The Cyber Prep Framework Analysis

Decent Essays
Summary This article describes and examines four cyber security anti-patterns that result in poor security practices and weaknesses in organizations. As cyber-attacks become routine, investigating these themes will benefit from a strong security posture, reduce losses of intellectual property, increase customer confidence, and potential cost avoidance for affected organizations. Accordingly, the “novel contribution of this article is to offer a holistic treatment of security failures, covering the psychological, technical, and organizational aspects of cyber security.” (Julisch, 2013) One of the anti-patterns is an overreliance on intuition and past experience caused when prioritizing security investments and not knowing “the probability of cyber attacks, the effectiveness of existing countermeasures in defending against these attacks, and the impact or cost of attacks.” (Julisch, 2013) So, the trend is to be bias that future threats will not emerge, security breaches will happen to other people, risks will not occur if didn’t transpire in the past, and “confirmation bias” to ignore indicator that goes against their predetermined ideas and thoughts. Although there are no standard approaches to eliminate the bias, collecting comprehensive data should be the first step. Followed by …show more content…
“The Cyber Prep framework defines five levels of organizational preparedness, characterized in terms of (a) the organization’s perspective on, and/or assumptions about, the threat it faces (adversary characteristics and representative threat scenarios), (b) the organization’s overall strategy for addressing the cyber threat, in the context of its ICT infrastructure and business processes, and (c) the organization’s approach to cyber security governance.” (Bodeau, Fabius-Greene, Graubart,

Related Documents

  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Internet Usage The possibility of being attacked by a hacker of any kind is very real. This understanding is why an organization should limit the availability of Internet websites across the board. In doing so this helps mitigate potential threats from malicious software and users from stealing valuable data that belongs to the…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Black Ice Summary

    • 823 Words
    • 4 Pages

    The Nation's critical infrastructure is diverse and complex. It includes distributed networks, varied organizational structures and operating models (including multinational ownership), interdependent functions and systems in both the physical space and cyberspace, and governance constructs that involve multi-level authorities, responsibilities, and regulations. Critical infrastructure owners and operators are uniquely positioned to manage risks to their individual operations and assets, and to determine effective strategies to make them more secure and resilient. All Federal department and agency heads are responsible for the identification, prioritization, assessment, remediation, and security of their respective internal critical infrastructure…

    • 823 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Mr. Todd Finney led his team of Host Based Security System (HBSS) administrators through a successful Command Cyber Readiness Inspection (CCRI). Thanks to Mr. Finney’s superb leadership, guidance, organizational skills, and technical abilities, he was able to take on the challenge of bringing up the overall compliance score of less than 50% to an exceptional score of 85.6%. This score ranked amongst the top 3% in the Army. Mr. Finney’s team addressed HBSS-related security vulnerabilities on over 19,000 workstations and 1,400 servers across the Recruiter Services Network.…

    • 303 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Woodburn Graphics

    • 523 Words
    • 3 Pages

    As a result, the internal technology was secured with antivirus software; however, the MIS and Web server were linked to outside lines without similar software protection. In effect the management team could not justify the cost for greater protection for network security. Within the initial months of the company’s email policy, consequently, three malicious network attacks happened, affecting email, files, servers, and the network itself. These attacks in total cost the company $15,000.…

    • 523 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    DHS Missions

    • 648 Words
    • 3 Pages

    The office secures non military personnel and government PC frameworks, secure data frameworks for basic foundation, and dissect and lessen digital dangers. Encouraging reaction to digital episodes is basic to ensure our frameworks are protected. There are frameworks we use to encourage our destinations. The National Cybersecurity Protection System (NCPS), Continuous Diagnostics and Mitigation (CDM), National Cybersecurity and Communications Reconciliation Center (NCCIC), and the Federal Information Security Management Act (FISMA) Reporting guarantees that we ensure our the internet (Securing and Managing Our Borders…

    • 648 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Having researched cybercrime and technology use among criminal populations for more than a decade, I know that both types of miscreants want to find ways into secure places – computers and networks, and homes and businesses. They have a range of options for how to get in. Software development is not a perfect process, and neither are people. We need to learn to recognize signs of hacks. Take suspicious emails for example; hackers often send…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Cyber deterrence has been thrown out in the public, governmental, and military sectors for the better part of the first half of the decade, stretching into discussions currently in organizations like NATO, and governments worldwide. The theory is simple: “deter someone from doing something out of fear of repercussion or retaliation.” Theory and concept however, are very different premises and conclusions. Everyone in the information warfare area knows that attribution is a slippery slope, and with the quick typing of a few characters on a keyboard, an attacker can choose to be anyone they want to appear to be. Officials pounding any “attribution” on any pulpit, continue to learn nothing, and attackers will continue with their cyber-shenanigans.…

    • 1639 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Introduction Over the last few decades, American Society has rapidly changed due to the prompt development of advanced computer technology. These advancements continue to energize the next generation to push the boundaries of the possible, by challenging the impossible. Throughout the previous decades these boundaries have continued to be extended and defeated, impelling professionals to reanalyze what is truly impossible. However, due to the incredible pace in which these advancements are being achieved, international communities, like America, are left defending against threats and vulnerabilities that are unknown.…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Introduction The reason for the article is to stress the importance of information security to any organization. The problem presently is that many organizations either do not have enough security or they have a lack of interest in the security measures as it pertains to their individual organization. The solution to this is that organizations must ensure they have a proper balance and remain vigilant at all times. This means remaining flexible as well as adaptable to the situation of the day.…

    • 967 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Today's technology is evolving at an unprecedented rate making the use, and misuse, of cyberspace easily accessible to anyone with access to a computer, smartphone, and the internet. Many governments realize how invaluable of an asset the internet is and have integrated it as an integral part of their nation's infrastructure and society. Unfortunately, whether it be by way of an individual person or a national institution, it is not uncommon to have enemies' attempting to exploit weaknesses. Having an accumulated 18 years of service in the military; and seeing first-hand the integration of the internet for military communication and coordination, I have witnessed numerous cyber-attacks on our nation and individuals over the span of my military…

    • 601 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity In America

    • 899 Words
    • 4 Pages

    United States cybersecurity is arguably as important, if not more so, than the US Military. The private sector, civilian businesses and personnel, lost more than $1 trillion in 2008 as a result of cyberattacks. The $4.5 million Predator military drone, had its camera feed hacked by a $26 dollar piece of software widely available on the Internet (Marshall,1). Neither the government nor the private sector is immune to security breaches, but which group is better equipped to protect America’s interests?…

    • 899 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    A prime example of the US responding to existential threats was the creation of the Department Homeland Security (DHS) eleven days after 9/11. DHS was nominated with the monumental task of cybersecurity. In 2008, the Pentagon had one hundred thousand attempted breaches. Criminals take the path of least resistance to make their heists.…

    • 832 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Great Essays

    Cyber Domain Case Study

    • 1692 Words
    • 7 Pages

    Introduction The cyber domain is perhaps the most complex domain to define in modern warfare. Academic literature has secured cyber as both a domain and part of the global common. National laws, policies, and understanding of the cyber domain are just being to mature; thus, the strategy to guide and form the required organizations to support cyber is just being to develop. This paper will consider whether the current national cyber construct is sufficient to address the cyber domains unique geography.…

    • 1692 Words
    • 7 Pages
    Great Essays
  • Great Essays

    When studies on cyber security and cyber attacks combined with the all too real fact that the general public is mal-informed as to their responsibility to become educated in cyber security awareness, a correlation exists (Fiedler, 2016). Being unaware of the serious consequences of the actions of individuals and businesses alike is what cyber security awareness is all about. Furthermore, in line with the disruptive innovation theory, the more advanced the technology, the greater opportunity to protect our businesses and individuals…

    • 2302 Words
    • 10 Pages
    Great Essays