<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The ‘Balance’ As a Panacea for Achieving (Cyber)Security</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">balance</style></keyword><keyword><style  face="normal" font="default" size="100%">capabilities</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">panacea</style></keyword><keyword><style  face="normal" font="default" size="100%">risks</style></keyword><keyword><style  face="normal" font="default" size="100%">Scenarios</style></keyword><keyword><style  face="normal" font="default" size="100%">security controls</style></keyword><keyword><style  face="normal" font="default" size="100%">threats</style></keyword><keyword><style  face="normal" font="default" size="100%">Vulnerabilities</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><number><style face="normal" font="default" size="100%">145</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Decision-making in a complex, complex, multi-layered and multifactorial environment, such as the security environment, requires a balance between threat factors and strategies to counter them. In this sense, the search for a single, simple solution, seen as a panacea, is an irrational management approach. The report presents the results of a study to develop a model for balancing cybersecurity solutions.
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Productive and Counter-Productive Balance in Security</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">balance</style></keyword><keyword><style  face="normal" font="default" size="100%">capabilities</style></keyword><keyword><style  face="normal" font="default" size="100%">resources</style></keyword><keyword><style  face="normal" font="default" size="100%">Risk</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">threats</style></keyword><keyword><style  face="normal" font="default" size="100%">Vulnerabilities</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><number><style face="normal" font="default" size="100%">44</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The research efforts in the field of security strengthens its relevance in conditions of crises, which are not lacking in modern times. Returning to fundamental questions such as why security is important and what makes it difficult to create an acceptable level of security allows, on the one hand, to reveal some erroneous theses, and on the other hand, to add perspectives in the search for rational answers. The material draws a parallel between two types of security balances, defined as productive and counter-productive. Based on the comparison, challenges to finding balanced solutions to security issues viewed as multifactorial functions are presented.</style></abstract></record></records></xml>