Cybersecurity Intelligence: A Novel Information Security Threat Mitigation Approach
cityu.school | School of Technology and Computing | |
cityu.site | Seattle | |
cityu.site.country | United States | |
dc.contributor.author | Offor, Patrick | |
dc.date.accessioned | 2021-03-26T22:38:41Z | |
dc.date.available | 2021-03-26T22:38:41Z | |
dc.date.issued | 2020-11 | |
dc.description.abstract | Despite technology and countermeasure investments worldwide, mandatory training and its repeated iterations in organizations, awareness, and education of the threats posed to critical information systems by trusted insiders globally, the exploits and havocs have continued to increase exponentially, rather than diminish. Trusted insiders have continued to threaten our networks and communication infrastructures, in spite of the availability of more capabilities for identifying the culprits, and the incessant prosecution and conviction of malicious actors. | |
dc.identifier.citation | Offor, P. (2020, November). Cybersecurity intelligence: A novel information security threat mitigation approach. Cybersecurity Skills Journal: Practice and Research, 75-80. | en_US |
dc.identifier.uri | http://hdl.handle.net/20.500.11803/1026 | |
dc.language.iso | en | |
dc.publisher.institution | City University of Seattle (CityU) | |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 United States | |
dc.rights | openAccess | |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | |
dc.subject | cybersecurity | |
dc.subject | cybersecurity intelligence | |
dc.subject | choice theory | |
dc.subject | total behavior | |
dc.subject | cybersecurity education | |
dc.title | Cybersecurity Intelligence: A Novel Information Security Threat Mitigation Approach | |
dc.type | Article |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- OfforArticleCybersecurityIntelligence.pdf
- Size:
- 290.85 KB
- Format:
- Adobe Portable Document Format
- Description:
- Offor, P. (2020, November). Cybersecurity intelligence: A novel information security threat mitigation approach. Cybersecurity Skills Journal: Practice and Research, 75-80.