Abstract
This chapter summarizes views, opinions, and ideas of leading researchers and practitioners in cybersecurity, which they shared with our research team during the interviews. Based on these views, we suggest ways in which businesses can plan, build, and manage secure spaces in the digital domain. Recommendations are illustrated by examples and case studies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Security information and event management (SIEM) https://searchsecurity.techtarget.com/definition/security-information-and-event-management-SIEM.
References
Japan: Legal responses to the Great East Japan Earthquake of 2011, Law.gov the Law Library of Congress. Accessed September 2018. https://www.loc.gov/law/help/japan-earthquake/index.php.
Kaufmann, D., & Penciakova, V. (2011, March). Japan’s Triple Disaster: Governance and the Earthquake, Tsunami and Nuclear Crises. Brookings Institute. https://www.brookings.edu/opinions/japans-triple-disaster-governance-and-the-earthquake-tsunami-and-nuclear-crises/.
Philips Lighting is now Signify. Press Release 16 May 2018. https://www.signify.com/en-us/about/news/press-releases/2018/20180516-philips-lighting-is-now-signify.
Honeypot. https://searchsecurity.techtarget.com/definition/honey-pot.
Cole, E., & Northcutt, S. Honeypots: A Security manager’s guide to Honeypots. V1.1 SANS Technology Institute, Security Laboratory. https://www.sans.edu/cyber-research/security-laboratory/article/honeypots-guide.
Hatton, E. Life online: How big is your digital footprint? 12 February 2018 RNZ. https://www.radionz.co.nz/news/national/350224/life-online-how-big-is-your-digital-footprint.
Lyons, K., Ellis-Petersen, H., Kuo, L., & Zhou, N. Malaysian investigators release 1,500-page report into disappearance of MH370, The Guardian, 30 July 2018. https://www.theguardian.com/world/live/2018/jul/30/mh370-final-report-released-by-malaysian-government-live.
Johnston, A., & Warkentin, M. (2010, September). Fear appeals and information security behaviours: An empirical study. MIS Quarterly, 34(3). http://www.uab.edu/cas.
Evans, M., Maglaras, L. A., He, Y., & Janicke Jan, H. (2016). Human behavior as an aspect of cyber security assurance. arXiv:1601.03921v1[cs.CR].
Aytes, K., Connolly, T., Ovelgonne, M., Dumitras, T., Prakash, A., Subrahmanian, V. S., & Wany, B. (2017, July). Understanding the relationship, between human behavior and susceptibility to cyber-attacks: A data-driven approach. ACM Transactions on Intelligent Systems and Technology (TIST)—Special Issue: Cyber Security and Regular Papers, 8(4), Article no. 51.
Gross, M. L. Canetti, D., & Vashdi, D. R. (2016). The psychological effects of cyber terrorism. PMC US National Library of Medicine. Bulletin of the Atomic Scientists, 72(5), 284–291. Published online 4 August 2016. https://doi.org/10.1080/00963402.2016.1216502.
Hoffman, C. (2017, November). Intel management engine, explained: The Tiny computer inside your CPU. How-To Geek. https://www.howtogeek.com/334013/intel-management-engine-explained-the-tiny-computer-inside-your-cpu/.
Davis, J. TrapX launches ransomware deception tool, CryptoTrap. HealthITNews, August 2016. https://www.healthcareitnews.com/news/trapx-launches-ransomware-deception-tool-cryptotrap.
First Midwest Bank Uses Fidelis Deceptionâ„¢ to Detect and Respond to Security Anomalies, case study. Accessed October 2018. https://www.fidelissecurity.com/case-study-first-midwest-bank.
20 Deception Technology Companies: In-depth Guide [2018] Applied AI blog. https://blog.appliedai.com/deception-tech-companies/.
5 ways deception tech is disrupting cybersecurity, Doron Kolton, TNW, May 2018. https://thenextweb.com/contributors/2018/05/26/5-ways-deception-technology-is-changing-cybersecurity/.
Hutchins, E. M., Cloppert, M. J., & Amin, R. M. (2011, January). Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion Kill Chains. https://www.lockheedmartin.com/content/dam/lockheed-martin/rms/documents/cyber/LM-White-Paper-Intel-Driven-Defense.pdf.
Myer, D. ID card security: Spain is facing chaos over chip crypto flaws. ZDNet, 17 November 2017. https://www.zdnet.com/article/id-card-security-spain-is-facing-chaos-over-chip-crypto-flaws/.
Lapowsky, I. How Russian Facebook ads divided and targeted US voters before the 2016 election, 18 April 2018 Wired. https://www.wired.com/story/russian-facebook-ads-targeted-us-voters-before-2016-election/.
Stewart, E. Facebook has already detected suspicious activity trying to influence the 2018 elections, 31 July Vox. https://www.vox.com/2018/7/31/17635592/facebook-elections-russia-2018-midterms.
Facebook-Cambridge Analytica data scandal, BBC. Accessed October 2018. https://www.bbc.co.uk/news/topics/c81zyn0888lt/facebook-cambridge-analytica-data-scandal.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2019 The Author(s)
About this chapter
Cite this chapter
Pogrebna, G., Skilton, M. (2019). Navigating a Safe Space. In: Navigating New Cyber Risks. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-13527-0_12
Download citation
DOI: https://doi.org/10.1007/978-3-030-13527-0_12
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-030-13526-3
Online ISBN: 978-3-030-13527-0
eBook Packages: Business and ManagementBusiness and Management (R0)