Affiliation:
1. Department of Computer Engineering, Gujrat Technological College
Abstract
There is a wealth of information security guidance available in academic and practitioner literature. Although other tactics such as deterrence, deception, detection, and reaction are possible, most of the research focuses on how to prevent security threats using technological countermeasures. The findings of a qualitative study conducted in Korea to determine how businesses use security techniques to protect their information systems are presented in this article. The results show a deeply ingrained preventative mindset, driven by a desire to ensure the availability of technology and services and a general lack of awareness of enterprise security concerns. While other tactics were evident, they were also preventative measures. The article lays out a research agenda for deploying multiple strategies across an enterprise, focusing on how to combine, balance, and optimize systems. This research looked at various topics, including information security and areas where security strategy is likely to be discussed, such as military sources. There are nine security strategies identified. A qualitative focus group approach is used to determine how these security strategies are used in organizations. In focus groups, security managers from eight organizations were asked to discuss their organizations’ security strategies. According to the findings, many organizations use a preventive approach to keep technology services available. Some of the other identified methods were used to support the prevention strategy on an operational level.
Cited by
19 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Securing IoT Devices Using Generative AI Techniques;Advances in Information Security, Privacy, and Ethics;2024-07-26
2. Revolutionizing sheet metal stamping through industry 5.0 digital twins: a comprehensive review;Journal of Intelligent Manufacturing;2024-07-11
3. Leveraging generative adversarial networks for enhanced cryptographic key generation;Concurrency and Computation: Practice and Experience;2024-07-10
4. Good Governance and Cybersecurity;Advances in Hospitality, Tourism, and the Services Industry;2024-05-31
5. Cybersecurity Policies Implementation;Advances in Business Information Systems and Analytics;2024-04-26