Business operations increasingly depend on digital workflows, hybrid infrastructures, and third-party ecosystems, making cybersecurity incidents a direct business continuity and governance problem rather than solely a technical concern. This paper proposes an integrated cyber defense and defense-to-response decision framework for organizations seeking to reduce exposure to external attacks and unauthorized access while improving incident detection, containment, and recovery. The framework aligns governance and control selection with NIST Cybersecurity Framework (CSF) 2.0, operational incident response considerations with NIST SP 800-61 Revision 3, control requirements with ISO/IEC 27001:2022, prioritized safeguards with CIS Controls v8.1, and adversary-behavior mapping with the MITRE ATT&CK Enterprise Matrix. We define an evaluation model that combines 1) coverage mapping across prevent-detect-respond-recover functions, 2) multi-criteria decision analysis (MCDA) for cost, complexity, and risk reduction trade-offs, and 3) a playbook-oriented response design for high-frequency attack paths relevant to business environments. A worked comparative example demonstrates how three strategy bundles (traditional perimeter controls, defense-in-depth with SIEM, and a Zero Trust + EDR + SOAR approach) can be ranked using weighted criteria and incident lifecycle metrics. The paper concludes with an implementation roadmap and measurement plan to convert the framework into an evidence-based program that supports executive decision-making and continuous improvement.
Building similarity graph...
Analyzing shared references across papers
Loading...
Jurgen Mecaj
International Journal of Advanced Computer Science and Applications
Building similarity graph...
Analyzing shared references across papers
Loading...
Jurgen Mecaj (Thu,) studied this question.
www.synapsesocial.com/papers/698586ad8f7c464f2300a64b — DOI: https://doi.org/10.14569/ijacsa.2026.0170166