@inbook{7e1cdc8822a246e7a59824cae52fb759,
title = "Policies, Innovative Self-Adaptive Techniques and Understanding Psychology of Cybersecurity to Counter Adversarial Attacks in Network and Cyber Environments",
abstract = "Despite the increasing evolution of the cyber environment, enterprises seem to find it challenging to identify a solution to create an effective defensive posture. As the cyber phenomenon becomes a fundamental part of our society, it is essential to identify adaptive methods to increase the worldwide defensive condition in the most effective manner possible. A decade ago, it was not possible to imagine today{\textquoteright}s cyber-threat landscape. Cybercriminals have adapted their methods to circumvent traditional defences and hide undetected on systems for months or even years. There are different reasons for such attacks, and understanding the psychology of attacks are essential. Therefore, enterprise security also needs to be adapted with an intelligence, multi-layered approach to IT security. This paper surveys the latest research on the foundation of Adaptive Enterprise Security (AEC). To this end, it discusses potential security policies and strategies that are easy to develop, are established, and have a major effect on an enterprise{\textquoteright}s security practices. These policies and strategies can then efficiently be applied to an enterprise{\textquoteright}s cyber policies for the purposes of enhancing security and defence. Moreover, it will take into briefly discuss the need for a thorough understanding of human factors and psychology of attacks. The study also discusses various adaptive security measures that enterprises can adopt to continue with securing their network and cyber environments. To this end, the paper continues to survey and analyse the effectiveness of some of the latest adaptation techniques deployed to secure these network and cyber environments.",
keywords = "Cybersecurity, Policy, Network",
author = "Reza Montasari and Amin Hosseinian-Far and Richard Hill",
year = "2018",
month = dec,
day = "6",
doi = "10.1007/978-3-319-97181-0_4",
language = "English",
isbn = "9783319971803",
series = "Advanced Sciences and Technologies for Security Applications",
publisher = "Springer International Publishing AG",
pages = "71--93",
editor = "Hamid Jahankhani",
booktitle = "Cyber Criminology",
address = "Switzerland",
edition = "1st",
}