SZÁDECZKY, Tamás, Zsolt BEDERNA a Zoltan RAJNAI. Further Strategy Analysis of Cybersecurity Incidents. Land Forces Academy Review. 2021, roč. 26, č. 3, s. 251-260. ISSN 2247-840X. Dostupné z: https://dx.doi.org/10.2478/raft-2021-0032.
Další formáty:   BibTeX LaTeX RIS
Základní údaje
Originální název Further Strategy Analysis of Cybersecurity Incidents
Autoři SZÁDECZKY, Tamás (348 Maďarsko, garant, domácí), Zsolt BEDERNA a Zoltan RAJNAI.
Vydání Land Forces Academy Review, 2021, 2247-840X.
Další údaje
Originální jazyk angličtina
Typ výsledku Článek v odborném periodiku
Obor 50501 Law
Stát vydavatele Polsko
Utajení není předmětem státního či obchodního tajemství
WWW URL
Kód RIV RIV/00216224:14220/21:00124490
Organizační jednotka Právnická fakulta
Doi http://dx.doi.org/10.2478/raft-2021-0032
Klíčová slova anglicky cybersecurity; incidents
Změnil Změnil: JUDr. Jakub Klodwig, učo 434044. Změněno: 5. 4. 2022 22:20.
Anotace
In current socio-economic processes, info-communication services play a determining role, modifying the activities of certain actors. The growing dependence that has developed over the past two decades has imposed the need to give political will to security, which has led to an iterative evolution of the regulatory environment. Therefore, the regulatory framework requires certain entities to develop safeguards including controls that enhance both prevention and response in a manner commensurate with the business value of the information to be protected. However, due to the nature of cybersecurity, developing such countermeasures is not the task of a standalone organization but all entities in cyberspace in a wide range, from individuals to the public sector. Therefore, each entity involved must design protection capabilities in a manner commensurate with the risk, which requires strategic tools and methods and drives organizations to learn from their security incidents. Following our previous paper “Business strategy analysis of cybersecurity incidents” (Bederna et al.) on the topic, this paper reviews the essential formal security strategy formulation tools applied in the cases of Yahoo! and Estonia. Both are based on publicly available information. The analysis confirms the importance of managements’ or the government’s attitude and support for solving cybersecurity challenges.
Návaznosti
EF16_019/0000822, projekt VaVNázev: Centrum excelence pro kyberkriminalitu, kyberbezpečnost a ochranu kritických informačních infrastruktur
VytisknoutZobrazeno: 7. 9. 2024 00:30