Embracing an outcome-based approach to cyber security

被引:0
|
作者
Brucciani P. [1 ]
机构
[1] WithSecure, Finland
关键词
Business goals - Business Process - Business security - Cyber security - Direct links - Outcome-based approaches - Security requirements;
D O I
10.12968/S1353-4858(23)70046-9
中图分类号
学科分类号
摘要
Cyber security is often seen as an activity separate from an organisation's main business processes. It is something that only comes to the fore when an incident occurs – which may be too late. And this can create a gap between the true security needs of the organisation and its security posture. In contrast, outcome-based security creates direct links between business goals and security requirements. © 2024 MA Business Ltd.
引用
收藏
相关论文
共 50 条
  • [31] Outcome-based evaluation - Schalock,RL
    Posavac, EJ
    EVALUATION AND PROGRAM PLANNING, 1997, 20 (01) : 114 - 115
  • [32] MAKING OUTCOME-BASED EDUCATION WORK
    ABRAMS, JD
    EDUCATIONAL LEADERSHIP, 1985, 43 (01) : 30 - 32
  • [33] OUTCOME-BASED EDUCATION - A SUCCESS STORY
    BROWN, AS
    EDUCATIONAL LEADERSHIP, 1988, 46 (02) : 12 - 12
  • [34] BEYOND TRADITIONAL OUTCOME-BASED EDUCATION
    SPADY, WG
    MARSHALL, KJ
    EDUCATIONAL LEADERSHIP, 1991, 49 (02) : 67 - 72
  • [35] An Outcome-Based Approach to Assign MELD Exception Points for Patients With Hepatocellular Cancer
    Kensinger, Clark D.
    Feurer, Irene D.
    Karp, Seth J.
    TRANSPLANTATION, 2017, 101 (09) : 2056 - 2061
  • [36] A Tullock-contest-based approach for cyber security investments
    Iliaev, David
    Oren, Sigal
    Segev, Ella
    ANNALS OF OPERATIONS RESEARCH, 2023, 320 (01) : 61 - 84
  • [37] Bayesian outcome-based strategy classification
    Michael D. Lee
    Behavior Research Methods, 2016, 48 : 29 - 41
  • [38] Case studies in outcome-based education
    Davis, Margery H.
    Amin, Zubair
    Grande, Joseph P.
    O'Neill, Angela E.
    Pawlina, Wojciech
    Viggiano, Thomas R.
    Zuberi, Rukhsana
    MEDICAL TEACHER, 2007, 29 (07) : 717 - 722
  • [39] OUTCOME-BASED TEACHING: MICROWAVE AND RADAR
    Lakshmi, Vasantha M.
    2014 IEEE INTERNATIONAL CONFERENCE ON MOOC, INNOVATION AND TECHNOLOGY IN EDUCATION (MITE), 2014, : 227 - 231
  • [40] Cyber security vulnerability analysis: An asset-based approach
    Baybutt, P
    PROCESS SAFETY PROGRESS, 2003, 22 (04) : 220 - 228