Cybersecurity Strategies for Effective Proactive Response to Cyber Attacks
Guardado en:
| Publicado en: | ProQuest Dissertations and Theses (2025) |
|---|---|
| Autor principal: | |
| Publicado: |
ProQuest Dissertations & Theses
|
| Materias: | |
| Acceso en línea: | Citation/Abstract Full Text - PDF |
| Etiquetas: |
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
MARC
| LEADER | 00000nab a2200000uu 4500 | ||
|---|---|---|---|
| 001 | 3224180269 | ||
| 003 | UK-CbPIL | ||
| 020 | |a 9798286432776 | ||
| 035 | |a 3224180269 | ||
| 045 | 2 | |b d20250101 |b d20251231 | |
| 084 | |a 66569 |2 nlm | ||
| 100 | 1 | |a Perry, Tony L. | |
| 245 | 1 | |a Cybersecurity Strategies for Effective Proactive Response to Cyber Attacks | |
| 260 | |b ProQuest Dissertations & Theses |c 2025 | ||
| 513 | |a Dissertation/Thesis | ||
| 520 | 3 | |a Malicious cybersecurity attacks threaten the confidentiality, integrity, and availability of organizational data. This issue concerns organizational leaders and cybersecurity professionals who must address these threats to prevent operational disruptions, financial losses, reputational damage, and declining stakeholder trust. Grounded in organizational learning theory, the purpose of this qualitative pragmatic inquiry was to explore the strategies information technology security professionals use to proactively respond to evolving cybersecurity threats. The study involved 16 cybersecurity professionals, each with a minimum of five years of experience in implementing both offensive and defensive cybersecurity strategies within their organizations. Data were collected through semistructured interviews and a review of relevant literature. Thematic analysis revealed four major proactive strategies: continuous evaluation and improvement, senior leadership support or buy-in, threat detection and prevention, and training. A key recommendation is to conduct regular and routine risk and threat assessments to monitor and refine an organization’s cybersecurity posture. The implications for positive social change include the potential for organizational leaders and cybersecurity professionals to enhance the security of digital environments, thereby improving public confidence in the protection and exchange of sensitive information via Internet applications. | |
| 653 | |a Information technology | ||
| 653 | |a Computer engineering | ||
| 653 | |a Organizational behavior | ||
| 653 | |a Finance | ||
| 773 | 0 | |t ProQuest Dissertations and Theses |g (2025) | |
| 786 | 0 | |d ProQuest |t ProQuest Dissertations & Theses Global | |
| 856 | 4 | 1 | |3 Citation/Abstract |u https://www.proquest.com/docview/3224180269/abstract/embedded/L8HZQI7Z43R0LA5T?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text - PDF |u https://www.proquest.com/docview/3224180269/fulltextPDF/embedded/L8HZQI7Z43R0LA5T?source=fedsrch |