Multidimensional Cybersecurity Framework for Strategic Foresight
- URL: http://arxiv.org/abs/2202.02537v1
- Date: Sat, 5 Feb 2022 12:30:31 GMT
- Title: Multidimensional Cybersecurity Framework for Strategic Foresight
- Authors: Cyril Onwubiko and Karim Ouazzane
- Abstract summary: The rise in National cybersecurity laws and regulations is a good indicator of its perceived importance to nations.
The conceptual cybersecurity framework comprises six domains such as Physical, Cultural, Economic, Social, Political and Cyber.
The guiding principles underpinning the framework are outlined, followed by in-depth reflection on the Business, Operational, Technological and Human (BOTH) factors.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Cybersecurity is now at the forefront of most organisational digital
transformative agendas and National economic, social and political programmes.
Hence its impact to society can no longer be seen to be one dimensional. The
rise in National cybersecurity laws and regulations is a good indicator of its
perceived importance to nations. And the recent awakening for social and
ethical transparency in society and coupled with sustainability issues
demonstrate the need for a paradigm shift in how cybersecurity discourses can
now happen. In response to this shift, a multidimensional cybersecurity
framework for strategic foresight underpinned on situational awareness is
proposed. The conceptual cybersecurity framework comprising six domains such as
Physical, Cultural, Economic, Social, Political and Cyber, is discussed. The
guiding principles underpinning the framework are outlined, followed by
in-depth reflection on the Business, Operational, Technological and Human
(BOTH) factors and their implications for strategic foresight for
cybersecurity.
Related papers
- Navigating the road to automotive cybersecurity compliance [39.79758414095764]
The automotive industry is compelled to adopt robust cybersecurity measures to safeguard both vehicles and data against potential threats.
The future of automotive cybersecurity lies in the continuous development of advanced protective measures and collaborative efforts among all stakeholders.
arXiv Detail & Related papers (2024-06-29T16:07:48Z) - Security in IS and social engineering -- an overview and state of the art [0.6345523830122166]
The digitization of all processes and the opening to IoT devices has fostered the emergence of a new formof crime, i.e. cybercrime.
The maliciousness of such attacks lies in the fact that they turn users into facilitators of cyber-attacks, to the point of being perceived as the weak link'' of cybersecurity.
Knowing how to anticipate, identifying weak signals and outliers, detect early and react quickly to computer crime are therefore priority issues requiring a prevention and cooperation approach.
arXiv Detail & Related papers (2024-06-17T13:25:27Z) - A Value Driven Framework for Cybersecurity Innovation in Transportation & Infrastructure [0.0]
This paper introduces a value-driven cybersecurity innovation framework for the transportation and infrastructure sectors.
We aim to foster a culture of self-innovation within organizations, enabling a strategic focus on cybersecurity measures.
arXiv Detail & Related papers (2024-05-12T18:45:11Z) - SEvenLLM: Benchmarking, Eliciting, and Enhancing Abilities of Large Language Models in Cyber Threat Intelligence [27.550484938124193]
This paper introduces a framework to benchmark, elicit, and improve cybersecurity incident analysis and response abilities.
We create a high-quality bilingual instruction corpus by crawling cybersecurity raw text from cybersecurity websites.
The instruction dataset SEvenLLM-Instruct is used to train cybersecurity LLMs with the multi-task learning objective.
arXiv Detail & Related papers (2024-05-06T13:17:43Z) - Social Environment Design [39.324202132624215]
Social Environment Design is a general framework for the use of AI for automated policy-making.
The framework seeks to capture general economic environments, includes voting on policy objectives, and gives a direction for the systematic analysis of government and economic policy through AI simulation.
arXiv Detail & Related papers (2024-02-21T19:29:14Z) - Edge AI Empowered Physical Layer Security for 6G NTN: Potential Threats and Future Opportunities [33.36351274737824]
This paper provides an overview of the possible risks that the physical layer may encounter in the context of 6G Non-Terrestrial Networks (NTN)
With the objective of showcasing the effectiveness of cutting-edge AI technologies in bolstering physical layer security, this study reviews the most foreseeable design strategies associated with edge AI in the realm of 6G.
The findings of this paper serve as a foundation for future investigations aimed at enhancing the physical layer security of edge servers/devices in the next generation of trustworthy 6G telecommunication networks.
arXiv Detail & Related papers (2023-10-03T07:06:57Z) - Systemization of Knowledge (SoK)- Cross Impact of Transfer Learning in Cybersecurity: Offensive, Defensive and Threat Intelligence Perspectives [25.181087776375914]
This paper presents a comprehensive survey of transfer learning applications in cybersecurity.
The survey highlights the significance of transfer learning in addressing critical issues in cybersecurity.
The paper identifies future research directions and challenges that require community attention.
arXiv Detail & Related papers (2023-09-12T00:26:38Z) - Navigating the complex nexus: cybersecurity in political landscapes [0.0]
This study explores the evolving landscape of cyberattacks, their impact on political stability, and strategies for bolstering digital resilience.
The research illuminates the intricate network of technological vulnerabilities, geopolitical dynamics, and ethical concerns that shape the dynamic evolution of cybersecurity in politics.
arXiv Detail & Related papers (2023-08-15T19:37:37Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Socialbots and the Challenges of Cyberspace Awareness [0.0]
We examine the mechanisms of developing situation awareness in cyberspace and the governance issues that socialbots bring into this existing paradigm of cyber situation awareness.
We conceptualise Cyberspace Awareness as a socio-technical phenomena with Syntactic, Semantic, and Operatic dimensions.
The paper contributes to the ideas of situational awareness in cyberspace, and characterises the challenges therein around tackling the increasingly social and often pervasive, automation in cyber threat environments.
arXiv Detail & Related papers (2023-03-05T08:45:05Z) - The Opportunity to Regulate Cybersecurity in the EU (and the World):
Recommendations for the Cybersecurity Resilience Act [1.2691047660244335]
Safety is becoming cybersecurity under most circumstances.
This should be reflected in the Cybersecurity Resilience Act when it is proposed and agreed upon in the European Union.
It is based on what the cybersecurity research community for long have asked for, and on what constitutes clear hard legal rules instead of soft.
arXiv Detail & Related papers (2022-05-26T07:20:44Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.