首页 | 本学科首页   官方微博 | 高级检索  
     


Business and cyber peace: We need you!
Affiliation:1. Innovation, Cybersecurity Laboratory, Atos Research, Barcelona, Pere IV, 291-307, 08020, Spain;2. Télécom SudParis, Paris-Saclay University, CNRS SAMOVAR UMR 5157, 9 rue Charles Fourier, 91011 EVRY, France;3. Laboratory of Computer Security Problems, St. Petersburg Institute for Informatics and Automation (SPIIRAS), St. Petersburg 14, Liniya, 39, Russia;4. ITMO University, 49 Kronverksky Pr., St. Petersburg 197101 Russia;1. State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China;2. School of Information Science and Engineering, Qufu Normal University, Rizhao, China;3. School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, China;4. Department of Electrical and Computer Engineering, The University of Auckland, Auckland, New Zealand;5. School of Computer and Information Engineering, Hunan University of Commerce, Changsha, China
Abstract:Rarely does a day seem to go by without another front page story about a firm being breached by cyber-attackers. Even experts in the field are far from immune from the unsustainable status quo. For example, Jim Lewis of the Center for Strategic and International Studies has said: “We have a faith-based approach [to cybersecurity], in that we pray every night nothing bad will happen.” This is a difficult starting point to consider an appropriate end game. Still, it is something that firms must do since infinite investment cannot breed infinite security. This article takes lessons from the burgeoning field of cyber peace studies and applies them to private sector cyber risk mitigation strategies. With members of the C-suite on down to mailroom clerks worrying about the next attack and looking over their shoulder after a breach occurs, who wouldn’t welcome some peace of mind?
Keywords:Cybersecurity  Cyber-attack  Due diligence
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号