Explore chapters and articles related to this topic
Statistics
Published in Paul L. Goethals, Natalie M. Scala, Daniel T. Bennett, Mathematics in Cyber Research, 2022
In today's world, cybersecurity alone is no longer sufficient to overcome the evolving magnitude and frequency of future cyber attacks. New cyber threats are emerging every day, and the impacts of these threats are often unknown. In order to cope with these uncertainties, the concept of resilience is adapted to cyber research. Cyber resilience, in general, involves the ability of a system to withstand, respond, and overcome the impact of a cyber threat. The implications of statistical methods on the current cyber resilience research efforts will be detailed at the end of this chapter in Section 9.6, which discusses research implications and extensions.
It’s Time for a New Paradigm
Published in Dan Shoemaker, Anne Kohnke, Ken Sigler, How to Build a Cyber-Resilient Organization, 2018
Shoemaker Dan, Kohnke Anne, Sigler Ken
Nonetheless, the generic concept of cyber resilience could potentially apply to every enterprise system operated by every organization in the world. Cyber resilience comprises all the steps that an organization needs to take “to prepare for and adapt to changing conditions and withstand and recover rapidly from disruptions. An organization is resilient when it exhibits the ability to withstand and recover from attacks, accidents, or naturally occurring threats or incidents” (PPD-21, 2013, p. 3).
Cybersecurity Incident Response in the Enterprise
Published in Mohiuddin Ahmed, Nour Moustafa, Abu Barkat, Paul Haskell-Dowland, Next-Generation Enterprise Security and Governance, 2022
Nickson M. Karie, Leslie F. Sikos
The ability for an organization to manage a cyber-attack or data breach while continuing to operate its business effectively is called cyber-resilience. A good cyber resilient program means that an organization can detect, manage, and recover from cybersecurity incidents with minimum impact on its business operations. Different types of security tools can be used in a SOC environment to achieve cyber-resilience, including Security Information and Event Management (SIEM) systems.
A linear model for optimal cybersecurity investment in Industry 4.0 supply chains
Published in International Journal of Production Research, 2022
Cybersecurity is often associated with cyber-resilience (Kott and Linkov 2019) since both cybersecurity and cyber-resilience focus on preventing a system (e.g. a supply chain) from degrading after cyberattacks. However, cybersecurity rather aims at reaching a state of security, (i.e. being free from cyberthreats). In contrast, the cyber-resilience refers to the capacity to recover quickly from difficulties after a cyberattack. Thus, cyber-resilience assumes that a system is affected by a cyberattack and speed of its recovery is emphasised. Intuitively, one may expect that improvement of a supply chain cybersecurity may simultaneously lead to improvement of its cyber-resilience, which often does not need to be true. For example, cyber-resilience of a supply chain greatly depends on complexity of links within the supply chain. A typical approach to improve cybersecurity by increasing redundancy may simultaneously lead to greater complexity of the supply chain, which often reduces cyber-resilience of the supply chain.
New challenges in supply chain management: cybersecurity across the supply chain
Published in International Journal of Production Research, 2022
Steven A. Melnyk, Tobias Schoenherr, Cheri Speier-Pero, Chris Peters, Jeff F. Chang, Derek Friday
Cyber resilience is defined as the capacity of a system to recover quickly from the difficulties and problems created by a cyberattack (Sawik 2020). To achieve such a capacity requires investments. Han, Chong, and Li (2020) identified eleven capabilities across three dimensions that comprise cyber resilience (Han, Chong, and Li 2020, 4560–4561): readiness (situation awareness, visibility, security, redundancy), response (agility, collaboration, flexibility, leadership), and recovery (knowledge management, contingency planning, market position). Within the context of this framework, we view cyber resilience as closely aligned to cybersecurity investments, as it can be regarded as a form of risk mitigation.