Show simple item record

dc.contributor.advisorDonna H. Rhodels.en_US
dc.contributor.authorLee, Samuel J.G.(Samuel Joo Guan)en_US
dc.contributor.otherMassachusetts Institute of Technology. Engineering and Management Program.en_US
dc.contributor.otherSystem Design and Management Program.en_US
dc.date.accessioned2019-09-17T19:50:27Z
dc.date.available2019-09-17T19:50:27Z
dc.date.copyright2019en_US
dc.date.issued2019en_US
dc.identifier.urihttps://hdl.handle.net/1721.1/122249
dc.descriptionThesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, System Design and Management Program, 2019en_US
dc.descriptionCataloged from PDF version of thesis.en_US
dc.descriptionIncludes bibliographical references (pages 119-125).en_US
dc.description.abstractOn April 1, 2015, President Obama issued an executive order, declaring that the increasing prevalence and severity of malicious cyber-enabled activities constitute an unusual and extraordinary threat to the national security, foreign policy and economy of the United States. He declared a national emergency to deal with this threat and included $14 billion for Cyber Security spending in his 2016 budget. On a corporate level, based on a survey conducted in 2018, 27% of IT and Cyber Security professionals said that their biggest Cyber Security challenge is that business managers don't understand or support strong Cyber Security while 27% of respondents say their biggest Cyber Security challenge is the difficulty of managing the complexity of too many disconnected Cyber Security tools. (Oltsik, 2018) From these national and corporate challenges, an apparent Cyber Security challenge exists. The national challenge is further insinuated by two key issues.en_US
dc.description.abstractFirst, the disconnect between business managers and security managers. Second, the complexity of too many disconnected Cyber Security tools faced at the corporate level. "In the past the man has been first; in the future the system must be first." (Taylor, 1919) As Frederick Winslow Taylor stated in his book, "Principles of Scientific Management, in the context of management, Taylor implied that developing great systems will yield greater benefits than developing great men. Similar, the author believe that the design of a cyber-security architecture should be approached with a system-thinking approach, where the sum of the system parts is greater than the parts itself, less so from an individual's perspective.en_US
dc.description.abstractTaking this approach, the author aims to discuss the challenge in managing the evolving cyber threats, the external eco-system challenges faced by financial institutions, the differing stakeholders' needs raised to the cyber-security team, and how a systems-thinking cyber-security architecture will be more effective in dealing with threats and challenges arising from both externally and internally.en_US
dc.description.statementofresponsibilityby Samuel J.G. Lee.en_US
dc.format.extent125 pagesen_US
dc.language.isoengen_US
dc.publisherMassachusetts Institute of Technologyen_US
dc.rightsMIT theses are protected by copyright. They may be viewed, downloaded, or printed from this source but further reproduction or distribution in any format is prohibited without written permission.en_US
dc.rights.urihttp://dspace.mit.edu/handle/1721.1/7582en_US
dc.subjectEngineering and Management Program.en_US
dc.subjectSystem Design and Management Program.en_US
dc.titleArchitecting a secure enterprise with a systems-thinking approachen_US
dc.typeThesisen_US
dc.description.degreeS.M. in Engineering and Managementen_US
dc.contributor.departmentMassachusetts Institute of Technology. Engineering and Management Programen_US
dc.identifier.oclc1119537436en_US
dc.description.collectionS.M.inEngineeringandManagement Massachusetts Institute of Technology, System Design and Management Programen_US
dspace.imported2019-09-17T19:50:23Zen_US
mit.thesis.degreeMasteren_US
mit.thesis.departmentSysDesen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record