Cyber Policy and Strategy Management

  • Izzat Alsmadi


Strategy management is defined as a procedure to determine the relationship between the organization and its environment through the use of selected objectives and resources allocation, which allow the development of efficient and effective action programs (Schendel and Hatten 1972).


  1. Bobriakov I (2018) The top 10 technology trends of 2018. Accessed 19 Feb 2018
  2. Cisco Networking Academy (2014) Cisco networking academy’s introduction to routing dynamically. Cisco Press, Indianapolis, INGoogle Scholar
  3. Cox BJ (2011) Policy-based access control (PBAC) for diverse DoD domains. Technica Corporation, Sterling, VAGoogle Scholar
  4. Deloitte (2018) Tech trends 2018, the symphonic enterprise. Deloitte, LondonGoogle Scholar
  5. EPIC (2018) Electronic Privacy Information Center,, Presidential Directives and Cybersecurity Concerning the use of Presidential Directives in Cybersecurity Policy, 2018.
  6. FBI Office of Intelligence (2003) FBI intelligence production and use. Concept of operations report. FBI Headquarters Divisions and the Office of Intelligence, Washington, DC, p 18Google Scholar
  7. GAO (2010) GAO Report, GAO-11-223.
  8. Gartner (2017) Identifies the Top 10 Strategic Technology Trends for 2018. Accessed 4 Oct 2017
  9. Gray CS (2007) The airpower advantage in future warfare (Maxwell Air Force Base), Ala: Air University. Airpower Research Institute, Maxwell AFB, ALGoogle Scholar
  10. Gray CS (2013) Making strategic sense of cyber power: why the sky is not falling. Scholar
  11. Guri M (2016) Moving target defense vs. moving target attacks: the two faces of deception. Network World. Accessed 4 Jan 2016Google Scholar
  12. ISAO (2016) 100-1, guidelines for establishing an ISAO, ISAO standards organization, July 22Google Scholar
  13. Kamila NK (2017) Advancing cloud database systems and capacity planning with dynamic applications. IGI, Hershey, PACrossRefGoogle Scholar
  14. Kaur B, Sharma S (2014) Parametric analysis of various cloud computing security models. Int J Inform Comput Technol 4(15)Google Scholar
  15. Koret J, Bachaalany E (2015) The antivirus Hacker’s handbook, 1st edn. Wiley, New York. Accessed 28 Sept 2015CrossRefGoogle Scholar
  16. Kott A, Mancini LV, Théron P, Drašar M, Dushku E, Günther H, Kont M, LeBlanc B, Panico A, Pihelgas M, Rzadca K (2018) Initial reference architecture of an intelligent autonomous agent for cyber defense, ARL-TR-8337, Mar 2018Google Scholar
  17. Kuehl D (2009) From cyberspace to cyberpower, defining the problem. In: Cyberpower and national security. National Defense University Press, Washington, DCGoogle Scholar
  18. Machaiah P (2017) Top 10 transformative technology trends. Huffington Post. Accessed 27 Dec 2017Google Scholar
  19. Morgan S (2017) Cyber security business report. Accessed 20 Dec 2017
  20. National Cyber Leap Year Summit (2009) Co-Chairs’ Report, Sept r6 2009 (2009, September r6) (Online].
  21. Nguyen K (2017) Learning to mow grass: IDF adaptations to hybrid. School of Advanced Military Studies, Leavenworth, KSGoogle Scholar
  22. NITRD (2014) Report on Implementing the Federal Cybersecurity Research and Development Strategy.
  23. Authentication Cheat Sheet, (2017), Scholar
  24. Pernik P, Wojtkowiak J (2016) Alexander Verschoor-Kirss, NATO cooperative cyber defense center of excellence. CCDCOE, TallinnGoogle Scholar
  25. Samit J (2017) 4 technology trends that will transform our world in 2018. Accessed 26 Dec 2017
  26. Schendel DE, Hatten KJ (1972) Business policy or strategic management: a broader view for an emerging discipline. Acad Manag Natl MeetGoogle Scholar
  27. Seppänen H (2015) Doctoral dissertation, Aalto University Publication SeriesGoogle Scholar
  28. Singh S (2018) Top 10 Tech Trends for 2018. Accessed 1 Feb 2018
  29. Skamser C (2017) Moving Target Defense (MTD) and Attack Surface Segmentation Cyber Security, CRI advantage, June 2ndGoogle Scholar
  30. Steel C, Lai R, Nagappan R (2009) Core security patterns: identity management standards and technologies, introduction to XACMLGoogle Scholar
  31. Venkata Subramanian KK, Mukherjee T, Gupta SK (2014) CAAC: an adaptive and proactive access control approach for emergencies in smart infrastructures. ACM Trans Autonom Adapt Syst 8(4):20Google Scholar
  32. Yarger HR (2006) Strategic theory of for the 21st century: the little book on big strategy. Strategic Studies Institute, Carlisle, PA, p 2Google Scholar
  33. Yogesh B (2018) 10 Top Cybersecurity Companies. Accessed 16 May 2018
  34. Zaman F, Raza B, Malik AK, Anjum A (2017) Self-protection against insider threats in DBMS through policies implementation. Int J Adv Comput Sci Appl 8(3)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Izzat Alsmadi
    • 1
  1. 1.Texas A&M UniversitySan AntonioUSA

Personalised recommendations