Publication | Closed Access
From detection to reaction - A holistic approach to cyber defense
11
Citations
6
References
2011
Year
Unknown Venue
Holistic ApproachCybersecurityCyber Defense ContextEngineeringAnti-cyberterrorismInformation SecurityTargeted AttackInformation AssuranceSystems EngineeringInformation ForensicsCyber Threat IntelligenceCyber Defense ProcessComputer ScienceIntelligent SystemsCommunicationCybersecurity SystemCyberattack
The cyber defense context includes various activities that are often investigated and discussed individually. The process from the detection of a threat to its eventual treatment clearly resembles other decision-making paradigms. By aligning the cyber defense process to the well-known OODA loop, in which the activities in one phase of the loop are prerequisites for those in other phases, situational awareness with respect to information assurance can be established.
| Year | Citations | |
|---|---|---|
Page 1
Page 1