 / 66
页数:14
相关论文
共 50 条
  • [31] Resilience in the Context of Cyber Security: A Review of the Fundamental Concepts and Relevance
    de Araujo, Misael Sousa
    Machado, Bruna Aparecida Souza
    Passos, Francisco Uchoa
    APPLIED SCIENCES-BASEL, 2024, 14 (05):
  • [32] Cross-Stack Threat Sensing for Cyber Security and Resilience
    Araujo, Frederico
    Taylor, Teryl
    Zhang, Jialong
    Stoecklin, Marc
    2018 48TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W), 2018, : 18 - 21
  • [33] Cyber security in the European Union: resilience and adaptability in governance policy
    Deschaux-Dutard, Delphine
    INTERNATIONAL AFFAIRS, 2016, 92 (04) : 1009 - 1010
  • [34] Resilience Informatics for Cyber-augmented Manufacturing Networks (CMN): Centrality, Flow and Disruption
    Nguyen, Win P., V
    Nof, Shimon Y.
    STUDIES IN INFORMATICS AND CONTROL, 2018, 27 (04): : 377 - 384
  • [35] Social cyber forensics: leveraging open source information and social network analysis to advance cyber security informatics
    Samer Al-khateeb
    Nitin Agarwal
    Computational and Mathematical Organization Theory, 2020, 26 : 412 - 430
  • [36] Social cyber forensics: leveraging open source information and social network analysis to advance cyber security informatics
    Al-khateeb, Samer
    Agarwal, Nitin
    COMPUTATIONAL AND MATHEMATICAL ORGANIZATION THEORY, 2020, 26 (04) : 412 - 430
  • [37] Risky Cyber Security: '7012' Regulations Federally-driven inhibitor to resilience within the defense industrial base A Position Paper
    Breton, Larisa
    2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C), 2017, : 285 - 288
  • [38] Cyber Resilient Behavior: Integrating Human Behavioral Models and Resilience Engineering Capabilities into Cyber Security
    van der Kleij, Rick
    Leukfeldt, Rutger
    ADVANCES IN HUMAN FACTORS IN CYBERSECURITY, 2020, 960 : 16 - 27
  • [39] How to spend it: optimal investment for cyber security Position paper
    Smeraldi, Fabrizio
    Malacaria, Pasquale
    1ST INTERNATIONAL WORKSHOP ON AGENTS & CYBERSECURITY, 2014,
  • [40] An Exploratory Study of the Effects of Knowledge Sharing Methods on Cyber Security Practice
    Hiep Cong Pham
    Ulhaq, Irfan
    Minh Nhat Nguyen
    Nkhoma, Mathews
    AUSTRALASIAN JOURNAL OF INFORMATION SYSTEMS, 2021, 25 : 1 - 23