Policies, Innovative Self-Adaptive Techniques and Understanding Psychology of Cybersecurity to Counter Adversarial Attacks in Network and Cyber Environments

Reza Montasari, Amin Hosseinian-Far, Richard Hill

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

6 Citations (Scopus)

Abstract

Despite the increasing evolution of the cyber environment, enterprises seem to find it challenging to identify a solution to create an effective defensive posture. As the cyber phenomenon becomes a fundamental part of our society, it is essential to identify adaptive methods to increase the worldwide defensive condition in the most effective manner possible. A decade ago, it was not possible to imagine today’s cyber-threat landscape. Cybercriminals have adapted their methods to circumvent traditional defences and hide undetected on systems for months or even years. There are different reasons for such attacks, and understanding the psychology of attacks are essential. Therefore, enterprise security also needs to be adapted with an intelligence, multi-layered approach to IT security. This paper surveys the latest research on the foundation of Adaptive Enterprise Security (AEC). To this end, it discusses potential security policies and strategies that are easy to develop, are established, and have a major effect on an enterprise’s security practices. These policies and strategies can then efficiently be applied to an enterprise’s cyber policies for the purposes of enhancing security and defence. Moreover, it will take into briefly discuss the need for a thorough understanding of human factors and psychology of attacks. The study also discusses various adaptive security measures that enterprises can adopt to continue with securing their network and cyber environments. To this end, the paper continues to survey and analyse the effectiveness of some of the latest adaptation techniques deployed to secure these network and cyber environments.
Original languageEnglish
Title of host publicationCyber Criminology
EditorsHamid Jahankhani
Place of PublicationSwitzerland
PublisherSpringer International Publishing AG
Chapter4
Pages71-93
Number of pages23
Edition1st
ISBN (Electronic)9783319971810
ISBN (Print)9783319971803
DOIs
Publication statusPublished - 6 Dec 2018

Publication series

NameAdvanced Sciences and Technologies for Security Applications
ISSN (Print)1613-5113

Fingerprint

Dive into the research topics of 'Policies, Innovative Self-Adaptive Techniques and Understanding Psychology of Cybersecurity to Counter Adversarial Attacks in Network and Cyber Environments'. Together they form a unique fingerprint.

Cite this