Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Cyber-Resilience Evaluation Methods Focusing on Response Time to Cyber Infringement
by
Shin, Dongkyoo
, Kwon, Oh-Jin
, Choi, Se-Ho
, Youn, Jaepil
, Lee, Seongkee
, Kim, Kookjin
in
Cybersecurity
/ Cyberterrorism
/ Data integrity
/ Defense
/ Internet of Things
/ Methods
/ Security management
/ Software
/ Sustainability
/ Trends
2023
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Cyber-Resilience Evaluation Methods Focusing on Response Time to Cyber Infringement
by
Shin, Dongkyoo
, Kwon, Oh-Jin
, Choi, Se-Ho
, Youn, Jaepil
, Lee, Seongkee
, Kim, Kookjin
in
Cybersecurity
/ Cyberterrorism
/ Data integrity
/ Defense
/ Internet of Things
/ Methods
/ Security management
/ Software
/ Sustainability
/ Trends
2023
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Cyber-Resilience Evaluation Methods Focusing on Response Time to Cyber Infringement
by
Shin, Dongkyoo
, Kwon, Oh-Jin
, Choi, Se-Ho
, Youn, Jaepil
, Lee, Seongkee
, Kim, Kookjin
in
Cybersecurity
/ Cyberterrorism
/ Data integrity
/ Defense
/ Internet of Things
/ Methods
/ Security management
/ Software
/ Sustainability
/ Trends
2023
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Cyber-Resilience Evaluation Methods Focusing on Response Time to Cyber Infringement
Journal Article
Cyber-Resilience Evaluation Methods Focusing on Response Time to Cyber Infringement
2023
Request Book From Autostore
and Choose the Collection Method
Overview
Though multilevel, in-depth information protection systems are employed to defend against unknown cyber threats, vulnerabilities in these systems are frequently exploited by cyberattacks. As a result, it becomes challenging to comprehensively counter these attacks within a constrained time frame. When a cyberattack is detected, immediate measures are necessary to prevent widespread damage and maintain the system’s regular functioning. Possessing sustainable cyber-resilience capabilities, which can promptly restore the system to its pre-attack state, is crucial. In this paper, a cyber-defense activity optimization procedure is introduced, drawing on the failure recovery time of the information system, aiming to enhance both the response and recovery phases of cyber resilience. Through training, the response time for various types of cyberattack was determined. Notably, a decrease in response time by 17.8% compared to the baseline was observed. By optimizing response times and integrating them with sustainable cyber-resilience assessment activities, a robust framework is presented for evaluating an organization’s overall cyber-defense stance. Research on the cyber combat capability index, dissecting the response time for each distinct cyber-defense activity, is planned for future endeavors.
Publisher
MDPI AG
Subject
This website uses cookies to ensure you get the best experience on our website.