메뉴 건너뛰기




Volumn 25, Issue 2, 2014, Pages 357-370

Information security strategies: Towards an organizational multi-strategy perspective

Author keywords

Compartmentalization; Deception; Defense in depth; Deterrence; Information security strategy; Prevention

Indexed keywords

RESEARCH;

EID: 84896400561     PISSN: 09565515     EISSN: 15728145     Source Type: Journal    
DOI: 10.1007/s10845-012-0683-0     Document Type: Article
Times cited : (93)

References (121)
  • 1
    • 84928457660 scopus 로고
    • Offensive versus defensive: Military strategy and alternative defence
    • 10.1177/002234338702400107
    • Agrell W. (1987) Offensive versus defensive: Military strategy and alternative defence. Journal of Peace Research 24(1): 75-85
    • (1987) Journal of Peace Research , vol.24 , Issue.1 , pp. 75-85
    • Agrell, W.1
  • 3
    • 44849144759 scopus 로고    scopus 로고
    • Enterprise information security strategies
    • 10.1016/j.cose.2008.03.002
    • Anderson E. E., Choobineha J. (2008) Enterprise information security strategies. Computers Security 27: 22-29
    • (2008) Computers Security , vol.27 , pp. 22-29
    • Anderson, E.E.1    Choobineha, J.2
  • 5
    • 84896401848 scopus 로고    scopus 로고
    • An exploration of cyberspace security RD investment strategies for DARPA: The day after. in cyberspace
    • Anderson, R. H.; Hearn, A. C. (1996). An exploration of cyberspace security RD investment strategies for DARPA: 'The day after. in cyberspace'. RAND.
    • (1996) RAND
    • Anderson, R.H.1    Hearn, A.C.2
  • 6
    • 32444441216 scopus 로고    scopus 로고
    • Why attacking systems is a good idea
    • 10.1109/MSP.2004.46
    • Arce I., McGraw G. (2004) Why attacking systems is a good idea. IEEE Security Privacy 2(4): 17-19
    • (2004) IEEE Security Privacy , vol.2 , Issue.4 , pp. 17-19
    • Arce, I.1    McGraw, G.2
  • 7
    • 2142808457 scopus 로고    scopus 로고
    • Autonomic defense: Thwarting automated attacks via real-time feedback control
    • 10.1002/cplx.20011
    • Armstrong D., Carter S., Frazier G., Frazier T. (2004) Autonomic defense: Thwarting automated attacks via real-time feedback control. Complexity 9(2): 41-48
    • (2004) Complexity , vol.9 , Issue.2 , pp. 41-48
    • Armstrong, D.1    Carter, S.2    Frazier, G.3    Frazier, T.4
  • 8
    • 33745009333 scopus 로고    scopus 로고
    • A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks
    • DOI 10.1016/j.cose.2006.02.009, PII S0167404806000587
    • Artail H., Safa H., Sraj M., Kuwatly I., Al-Masri Z. (2006) A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks. Computers & Security 25: 274-288 (Pubitemid 43866957)
    • (2006) Computers and Security , vol.25 , Issue.4 , pp. 274-288
    • Artail, H.1    Safa, H.2    Sraj, M.3    Kuwatly, I.4    Al-Masri, Z.5
  • 10
    • 33847144115 scopus 로고    scopus 로고
    • Paranoid penguin: Designing and using DMZ networks to protect internet servers
    • Bauer, M. (2001). Paranoid penguin: Designing and using DMZ networks to protect internet servers. Linux Journal, 2001(83es), 16.
    • (2001) Linux Journal , vol.2001 , Issue.83 , pp. 16
    • Bauer, M.1
  • 12
    • 79955893510 scopus 로고    scopus 로고
    • Master's Thesis, Ohio: Air Force Institute of Technology, Air University
    • Beauregard, J. E. (2001). Modeling information assurance. Master's Thesis, Ohio: Air Force Institute of Technology, Air University.
    • (2001) Modeling Information Assurance
    • Beauregard, J.E.1
  • 17
    • 84976784123 scopus 로고
    • Computer security: A survey
    • 10.1145/1017536.1017537
    • Browne P. S. (1972) Computer security: A survey. ACM SIGMIS Database 4(3): 1-12
    • (1972) ACM SIGMIS Database , vol.4 , Issue.3 , pp. 1-12
    • Browne, P.S.1
  • 18
    • 0037244529 scopus 로고    scopus 로고
    • Reducing internet-based intrusions: Effective security patch management
    • Brykczynski, B.; Small, R. A. (2003). Reducing internet-based intrusions: Effective security patch management. IEEE Software, 20(1), 50-57.
    • (2003) IEEE Software , vol.20 , Issue.1 , pp. 50-57
    • Brykczynski, B.1    Small, R.A.2
  • 21
    • 33748563632 scopus 로고    scopus 로고
    • Application firewalls in a defence-in-depth design
    • DOI 10.1016/S1353-4858(06)70422-6, PII S1353485806704226
    • Byrne P. (2006) Application firewalls in a defence-in-depth design. Network Security 9: 9-11 (Pubitemid 44363050)
    • (2006) Network Security , vol.2006 , Issue.9 , pp. 9-11
    • Byrne, P.1
  • 23
    • 35048868488 scopus 로고    scopus 로고
    • Computer-based training for deception detection: What users want?
    • LNCS 3073
    • Cao, J., Lin, M., Deokar, A., Burgoon, J. K., Crews, J. M.; Adkins, M. (2004). Computer-based training for deception detection: What users want? ISI 2004, LNCS 3073 (pp. 163-175).
    • (2004) ISI 2004 , pp. 163-175
    • Cao, J.1    Lin, M.2    Deokar, A.3    Burgoon, J.K.4    Crews, J.M.5    Adkins, M.6
  • 25
    • 0036871268 scopus 로고    scopus 로고
    • Internet infrastructure security: A taxonomy
    • 10.1109/MNET.2002.1081761
    • Chakrabarti A., Manimaran G. (2002) Internet infrastructure security: A taxonomy. IEEE Network 16(6): 13-21
    • (2002) IEEE Network , vol.16 , Issue.6 , pp. 13-21
    • Chakrabarti, A.1    Manimaran, G.2
  • 26
    • 0031644299 scopus 로고    scopus 로고
    • A note on the role of deception in information protection
    • Cohen F. (1998) A note on the role of deception in information protection. Computers and Security 17(6): 483-506 (Pubitemid 128396180)
    • (1998) Computers and Security , vol.17 , Issue.6 , pp. 483-506
    • Cohen, F.1
  • 29
    • 67649551429 scopus 로고    scopus 로고
    • User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
    • 10.1287/isre.1070.0160
    • D'Arcy J., Hovav A., Galletta D. F. (2009) User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research 20(1): 79-98
    • (2009) Information Systems Research , vol.20 , Issue.1 , pp. 79-98
    • D'Arcy, J.1    Hovav, A.2    Galletta, D.F.3
  • 30
    • 74449092722 scopus 로고    scopus 로고
    • A framework and assessment instrument for information security culture
    • 10.1016/j.cose.2009.09.002
    • Da Veiga A., Eloff J. H. P. (2010) A framework and assessment instrument for information security culture. Computers and Security 29(2): 196-207
    • (2010) Computers and Security , vol.29 , Issue.2 , pp. 196-207
    • Da Veiga, A.1    Eloff, J.H.P.2
  • 31
    • 34247337085 scopus 로고    scopus 로고
    • Immuno-inspired autonomic system for cyber defense
    • University of Memphis
    • Dasgupta, D. (2004). Immuno-inspired autonomic system for cyber defense. Computer science technical report. University of Memphis.
    • (2004) Computer Science Technical Report
    • Dasgupta, D.1
  • 39
    • 10944259927 scopus 로고    scopus 로고
    • Risk-based systems security engineering: Stopping attacks with intention
    • DOI 10.1109/MSP.2004.109
    • Evans S., Kyle D. H., Piorkowski J., Wallner J. (2004) Risk-based systems security engineering: Stopping attacks with intention. IEEE Security Privacy 2(6): 59-62 (Pubitemid 40010911)
    • (2004) IEEE Security and Privacy , vol.2 , Issue.6 , pp. 59-62
    • Evans, S.1    Heinbuch, D.2    Kyle, E.3    Plokkowski, J.4    Wallner, J.5
  • 41
  • 43
    • 84896395369 scopus 로고    scopus 로고
    • Testing various modes of computer-based training for deception detection
    • LNCS 3073
    • George, J. F., Biros, D. P.; Adkins, M. (2004). Testing various modes of computer-based training for deception detection. In Paper presented at the ISI 2004, LNCS 3073.
    • (2004) Paper Presented at the ISI 2004
    • George, J.F.1    Biros, D.P.2    Adkins, M.3
  • 50
    • 84917304630 scopus 로고
    • The forgotten dimensions of strategy
    • 10.2307/20040266
    • Howard M. (1979) The forgotten dimensions of strategy. Foreign Affairs 57(5): 975-986
    • (1979) Foreign Affairs , vol.57 , Issue.5 , pp. 975-986
    • Howard, M.1
  • 51
    • 79959944364 scopus 로고    scopus 로고
    • Does deterrence work in reducing information securiuty policy abuse by employees
    • 10.1145/1953122.1953142
    • Hu Q., Xu Z., Dinev T., Ling H. (2011) Does deterrence work in reducing information securiuty policy abuse by employees. Communications of the ACM 54(6): 54-60
    • (2011) Communications of the ACM , vol.54 , Issue.6 , pp. 54-60
    • Hu, Q.1    Xu, Z.2    Dinev, T.3    Ling, H.4
  • 53
    • 0038009197 scopus 로고    scopus 로고
    • Defence in depth - Protecting the queen
    • DOI 10.1016/S1353-4858(03)00612-3, PII S1353485803006123
    • Hunter P. (2003) Defence in depth - protecting the queen. Network Security 6: 17-18 (Pubitemid 36721889)
    • (2003) Network Security , vol.2003 , Issue.6 , pp. 17-18
    • Hunter, P.1
  • 54
    • 0033474253 scopus 로고    scopus 로고
    • Deterrence and international conflict: Empirical findings and theoretical debate
    • 10.1146/annurev.polisci.2.1.25
    • Huth P. K. (1999) Deterrence and international conflict: Empirical findings and theoretical debate. Annual Review of Political Science 2: 25-48
    • (1999) Annual Review of Political Science , vol.2 , pp. 25-48
    • Huth, P.K.1
  • 56
    • 84896401830 scopus 로고    scopus 로고
    • JCS. (1996). Joint publication 3-58: Joint doctrine for military deception
    • JCS. (1996). Joint publication 3-58: Joint doctrine for military deception.
  • 57
    • 84896394098 scopus 로고    scopus 로고
    • JCS. (1998). Joint publication 3-13: Joint doctrine for information operations
    • JCS. (1998). Joint publication 3-13: Joint doctrine for information operations.
  • 58
    • 84857888636 scopus 로고    scopus 로고
    • Overview of DoD defense in depth strategy
    • 4 January edn. SANS Institute
    • Jones, B. (2005). Overview of DoD defense in depth strategy. Global information assurance certification paper, 4 January edn. SANS Institute.
    • (2005) Global Information Assurance Certification Paper
    • Jones, B.1
  • 61
    • 84971585775 scopus 로고
    • Qualitative research: Introducing focus groups
    • 10.1136/bmj.311.7000.299
    • Kitzinger J. (1995) Qualitative research: Introducing focus groups. British Medical Journal 311: 299-302
    • (1995) British Medical Journal , vol.311 , pp. 299-302
    • Kitzinger, J.1
  • 65
    • 17544394392 scopus 로고    scopus 로고
    • Computer security in the real world
    • 10.1109/MC.2004.17
    • Lampson B. W. (2004) Computer security in the real world. Computer 37(6): 37-46
    • (2004) Computer , vol.37 , Issue.6 , pp. 37-46
    • Lampson, B.W.1
  • 69
    • 16644384919 scopus 로고    scopus 로고
    • Incentive-based modeling and inference of attacker intent, objectives, and strategies
    • DOI 10.1145/1053283.1053288
    • Liu P., Zang W., Yu M. (2005) Incentive-based modeling and inference of attacker intent, objectives, and strategies. ACM Transactions on Information and System Security 8(1): 78-118 (Pubitemid 40479430)
    • (2005) ACM Transactions on Information and System Security , vol.8 , Issue.1 , pp. 78-118
    • Liu, P.1    Zang, W.2    Yu, M.3
  • 70
    • 0035445905 scopus 로고    scopus 로고
    • A practical approach to enterprise IT security
    • DOI 10.1109/6294.952979
    • Liu S., Sullivan J., Ormaner J. (2001) A practical approach to enterprise IT security. IEEE IT Professional 3(5): 35-42 (Pubitemid 32922911)
    • (2001) IT Professional , vol.3 , Issue.5 , pp. 35-42
    • Liu, S.1    Sullivan, J.2    Ormaner, J.3
  • 72
    • 84896390976 scopus 로고    scopus 로고
    • SANS Institute InfoSec Reading Room, SANS Institute
    • McGuiness, T. (2001). Defense in depth. SANS Institute InfoSec Reading Room, SANS Institute.
    • (2001) Defense in Depth
    • McGuiness, T.1
  • 73
    • 0034270431 scopus 로고    scopus 로고
    • Defending yourself: The role of intrusion detection systems
    • 10.1109/52.877859
    • McHugh J., Christie A., Allen J. (2000) Defending yourself: The role of intrusion detection systems. IEEE Software 17(5): 42-51
    • (2000) IEEE Software , vol.17 , Issue.5 , pp. 42-51
    • McHugh, J.1    Christie, A.2    Allen, J.3
  • 77
    • 10444243686 scopus 로고    scopus 로고
    • Learning attack strategies from intrusion alerts
    • Washington, October
    • Ning, P.; Xu, D. (2003). Learning attack strategies from intrusion alerts. In Paper presented at the ACM CCS'3, Washington, October.
    • (2003) Paper Presented at the ACM CCS'3
    • Ning, P.1    Xu, D.2
  • 84
    • 79960251487 scopus 로고    scopus 로고
    • A defense-in-depth security architecture strategy inspired by antiquity
    • Price, S. M. (2010). A defense-in-depth security architecture strategy inspired by antiquity. ISSA Journal, 8(3), 10-16
    • (2010) ISSA Journal , vol.8 , Issue.3 , pp. 10-16
    • Price, S.M.1
  • 85
    • 24344436427 scopus 로고    scopus 로고
    • Toward an automated attack model for red teams
    • DOI 10.1109/MSP.2005.111
    • Ray H. T., Vemuri R., Kantubhukta H. R. (2005) Toward an automated attack model for red teams. IEEE Security Privacy 3(4): 18-25 (Pubitemid 41259868)
    • (2005) IEEE Security and Privacy , vol.3 , Issue.4 , pp. 18-25
    • Ray, H.T.1    Vemuri, R.2    Kantubhukta, H.R.3
  • 87
    • 84896395424 scopus 로고    scopus 로고
    • Computer security incidents agaist Australian businesses: Predictors of victimisation
    • Richards K., Davis B. (2010) Computer security incidents agaist Australian businesses: Predictors of victimisation. Trends Issues in Crime and Criminal Justice 399: 1-6
    • (2010) Trends Issues in Crime and Criminal Justice , vol.399 , pp. 1-6
    • Richards, K.1    Davis, B.2
  • 89
    • 42649108774 scopus 로고    scopus 로고
    • Situation awareness mechanisms for wireless sensor networks
    • DOI 10.1109/MCOM.2008.4481348
    • Roman R., Lopez J., Gritzalis S. (2008) Situation awareness mechanisms for wireless sensor networks. IEEE Communications Magazine 46(4): 102-107 (Pubitemid 351593415)
    • (2008) IEEE Communications Magazine , vol.46 , Issue.4 , pp. 102-107
    • Roman, R.1    Lopez, J.2    Gritzalis, S.3
  • 93
    • 70449122071 scopus 로고    scopus 로고
    • Defending cyberspace with fake honeypots
    • 10.4304/jcp.2.2.25-36
    • Rowe N. C., Custy E. J., Duong B. T. (2007) Defending cyberspace with fake honeypots. Journal of Computers 2(2): 22-36
    • (2007) Journal of Computers , vol.2 , Issue.2 , pp. 22-36
    • Rowe, N.C.1    Custy, E.J.2    Duong, B.T.3
  • 95
    • 33144481697 scopus 로고    scopus 로고
    • Learning from information security history
    • DOI 10.1109/MSP.2006.17
    • Ruiu D. (2006) Learning from information security history. IEEE Security Privacy 4(1): 77-79 (Pubitemid 43269818)
    • (2006) IEEE Security and Privacy , vol.4 , Issue.1 , pp. 77-79
    • Ruiu, D.1
  • 98
    • 4243100593 scopus 로고    scopus 로고
    • Cyber defense: Art to science
    • 10.1145/971617.971645
    • Saydjari O. S. (2004) Cyber defense: Art to science. Communications of the ACM 47(3): 53-57
    • (2004) Communications of the ACM , vol.47 , Issue.3 , pp. 53-57
    • Saydjari, O.S.1
  • 101
    • 84896393961 scopus 로고    scopus 로고
    • Defense in depth: The lessons from Troy and the Maginot line applied
    • SANS Institute
    • Sharlun, G. (2002). Defense in depth: The lessons from Troy and the Maginot line applied. Global information assurance certification paper. SANS Institute.
    • (2002) Global Information Assurance Certification Paper
    • Sharlun, G.1
  • 104
    • 77957068563 scopus 로고    scopus 로고
    • Neutralization: New insights into the problem of employee information systems security policy vilations
    • Siponen M., Vance A. (2010) Neutralization: New insights into the problem of employee information systems security policy vilations. MIS Quarterly 34(3): 487-502
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 487-502
    • Siponen, M.1    Vance, A.2
  • 106
    • 84896388663 scopus 로고    scopus 로고
    • Six strategies for defense-in-depth: Securing the network from the inside out
    • Snyder, J. (2006). Six strategies for defense-in-depth: Securing the network from the inside out. Joel Snyder's Blog, Vol. 2011.
    • (2006) Joel Snyder's Blog , vol.2011
    • Snyder, J.1
  • 107
    • 3042683635 scopus 로고    scopus 로고
    • Worm and attack early warning: Piercing stealthy reconnaissance
    • 10.1109/MSP.2004.28
    • Stolfo S. J. (2004) Worm and attack early warning: Piercing stealthy reconnaissance. IEEE Security Privacy 2(3): 73-75
    • (2004) IEEE Security Privacy , vol.2 , Issue.3 , pp. 73-75
    • Stolfo, S.J.1
  • 108
    • 0000280419 scopus 로고
    • Effective is security: An empirical study
    • 10.1287/isre.1.3.255
    • Straub D. W. (1990) Effective is security: An empirical study. Information Systems Research 1(3): 255-276
    • (1990) Information Systems Research , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.W.1
  • 109
    • 0002699431 scopus 로고
    • Discovering and disciplining computer abuse in organizations: A field study
    • 10.2307/249307
    • Straub D. W., Nance W. D. (1990) Discovering and disciplining computer abuse in organizations: A field study. MIS Quarterly 14(1): 45-62
    • (1990) MIS Quarterly , vol.14 , Issue.1 , pp. 45-62
    • Straub, D.W.1    Nance, W.D.2
  • 110
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • 10.2307/249551
    • Straub D. W., Welke R. J. (1998) Coping with systems risk: Security planning models for management decision making. MIS Quarterly 22(4): 441-469
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2
  • 111
    • 2342563769 scopus 로고    scopus 로고
    • Considering defense in depth for software applications
    • 10.1109/MSECP.2004.1264860
    • Stytz M. R. (2004) Considering defense in depth for software applications. IEEE Security Privacy 2(1): 72-75
    • (2004) IEEE Security Privacy , vol.2 , Issue.1 , pp. 72-75
    • Stytz, M.R.1
  • 112
    • 79960838421 scopus 로고    scopus 로고
    • Masquerade mimicry attack detection: A randomised approach
    • 10.1016/j.cose.2011.05.004
    • Tapiador J. E., Clark J. A. (2011) Masquerade mimicry attack detection: A randomised approach. Computers and Security 30(5): 297-310
    • (2011) Computers and Security , vol.30 , Issue.5 , pp. 297-310
    • Tapiador, J.E.1    Clark, J.A.2
  • 119
    • 2142714171 scopus 로고    scopus 로고
    • Resilient infrastructure for network security
    • 10.1002/cplx.20005
    • Williamson M. M. (2004) Resilient infrastructure for network security. Complexity 9(2): 34-40
    • (2004) Complexity , vol.9 , Issue.2 , pp. 34-40
    • Williamson, M.M.1
  • 121
    • 3543146378 scopus 로고    scopus 로고
    • Firewall technologies
    • DOI 10.1109/45.985324
    • Zalenski R. (2002) Firewall technologies. IEEE Potentials 21((1): 24-29 (Pubitemid 44208135)
    • (2002) IEEE Potentials , vol.21 , Issue.1 , pp. 24-29
    • Zalenski, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.