2018
DOI: 10.1111/rmir.12109
|View full text |Cite
|
Sign up to set email alerts
|

Integrating a Proactive Technique Into a Holistic Cyber Risk Management Approach

Abstract: Cyber threats are an emerging risk posing a range of challenges to organizations of all sizes. Corporate risk managers need to understand that cyber risk management must not be a silo in the IT department. Cyber threats are the result of intelligent adaptive agents that cannot be managed by traditional risk management techniques only. The article describes the honeypot concept, which is a proactive measure for identifying and gathering information about attackers in order to develop suitable and effective coun… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 32 publications
0
8
0
Order By: Relevance
“…In a continuously changing race with attackers always a step ahead of defenders, scholars recently call for a more proactive risk identification approach. For example, Marotta and McShane (2018) review the honeypot concept of actively attracting cyber attackers with decoy systems for the sole the purpose of understanding and identifying new types of attacks before they become widespread.…”
Section: Literature Review: By Steps Of the Risk Management Processmentioning
confidence: 99%
See 2 more Smart Citations
“…In a continuously changing race with attackers always a step ahead of defenders, scholars recently call for a more proactive risk identification approach. For example, Marotta and McShane (2018) review the honeypot concept of actively attracting cyber attackers with decoy systems for the sole the purpose of understanding and identifying new types of attacks before they become widespread.…”
Section: Literature Review: By Steps Of the Risk Management Processmentioning
confidence: 99%
“…A cyber risk management process applies both risk mitigation and risk transfer techniques to reduce residual risk to acceptable levels (Gordon et al, 2003; Marotta & McShane, 2018; Siegel et al, 2002). Siegel et al (2002) and Gordon et al (2003) propose a cyber risk management framework that goes beyond technical risk mitigation to add risk transfer.…”
Section: Cyber Risk Management: Origins and Historical Developmentmentioning
confidence: 99%
See 1 more Smart Citation
“…Analysis of root cause post detection was in important aspect in this study. [23] integration of honeypot with cyber risk management process of FEMA mission where five preparedness (Federal emergency management agency) [24] was also studied subsequently. Extended next level research was also conducted in 2019 which was improved version in the study of "A Generic Digital Forensic Readiness Model for BYOD using Honeypot Technology [23]".…”
Section: ) Deception Technologymentioning
confidence: 99%
“…Although the risks to firms from cyberattacks appear to be substantial, the actual impacts need to be further researched beyond technical journals. More recently, articles providing an overview to motivate RMI researchers to investigate cyber risk management and insurance were published (Biener et al 2015; The Geneva Association 2016; Eling and Loperfido 2017;Eling 2018;Marotta and McShane 2018). In 2018, a special issue on cyber risk management and insurance was published in The Geneva Papers on In the wake of recent cyber-related incidents, RMI academic journals are leading the way to stimulate business and economics research to understand and manage cyber risk.…”
Section: Introductionmentioning
confidence: 99%