Studied in this article is whether the Bayesian Network Model (BNM) can be\neffectively applied to the prioritization of defense in-depth security tools and\nprocedures and to the combining of those measures to reduce cyber threats.\nThe methods used in this study consisted of scanning 24 peer reviewed Cybersecurity\nArticles from prominent Cybersecurity Journals using the Likert\nScale Model for the articleâ??s list of defense in depth measures (tools and procedures)\nand the threats that those measures were designed to reduce. The\ndefense in depth tools and procedures are then compared to see whether the\nLikert scale and the Bayesian Network Model could be effectively applied to\nprioritize and combine the measures to reduce cyber threats attacks against\norganizational and private computing systems. The findings of the research\nreject the H0 null hypothesis that BNM does not affect the relationship between\nthe prioritization and combining of 24 Cybersecurity Articleâ??s defense\nin depth tools and procedures (independent variables) and cyber threats (dependent\nvariables).
Loading....