Author:
Saeed Jawad Mohammed,Hlayel Mohammed
Abstract
Recently, cybersecurity threat management policy is important to be integrated in the management of any organization using information systems whether these organizations are big, medium or even small. As a good practice to be adopted, these organizations need to adapt to recent trends of security threats to prevent these threat or to minimize the risks associated to them. Understanding attackers’ behavior in crucial in the success of this journey and it’s always good to probe the systems as ethical hacking to identify possible security vulnerabilities and points of attacks. Modern information systems as cloud computing even should be considered in special care based on the characteristics of cloud security as data confidentiality, encryption and availability in the context of agile DevOps software project management. This book chapter presents the best practices to be adopted and how the organization adapts by setting realistic and reasonable security policies to intelligently manage different types of security threats.
Reference59 articles.
1. Craigen D, Diakun-Thibault N, Purse R. Defining cybersecurity. Technology Innovation Management Review. 2014;4(10):13-21
2. Roldán-Molina G, Almache-Cueva M, Silva-Rabadão C, Yevseyeva I, Basto-Fernandes V. A comparison of cybersecurity risk analysis tools. Procedia Computer Science. 2017;121:568-575
3. Rehman R, Hazarika GC, Chetia G. Malware threats and mitigation strategies: A survey. Journal of Theoretical and Applied Information Technology. 2011;29(2):69-73
4. Chen Z, Roussopoulos M, Liang Z, Zhang Y, Chen Z, Delis A. Malware characteristics and threats on the internet ecosystem. Journal of Systems and Software. 2012;85(7):1650-1672
5. Aycock J. Getting There. In: Spyware and Adware. Advances in Information Security. Boston, MA: Springer; 2011;50. https://doi.org/10.1007/978-0-387-77741-2_2
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Investigating the Benefits of Adopting Secure Shell (SSH) in Wireless Network Security;2023 IEEE International Conference on Paradigm Shift in Information Technologies with Innovative Applications in Global Scenario (ICPSITIAGS);2023-12-28