EconPapers    
Economics at your fingertips  
 

Cyber Security: A Peer-Reviewed Journal

2017 - 2025

From Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().

Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.


Volume 5, issue 4, 2022

Editorial pp. 284-285 Downloads
Simon Beckett
The new offensive cyber security: Strategically using asymmetrical tactics to promote information security pp. 286-293 Downloads
Christopher Ott
How to stop attackers from owning your Active Directory pp. 294-302 Downloads
Carolyn Crandall and Tony Cole
The imperative of enterprise-grade security for 5G pp. 303-315 Downloads
Leonid Burakovsky and Danielle Kriz
How a well-thought-out incident response can take the advantage back from attackers pp. 316-323 Downloads
James Christiansen
Focusing on the primary purpose: Protecting the attorney–client privilege and work product doctrine in incident response pp. 324-334 Downloads
Ashley Taylor, Ron Raether, Sadia Mirza, Sam Hatcher and Bonnie Gill
A modern approach to cyber threat protection: The holy grail of cyber security departments? pp. 335-349 Downloads
Dariusz Trocyszyn and Adrian Korczyński
Eliminating the blind spots: How to be accountable for an organisation’s overall security pp. 350-360 Downloads
Lorraine Dryland
A principles-led approach to information assurance and governance in local government pp. 361-377 Downloads
Mark Brett

Volume 5, issue 3, 2022

Editorial pp. 188-189 Downloads
Simon Beckett
Tackling cybercrime and ransomware head-on: Disrupting criminal networks and protecting organisations pp. 190-205 Downloads
Marja Laitinen and Sarah Armstrong-Smith
Paradigm of cyber security transformation in Lithuanian Railways during a pandemic pp. 206-215 Downloads
Antanas Kedys, Žaneta Navickienė and Rolandas Šlepetys
Application security automation in development pp. 216-226 Downloads
Mike Kennedy, Chris Perkins, Maria Brown and Kori Prins
Achieving least privilege at cloud scale with cloud infrastructure entitlements management pp. 227-236 Downloads
Maya Neelakandhan, Guruprasad Ramprakash and Mrudula Gaidhani
Enabling cyber incident collaboration in UK local government through fast-time communication pp. 237-250 Downloads
Mark Brett
How national CSIRTs leverage public data, OSINT and free tools in operational practices: An empirical study pp. 251-276 Downloads
Sharifah Roziah Binti Mohd Kassim, Shujun Li and Budi Arief

Volume 5, issue 2, 2021

Editorial pp. 100-101 Downloads
Simon Beckett
Digital contact tracing: Privacy versus efficiency pp. 102-112 Downloads
Ieva Ilves
Improving threat detection with a detection development life cycle pp. 113-125 Downloads
Augusto Barros
Maturing operational security with an automation-first approach to IAM pp. 126-134 Downloads
Bryan Christ
Optimising cyber threat intelligence for your organisation pp. 135-141 Downloads
Christina Girtz
Cyber security and data protection: Learning from your own mistakes is good, learning from somebody else’s mistakes is better — the reasons underpinning fines and what regulators expect of cyber security pp. 142-154 Downloads
Peter Craddock and Eline Van Bogget
The high-performing low-risk mainframe: Reassess security in the context of changing operations to extinguish risk before it bursts out of control pp. 155-163 Downloads
Mary Ann Furno
Security and safety incidents and standards pp. 164-176 Downloads
Robert Kemp and Richard Smith

Volume 5, issue 1, 2021

Call for papers pp. 4-5 Downloads
Simon Beckett
The human variable: Designing a security strategy for a future in flux pp. 6-12 Downloads
Gary Sorrentino
Staying one step ahead of your adversaries: How to build a cyber threat intelligence team capable of delivering business value pp. 13-26 Downloads
Keith Nicholson
Discovering CovidLock pp. 27-36 Downloads
Chad Anderson, Tarik Saleh and Sean M. Mcnee
Scaling cyber physical systems throughout the organisation pp. 37-50 Downloads
Matt Leipnik
Is ransomware winning? pp. 51-65 Downloads
Chris Goettl
Home-grown machine learning implementation for a SIRT: A use case — detecting domain-generating algorithms pp. 66-79 Downloads
Brennan Lodge
Zero trust computing through the application of information asset registers pp. 80-94 Downloads
Mark Brett

Volume 4, issue 4, 2021

Editorial pp. 300-301 Downloads
Simon Beckett
A framework for quantifying cyber security risks pp. 302-316 Downloads
Reinder Wolthuis, Frank Phillipson, Hidde-Jan Jongsma and Peter Langenkamp
Open sesame: Lessons in password-based user authentication pp. 317-329 Downloads
Bahman Rashidi and Vaibhav Garg
An overview of current issues and practice relating to local government cyber security in England and Wales pp. 330-344 Downloads
Mark Brett
Cyber security for microreactors in advanced energy systems pp. 345-367 Downloads
Piyush Sabharwall, James Gibb, Christopher Ritter, Kathleen Araújo, Abhinav Gupta, Ian Ferguson, Bri Rolston, Ron Fisher, Jess Gehin and Youssef Ballout
The laws governing data breaches: An update pp. 368-379 Downloads
Behnam Dayanim and Roya Butler
Managing stakeholder communication during a cyber crisis pp. 380-387 Downloads
Caroline Sapriel

Volume 4, issue 3, 2021

Editorial pp. 200-201 Downloads
Simon Beckett
Risk is a result of human behaviour: Leveraging behavioural analytics to strengthen internal controls pp. 202-212 Downloads
Arvind Mehta
Insider threat programmes: Time to hit restart pp. 213-222 Downloads
Jadee Hanson, Todd Thorsen and Nathan Hunstad
The human problem behind credential theft and reuse pp. 223-231 Downloads
Erich Kron
Know your suppliers: A review of ICT supply chain risk management efforts by the US government and its agencies pp. 232-242 Downloads
Olatunji Osunji
International principles for boards of directors and cyber security pp. 243-250 Downloads
Larry Clinton
Cyber security for smart cities: End-to-end cyber security strategy for IoT connected services pp. 251-266 Downloads
Moh Cissé
Identifying cyber security risks in Spanish airports pp. 267-291 Downloads
Lázaro Florido-Benítez

Volume 4, issue 2, 2020

Editorial pp. 100-101 Downloads
Simon Beckett
The industrial Internet of Things: From preventive to reactive systems — redefining your cyber security game plan for the changing world pp. 102-110 Downloads
Lesley Kipling
The complexity of performing cyber audits in the space sector along the supply chain pp. 111-121 Downloads
Jose Ramon Coz Fernandez and Vicente José Pastor Pérez
Cheetahs, COVID-19 and the demand for crypto-agility pp. 122-134 Downloads
Michael Thelander
Cyber leadership across a business ecosystem pp. 135-144 Downloads
Matthew Doan
A framework for fostering a dynamic information security culture pp. 145-159 Downloads
Renay Carver
Vulnerabilities on the wire: Mitigations for insecure ICS device communication pp. 160-181 Downloads
Michael Hoffman
The landscape from above: Continuous cloud monitoring for continuous assurance pp. 182-193 Downloads
Fouad Khalil

Volume 4, issue 1, 2020

Editorial pp. 4-5 Downloads
Simon Beckett
Taking risk to the edge of acceptable pp. 6-13 Downloads
Steve Williamson
Consider the consequences: Understanding and limiting physical impacts caused by an ICS cyberattack pp. 14-28 Downloads
Richard Wyman
Effectively integrating physical security technology into the operational technology domain pp. 29-39 Downloads
Matthew Wharton
Users are an intelligence source: Are you leveraging them in your detection strategy? pp. 40-47 Downloads
Tonia Dudley
Think like a hacker: Reducing cyber security risk by improving API design and protection pp. 48-57 Downloads
Gerhard Giese
The challenge of assessing strategic cyber security risk in organisations and critical infrastructure pp. 58-69 Downloads
Charles Harry
What the market is not telling you about the cyber security skills shortage pp. 70-76 Downloads
Karla Reffold
Non-traditional cyber adversaries: Combatting human trafficking through data science pp. 77-90 Downloads
Danielle Borrelli and Sherrie Caltagirone
Page updated 2026-01-02