Strategic Cyber Environment Management with Zero Trust and Cyber Counterintelligence
Abstract:
Organisations need to improve their information security practices, given the volume of successful cyberattacks and crimes. To enhance security in an organisation, information security must be considered a business issue, instead of a technical problem. Hence, organisations must change the security protocol from reactive action to proactive operation; must develop information security strategies that support the business; should implement better controls, systems, and services; and must create a process to proactively gather information about the possible threats and adversaries. This study proposes a novel method for combining a zero-trust strategy with cyber counterintelligence to gain the required security level and situational awareness to encounter modern threats.
AUTHORS
University of Jyväskylä Faculty of Information Technology
Jyväskylä, Finland
Tero Bodström has 15 years of experience in the information security field. He has been working as a telecommunication operator, in the gaming industry, for software companies and is currently working in industry. Besides working in the field, he is also working on his PhD where the focus is in network anomaly detection using Deep Learning.
Published In
Journal of Information Warfare
The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.
Quick Links
Archive