Economics at your fingertips  

A Framework for Cybersecurity Strategy Formation

Jim Q. Chen
Additional contact information
Jim Q. Chen: DoD National Defense University, Washington, DC, USA

International Journal of Cyber Warfare and Terrorism (IJCWT), 2014, vol. 4, issue 3, 1-10

Abstract: A good cybersecurity strategy consists of the most effective and the most optimal course of actions available at the moment of operation in order to ensure the success of a cyber operation. How to form such a strategy is always a challenge. The current literature does not have much discussion about this topic. This paper intends to explore this process, which supports decision-makers in the cyber domain. It applies the Cybersecurity Formation Framework proposed in Chen and Duvall (2014), and shows how it can integrate varied actions into a systematic and consolidated course of actions to guarantee the success in a mission. This paper also suggests areas for future studies.

Date: 2014
References: Add references at CitEc
Citations: Track citations by RSS feed

Downloads: (external link) ... 018/ijcwt.2014070101 (application/pdf)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link:

Access Statistics for this article

More articles in International Journal of Cyber Warfare and Terrorism (IJCWT) from IGI Global
Bibliographic data for series maintained by Journal Editor ().

Page updated 2019-11-24
Handle: RePEc:igg:jcwt00:v:4:y:2014:i:3:p:1-10