Beyond Traditional Security: A Defense Analysis of Modern Cyber Threats
Abstract
As technology evolves, cyber security has become paramount for organizations to meet the needs of all stakeholders. Building both resilience and trust is crucial in protecting against online threats like hacking and identity theft. Security analysts play a critical role in identifying and mitigating cyber threats by analyzing vast amounts of data, including intrusion alerts and network logs. Situation awareness (SA) is essential for developing proactive defense strategies that can disrupt attackers' attempts to penetrate information systems and cause significant harm to organizations.
References
2. D. Geer Jr., K. S. Hoo, A. Jaquith, “Information security: Why the future belongs to the quants,” IEEE Security & Privacy, 2003.
3. C. Sutton, A. McCallum, “Piecewise Training for Structured Prediction,” Machine Learning To appear.
4. Alperovitch, Dmitri. (2011). Revealed: Operation Shady Rat. [White Paper]. Retrieved from: http://www.mcafee.com/us/resources/white- papers/wp-operation-shady-rat.pdf
5. Department of Defense. (2011). Department of Defense Strategy for Operating in Cyberspace. Retrieved from: http://www.defense.gov/news/d20110714cyber.pdf
6. McNeese, M., Cooke, N.J., Champion, M.A. (2011) Situating Cyber Situation Awareness. Proceedings of the 10th International Conference on Naturalistic Decision Making.
7. Zetter, K. (2011b) ‘FBI vs. Core flood Botnet: Round 1 Goes to the Feds,’ Wired, April
8. 26 http://www.wired.com/threatlevel/2011/04/coreflood_results/ (accessed November 27, 2012).
9. McGraw, G. (2013) ‘” Active Defense” is Irresponsible,’ Digital blog, February 14. http://www.cigital.com/justice-league-blog/2013/02/14/active-defense-is-irresponsible/ (accessed October 8, 2013).
10. https://www.accenture.com/us-en/services/security/cyber-defense
11. https://en.wikipedia.org/wiki/Proactive_cyber_defense