A great day for iCollege publishing! Here are links to two other article by some of our own - Jim Chen, Roxanne Everetts, John Hurley, and Mark McGibbon.
Abstract Announcement for International Journal of Cyber Warfare and Terrorism (IJCWT) 4(3)
****************************************************
ARTICLE 1 - A Framework for Cybersecurity Strategy Formation
Jim Q. Chen (DoD National Defense University, Washington, DC, USA)
A good cybersecurity strategy consists of the most effective and the most optimal course of actions available at the moment of operation in order to ensure the success of a cyber operation. How to form such a strategy is always a challenge. The current literature does not have much discussion about this topic. This paper intends to explore this process, which supports decision-makers in the cyber domain. It applies the Cybersecurity Formation Framework proposed in Chen and Duvall (2014), and shows how it can integrate varied actions into a systematic and consolidated course of actions to guarantee the success in a mission. This paper also suggests areas for future studies.
To obtain a copy of the entire article, click on the link below.
www.igi-global.com/article/a-framework-for-cybersecurity-strategy-formation/124128
To read a PDF sample of this article, click on the link below.
www.igi-global.com/viewtitlesample.aspx?id=124128
ARTICLE 2 - Cyber Readiness: Are We There Yet?
John S. Hurley (National Defense University, Washington, DC, USA), H. Mark McGibbon (National Defense University, Washington, DC, USA), Roxanne Everetts (National Defense University, Washington, DC, USA)
Many of the systems that control the critical infrastructure were not originally designed with security in mind. This has left us vulnerable to unwanted attacks in many of the environments. It has become essential that the authors determine if their infrastructures are better prepared for existing and future threats. In this study, the authors will examine the impact of attacks, including terrorist attacks on critical infrastructures, in particular, the Energy sector. The results show that in spite of the warnings of the threats carried out in various sectors and organizations around the world, they have still remain extremely vulnerable because of a number of critical security issues that hamper their ability to better serve and protect our vital information assets. The authors examine some of the most prominent models being used today and how they may be modified to better serve the needs of their user communities and key stakeholders.
To obtain a copy of the entire article, click on the link below.
www.igi-global.com/article/cyber-readiness/124129
To read a PDF sample of this article, click on the link below.
www.igi-global.com/viewtitlesample.aspx?id=124129