Cyber security strategy implementation architecture in a value system

0Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this chapter, we introduce an approach toward enhancing the quality of strategy implementation. As a framework, we use cybersecurity strategy implementation planning and execution. Justification for this work is the observed need to be able to perform strategy readjustment processes quickly and in an agile way, when needed. This requires processes and practices that are simple enough and executable with small resources in a relatively short timeframe. The problem statement can be formulated as follows: “We need to determine an utterly simplified, noncomplicated model to help us to tackle the complex problem of implementing a cybersecurity strategy of adequate efficiency in a changing operating environment.” We will construct an information structure architecture model to support the strategy implementation process. The purpose is to provide a platform to take account of the relevant selection of various functions and their junctions to evaluate the balance of strategy implementation compared to the defined operating environment.

Cite

CITATION STYLE

APA

Kuusisto, R., & Kuusisto, T. (2018). Cyber security strategy implementation architecture in a value system. In Intelligent Systems, Control and Automation: Science and Engineering (Vol. 93, pp. 49–62). Springer Netherlands. https://doi.org/10.1007/978-3-319-75307-2_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free