Policies, Innovative Self-Adaptive Techniques and Understanding Psychology of Cybersecurity to Counter Adversarial Attacks in Network and Cyber Environments

Reza Montasari, Amin Hosseinian-Far, Richard Hill

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

Despite the increasing evolution of the cyber environment, enterprises seem to find it challenging to identify a solution to create an effective defensive posture. As the cyber phenomenon becomes a fundamental part of our society, it is essential to identify adaptive methods to increase the worldwide defensive condition in the most effective manner possible. A decade ago, it was not possible to imagine today’s cyber-threat landscape. Cybercriminals have adapted their methods to circumvent traditional defences and hide undetected on systems for months or even years. There are different reasons for such attacks, and understanding the psychology of attacks are essential. Therefore, enterprise security also needs to be adapted with an intelligence, multi-layered approach to IT security. This paper surveys the latest research on the foundation of Adaptive Enterprise Security (AEC). To this end, it discusses potential security policies and strategies that are easy to develop, are established, and have a major effect on an enterprise’s security practices. These policies and strategies can then efficiently be applied to an enterprise’s cyber policies for the purposes of enhancing security and defence. Moreover, it will take into briefly discuss the need for a thorough understanding of human factors and psychology of attacks. The study also discusses various adaptive security measures that enterprises can adopt to continue with securing their network and cyber environments. To this end, the paper continues to survey and analyse the effectiveness of some of the latest adaptation techniques deployed to secure these network and cyber environments.
LanguageEnglish
Title of host publicationCyber Criminology
EditorsHamid Jahankhani
Place of PublicationSwitzerland
PublisherSpringer International Publishing AG
Chapter4
Pages71-93
Number of pages23
Edition1st
ISBN (Electronic)9783319971810
ISBN (Print)9783319971803
DOIs
Publication statusPublished - 6 Dec 2018

Publication series

NameAdvanced Sciences and Technologies for Security Applications
ISSN (Print)1613-5113

Fingerprint

Industry
Human engineering

Cite this

Montasari, R., Hosseinian-Far, A., & Hill, R. (2018). Policies, Innovative Self-Adaptive Techniques and Understanding Psychology of Cybersecurity to Counter Adversarial Attacks in Network and Cyber Environments. In H. Jahankhani (Ed.), Cyber Criminology (1st ed., pp. 71-93). (Advanced Sciences and Technologies for Security Applications). Switzerland: Springer International Publishing AG. https://doi.org/10.1007/978-3-319-97181-0_4
Montasari, Reza ; Hosseinian-Far, Amin ; Hill, Richard. / Policies, Innovative Self-Adaptive Techniques and Understanding Psychology of Cybersecurity to Counter Adversarial Attacks in Network and Cyber Environments. Cyber Criminology. editor / Hamid Jahankhani. 1st. ed. Switzerland : Springer International Publishing AG, 2018. pp. 71-93 (Advanced Sciences and Technologies for Security Applications).
@inbook{7e1cdc8822a246e7a59824cae52fb759,
title = "Policies, Innovative Self-Adaptive Techniques and Understanding Psychology of Cybersecurity to Counter Adversarial Attacks in Network and Cyber Environments",
abstract = "Despite the increasing evolution of the cyber environment, enterprises seem to find it challenging to identify a solution to create an effective defensive posture. As the cyber phenomenon becomes a fundamental part of our society, it is essential to identify adaptive methods to increase the worldwide defensive condition in the most effective manner possible. A decade ago, it was not possible to imagine today’s cyber-threat landscape. Cybercriminals have adapted their methods to circumvent traditional defences and hide undetected on systems for months or even years. There are different reasons for such attacks, and understanding the psychology of attacks are essential. Therefore, enterprise security also needs to be adapted with an intelligence, multi-layered approach to IT security. This paper surveys the latest research on the foundation of Adaptive Enterprise Security (AEC). To this end, it discusses potential security policies and strategies that are easy to develop, are established, and have a major effect on an enterprise’s security practices. These policies and strategies can then efficiently be applied to an enterprise’s cyber policies for the purposes of enhancing security and defence. Moreover, it will take into briefly discuss the need for a thorough understanding of human factors and psychology of attacks. The study also discusses various adaptive security measures that enterprises can adopt to continue with securing their network and cyber environments. To this end, the paper continues to survey and analyse the effectiveness of some of the latest adaptation techniques deployed to secure these network and cyber environments.",
keywords = "Cybersecurity, Policy, Network",
author = "Reza Montasari and Amin Hosseinian-Far and Richard Hill",
year = "2018",
month = "12",
day = "6",
doi = "10.1007/978-3-319-97181-0_4",
language = "English",
isbn = "9783319971803",
series = "Advanced Sciences and Technologies for Security Applications",
publisher = "Springer International Publishing AG",
pages = "71--93",
editor = "Hamid Jahankhani",
booktitle = "Cyber Criminology",
address = "Switzerland",
edition = "1st",

}

Montasari, R, Hosseinian-Far, A & Hill, R 2018, Policies, Innovative Self-Adaptive Techniques and Understanding Psychology of Cybersecurity to Counter Adversarial Attacks in Network and Cyber Environments. in H Jahankhani (ed.), Cyber Criminology. 1st edn, Advanced Sciences and Technologies for Security Applications, Springer International Publishing AG, Switzerland, pp. 71-93. https://doi.org/10.1007/978-3-319-97181-0_4

Policies, Innovative Self-Adaptive Techniques and Understanding Psychology of Cybersecurity to Counter Adversarial Attacks in Network and Cyber Environments. / Montasari, Reza; Hosseinian-Far, Amin; Hill, Richard.

Cyber Criminology. ed. / Hamid Jahankhani. 1st. ed. Switzerland : Springer International Publishing AG, 2018. p. 71-93 (Advanced Sciences and Technologies for Security Applications).

Research output: Chapter in Book/Report/Conference proceedingChapter

TY - CHAP

T1 - Policies, Innovative Self-Adaptive Techniques and Understanding Psychology of Cybersecurity to Counter Adversarial Attacks in Network and Cyber Environments

AU - Montasari, Reza

AU - Hosseinian-Far, Amin

AU - Hill, Richard

PY - 2018/12/6

Y1 - 2018/12/6

N2 - Despite the increasing evolution of the cyber environment, enterprises seem to find it challenging to identify a solution to create an effective defensive posture. As the cyber phenomenon becomes a fundamental part of our society, it is essential to identify adaptive methods to increase the worldwide defensive condition in the most effective manner possible. A decade ago, it was not possible to imagine today’s cyber-threat landscape. Cybercriminals have adapted their methods to circumvent traditional defences and hide undetected on systems for months or even years. There are different reasons for such attacks, and understanding the psychology of attacks are essential. Therefore, enterprise security also needs to be adapted with an intelligence, multi-layered approach to IT security. This paper surveys the latest research on the foundation of Adaptive Enterprise Security (AEC). To this end, it discusses potential security policies and strategies that are easy to develop, are established, and have a major effect on an enterprise’s security practices. These policies and strategies can then efficiently be applied to an enterprise’s cyber policies for the purposes of enhancing security and defence. Moreover, it will take into briefly discuss the need for a thorough understanding of human factors and psychology of attacks. The study also discusses various adaptive security measures that enterprises can adopt to continue with securing their network and cyber environments. To this end, the paper continues to survey and analyse the effectiveness of some of the latest adaptation techniques deployed to secure these network and cyber environments.

AB - Despite the increasing evolution of the cyber environment, enterprises seem to find it challenging to identify a solution to create an effective defensive posture. As the cyber phenomenon becomes a fundamental part of our society, it is essential to identify adaptive methods to increase the worldwide defensive condition in the most effective manner possible. A decade ago, it was not possible to imagine today’s cyber-threat landscape. Cybercriminals have adapted their methods to circumvent traditional defences and hide undetected on systems for months or even years. There are different reasons for such attacks, and understanding the psychology of attacks are essential. Therefore, enterprise security also needs to be adapted with an intelligence, multi-layered approach to IT security. This paper surveys the latest research on the foundation of Adaptive Enterprise Security (AEC). To this end, it discusses potential security policies and strategies that are easy to develop, are established, and have a major effect on an enterprise’s security practices. These policies and strategies can then efficiently be applied to an enterprise’s cyber policies for the purposes of enhancing security and defence. Moreover, it will take into briefly discuss the need for a thorough understanding of human factors and psychology of attacks. The study also discusses various adaptive security measures that enterprises can adopt to continue with securing their network and cyber environments. To this end, the paper continues to survey and analyse the effectiveness of some of the latest adaptation techniques deployed to secure these network and cyber environments.

KW - Cybersecurity

KW - Policy

KW - Network

UR - https://www.springer.com/us/book/9783319971803#aboutBook

U2 - 10.1007/978-3-319-97181-0_4

DO - 10.1007/978-3-319-97181-0_4

M3 - Chapter

SN - 9783319971803

T3 - Advanced Sciences and Technologies for Security Applications

SP - 71

EP - 93

BT - Cyber Criminology

A2 - Jahankhani, Hamid

PB - Springer International Publishing AG

CY - Switzerland

ER -

Montasari R, Hosseinian-Far A, Hill R. Policies, Innovative Self-Adaptive Techniques and Understanding Psychology of Cybersecurity to Counter Adversarial Attacks in Network and Cyber Environments. In Jahankhani H, editor, Cyber Criminology. 1st ed. Switzerland: Springer International Publishing AG. 2018. p. 71-93. (Advanced Sciences and Technologies for Security Applications). https://doi.org/10.1007/978-3-319-97181-0_4