Enhancing Cyber Security: The Role of  Networking, Coordination, and Trusted Information Sharing in Organizational Resilience

Authors

  • Duncan Nyale School of Computing & Mathematics, The Cooperative University of Kenya, Nairobi, Kenya
  • Charles Katila School of Computing & Mathematics, The Cooperative University of Kenya, Nairobi, Kenya

DOI:

https://doi.org/10.24203/0zwra472

Keywords:

Cybersecurity, Networking, Coordination, Information Sharing, Security Measures, Security Posture, Incident Response, Threat Intelligence, Network Segmentation, Access Control, Insider Threats, Information Overload, Standardization, Collaboration Defence, Competing Priorities, Trust Relationships, Data Breach, Vulnerability Assessment

Abstract

Organizations must take proactive measures to strengthen their cybersecurity posture as cyber-attacks continue to develop and become more sophisticated. Networking, coordination, and the sharing of trustworthy information among entities and organizations have become essential tactics for achieving this goal. This article gives a general overview of how networking, coordination, and trusted information sharing can improve an organization's cybersecurity posture. It covers the most recent advancements and trends in this field and analyses the advantages, difficulties, and best practices for putting these ideas into effect. The article's conclusion emphasizes the necessity of a cooperative, all-encompassing strategy for cybersecurity that incorporates networking, coordination, and reliable information exchange.

References

NIST. (2015). Framework for improving critical infrastructure cybersecurity. Retrieved from https://www.nist.gov/cyberframework

Center for Internet Security (CIS). (2021). The CIS Controls. https://www.cisecurity.org/controls/

CISA. (2021). Network Security. CISA. https://www.cisa.gov/news-events/news/home-network-security

NCCoE. (2021). Network Traffic Analytics. https://www.nist.gov/publications/network-security-traffic-analysis-platform-design-and-validation

NIST. (2018). NIST SP 800-53 Rev. 4: Security and Privacy Controls for Federal Information Systems and Organizations. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf

SANS. (2021). Intrusion Detection and Prevention. https://www.sans.org/blog/favoring-frameworks-for-intrusion-detection-and-prevention/

Cisco. (2020). Security resilience for the unpredictable https://www.cisco.com/c/en/us/products/security/network-security.html

CISA. (2020). Alert (AA20-302A) Ransomware Activity Targeting the Healthcare and Public Health Sector. https://us-cert.cisa.gov/ncas/alerts/aa20-302a

IBM. (2021). 2021 Cost of a Data Breach Report. https://www.ibm.com/security/data-breach

Ponemon Institute. (2020). 2020 Cost of Insider Threats Global Report. https://www.exclusive-networks.com/uk/wp-content/uploads/sites/28/2020/12/UK-VR-Proofpoint-Report-2020-Cost-of-Insider-Threats.pdf

Verizon. (2021). 2021 Data Breach Investigations Report. https://enterprise.verizon.com/resources/reports/2021-data-breach-investigations-report.pdf

Deloitte. (2019). Navigating cybersecurity. https://www2.deloitte.com/uk/en/blog/cyber-risk/2023/navigating-cyber-security.html

Gartner. (n.d). The IT Roadmap for Cybersecurityhttps://www.gartner.com/en/information-technology/trends/the-it-roadmap-for-cybersecurity

McKinsey. (2023). Building a cybersecurity culture. https://www.mckinsey.com/capabilities/mckinsey-digital/our-insights/building-a-culture-that-grows-with-the-business-lessons-from-tibber

PwC. (2018). Global State of Information Security Survey 2018. https://www.pwc.com/sg/en/publications/assets/gsiss-2018.pdf

Ponemon Institute. (2018). The Cyber Security Readiness Report. https://www.keepersecurity.com/assets/pdf/Keeper-2018-Ponemon-Report.pdf

Cloud Security Alliance. (2019). Top Threats to Cloud Computing. https://cloudsecurityalliance.org/press-releases/2022/06/07/cloud-security-alliance-s-top-threats-to-cloud-computing-pandemic-11-report-finds-traditional-cloud-security-issues-becoming-less-concerning/

Cisco. (2019). CISO Benchmark Study: 2019 Report. https://search.cisco.com/search?query=CISO%20Benchmark%20Study:%202019%20Report&locale=enUS&bizcontext=&cat=&mode=text&clktyp=enter&autosuggest=false&istadisplayed=false&tareqid=&categoryvalue=

Tripwire. (2019). Why Cyber Security is Key to Enterprise Risk Management for all Organizations. https://www.tripwire.com/state-of-security/cyber-security-enterprise-risk-management-erm-organizations

Ponemon Institute. (2018). 2018 Cost of a Data Breach Study: Global Overview. https://www.intlxsolutions.com/hubfs/2018_Global_Cost_of_a_Data_Breach_Report.pdf

NIST. (2012). Computer Security Incident Handling Guide. Retrieved from https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf

Cyber Threat Alliance. (2017). Sharing is Caring: Why the Industry Must Work Together to Combat Cybercrime. https://cyberthreatalliance.org/wp-content/uploads/2017/05/CTA_Sharing-is-Caring.pdf

Center for Internet Security. (2018). CIS Controls Version. https://www.cisecurity.org/controls/cis-controls-list/

National Cybersecurity Center of Excellence (NCCoE). (2019). Information Sharing. https://csrc.nist.gov/glossary/term/information_sharing

NIST. (2016). Guide to Cyber Threat Information Sharing. https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-150.pdf

Cyber Threat Alliance (CTA). (2019). Improving Cybersecurity Information Sharing: A Call to Action. https://www.cyberthreatalliance.org/improving-cybersecurity-information-sharing-a-call-to-action/

Center for Internet Security. (2021). Information Sharing. https://www.cisecurity.org/ms-isac

NIST. (2018). Framework for Improving Critical Infrastructure Cybersecurity. https://nvlpubs.nist.gov/nistpubs/cswp/nist.cswp.04162018.pdf

Department of Homeland Security. (2020). Information Sharing and Analysis Organizations. https://www.cisa.gov/information-sharing-and-analysis-organizations-isaos

NIST. (2017). Cybersecurity Framework Version 1.1. https://www.nist.gov/news-events/events/2018/04/webcast-cybersecurity-framework-version-11-overview

Cisco. (2020). Firewall and intrusion detection and prevention system. https://www.cisco.com/c/dam/global/en_au/assets/pdf/at-a-glance-c45-735895.pdf

MITRE. (2019). Vulnerability assessment and penetration testing. https://attack.mitre.org/tactics/TA0005/

NIST. (2017). Digital identity guidelines. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63b.pdf

SANS Institute. (n.d). Security awareness training. https://www.sans.org/security-awareness-training

Symantec. (2023). Data backup and recovery. https://knowledge.broadcom.com/external/article/159322/backup-and-restore-dcs-database-for-disa.html

CISA. (2023). Understanding patches and software updates. https://www.cisa.gov/news-events/news/understanding-patches-and-software-updates

International Organization for Standardization. (2013). ISO/IEC 27002:2013 - Information technology - Security techniques - Code of practice for information security controls. https://www.iso.org/standard/54533.html

Verizon. (2020). 2020 Data Breach Investigations Report. https://www.verizon.com/business/resources/reports/2020-data-breach-investigations-report.pdfx

Ponemon Institute. (2019). Cost of a Data Breach Report 2019. https://www.ibm.com/downloads/cas/RDEQK07R

Accenture. (2019). Cybercrime Costs Projected to Reach $5 Trillion Annually by 2024. https://newsroom.accenture.com/news/cybercrime-could-cost-companies-us-5-2-trillion-over-next-five-years-according-to-new-research-from-accenture.htm

Downloads

Published

2024-10-18

How to Cite

Enhancing Cyber Security: The Role of  Networking, Coordination, and Trusted Information Sharing in Organizational Resilience. (2024). International Journal of Computer and Information Technology(2279-0764), 13(3). https://doi.org/10.24203/0zwra472

Similar Articles

1-10 of 78

You may also start an advanced similarity search for this article.