Continuous Risk Assessment for Large-Scale Cyber Systems

AA Malik - 2023 - search.proquest.com
Cyberspace, with its multiple forms of device integration, is rapidly evolving and introducing
loopholes within the cyber infrastructure, which creates opportunities for attackers. Despite …

Security Issues in Cyber Threat Intelligence Exchange: A Review

M Olaifa, JJ van Vuuren, D Du Plessis… - Science and Information …, 2023 - Springer
The cost and time required by individual organizations to build an effective cyber defence
can become overwhelming with the growing number of cyber attacks. Hence, the …

A Model for Cyber Threat Intelligence for Organisations

ZC Khan, T Mkhwanazi… - … Conference on Artificial …, 2023 - ieeexplore.ieee.org
As cyber attacks are increasing in South Africa, organisations need to strengthen cyber
security controls. Cyber Threat Intelligence is an essential component of a Cybersecurity …

Review of System-Scientific Perspectives for Analysis, Exploitation, and Mitigation of Cognitive Vulnerabilities

L Huang, Q Zhu - Cognitive Security: A System-Scientific Approach, 2023 - Springer
Chapter 3 elaborates on three critical types of human cognitive capabilities to fulfill four
classes of CPS tasks in Fig. 3.2. For all of its advantages, the active presence of human …

Continuous Internal Penetration Testing (CIPT)

M ALHAMMADI - Authorea Preprints, 2023 - techrxiv.org
Continuous Internal Penetration Testing (CIPT) is a proactive cybersecurity practice aimed at
assessing the security posture of an organization's internal network, systems, and …