Despite the increasing evolution of the cyber environment, enterprises seem to find it challenging to identify a solution to create an effective defensive posture. As the cyber phenomenon becomes a fundamental part of our society, it is essential to identify adaptive methods to increase the worldwide defensive condition in the most effective manner possible. A decade ago, it was not possible to imagine today’s cyber-threat landscape. Cybercriminals have adapted their methods to circumvent traditional defenses and hide undetected on systems for months or even years. Therefore, enterprise security also needs to be adapted with an intelligence, multi-layered approach to IT security. This paper surveys the latest research on the foundation of Adaptive Enterprise Security (AEC). To this end, it discusses potential security policies and strategies that are easy to develop, are established, and have a major effect on an enterprises security practices. These policies and strategies can then efficiently be applied to an enterprises cyber policies for the purposes of enhancing security and defense. The study also discusses various adaptive security measures that enterprises can adopt to continue with securing their network and cyber environments. To this end, the paper continues to survey and analyze the effectiveness of some of the latest adaptation techniques deployed to secure these network and cyber environments.
|Title of host publication||Cyber Criminology|
|Publication status||Accepted/In press - 12 Jun 2018|
Montasari, R., Hosseinian-Far, A., Hill, R., & Jahankhani, H. (Ed.) (Accepted/In press). Policies and innovative self-adaptive techniques to counter adversarial attacks in network and cyber environments. In Cyber Criminology Springer.