Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Cybersecurity frameworks“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Cybersecurity frameworks" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Cybersecurity frameworks"
Taherdoost, Hamed. „Understanding Cybersecurity Frameworks and Information Security Standards—A Review and Comprehensive Overview“. Electronics 11, Nr. 14 (12.07.2022): 2181. http://dx.doi.org/10.3390/electronics11142181.
Der volle Inhalt der QuelleAlghamdi, Ahmed. „Comparative Analysis of ISO27001 and NIST CSF“. International Journal of Membrane Science and Technology 10, Nr. 4 (30.09.2023): 1423–29. http://dx.doi.org/10.15379/ijmst.v10i4.2258.
Der volle Inhalt der QuelleMelaku, Henock Mulugeta. „A Dynamic and Adaptive Cybersecurity Governance Framework“. Journal of Cybersecurity and Privacy 3, Nr. 3 (30.06.2023): 327–50. http://dx.doi.org/10.3390/jcp3030017.
Der volle Inhalt der QuelleLee, In. „Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management“. Future Internet 12, Nr. 9 (18.09.2020): 157. http://dx.doi.org/10.3390/fi12090157.
Der volle Inhalt der QuelleDedeke, Adenekan, und Katherine Masterson. „Contrasting cybersecurity implementation frameworks (CIF) from three countries“. Information & Computer Security 27, Nr. 3 (08.07.2019): 373–92. http://dx.doi.org/10.1108/ics-10-2018-0122.
Der volle Inhalt der QuelleMalatji, Masike, Annlizé L. Marnewick und Suné Von Solms. „Cybersecurity capabilities for critical infrastructure resilience“. Information & Computer Security 30, Nr. 2 (14.10.2021): 255–79. http://dx.doi.org/10.1108/ics-06-2021-0091.
Der volle Inhalt der QuelleMalatji, Masike, Annlizé L. Marnewick und Suné Von Solms. „Cybersecurity capabilities for critical infrastructure resilience“. Information & Computer Security 30, Nr. 2 (14.10.2021): 255–79. http://dx.doi.org/10.1108/ics-06-2021-0091.
Der volle Inhalt der QuelleMPHATHENI, Mandlenkosi Richard. „Cybersecurity: An Appraisal of Policy Frameworks and Related Conventions“. International Journal of Information Security and Cybercrime 12, Nr. 1 (28.06.2023): 45–60. http://dx.doi.org/10.19107/ijisc.2023.01.06.
Der volle Inhalt der QuelleAlSagri, Hatoon S., Shahab Saquib Sohail und Shiju Sebastian. „The role of deep reinforcement learning in developing adaptive cybersecurity defenses for smart grid systems“. Journal of Information and Optimization Sciences 45, Nr. 8 (2024): 2299–307. https://doi.org/10.47974/jios-1807.
Der volle Inhalt der QuelleShelly, Elizabeth. „Cybersecurity Frameworks for Cloud Computing Environments“. International Journal of Computing and Engineering 6, Nr. 1 (12.07.2024): 30–44. http://dx.doi.org/10.47941/ijce.2058.
Der volle Inhalt der QuelleDissertationen zum Thema "Cybersecurity frameworks"
Smith, Willarvis. „A Comprehensive Cybersecurity Defense Framework for Large Organizations“. Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1083.
Der volle Inhalt der QuelleRaina, Ravi. „A systems perspective on cybersecurity in the cloud : frameworks, metrics and migration strategy“. Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/107602.
Der volle Inhalt der QuelleCataloged from PDF version of thesis.
Includes bibliographical references (pages 119-124).
Cloud computing represents the next generation of disruptive technologies in computing. However, there are several barriers to massive adoption of cloud and among them security remains one of the principal concerns. Traditional failure analysis and prevention frameworks fall exceedingly short to address cybersecurity as is evident by every increasing cybersecurity breaches. New frameworks for cybersecurity are required which take a holistic view of the problem and a systems perspective. Migrating to cloud also represents a key decision point for CEO/CTO's today, especially from security perspective. The objective of this thesis is to illustrate the effectiveness of taking a Systems Approach to cybersecurity and provide a framework for migration to cloud with specific emphasis on critical cybersecurity issues pertaining to various cloud deployment models and delivery services. The thesis is divided into three phases. Firstly, it will aim to explore the major security threats and critical areas of focus for security in cloud. It will explore the major security frameworks, metrics and controls, especially the major ones from NIST, CIS and CSA. SLA's for different cloud service models will then be presented. A high level cloud migration framework strategy and framework, with special emphasis on cybersecurity will also be discussed. In the second phase, System- Theoretic Accident Model and Processes (STAMP) which is based on Systems Theory will be applied to Target security breach and key recommendations as well as new insights will be presented. The analysis will highlight the need for holistic approach and Systems Thinking to cybersecurity and new insights that are not produced by traditional methods will be presented. Finally, in the third phase, the cloud migration framework discussed in phase one will be applied to Target. A case will be made that in certain scenarios, moving the less critical applications to cloud and utilizing the security benefits of cloud can actually reduce the threat vectors and security exposures and bring IT systems from a higher risk state to lower risk state. The thesis integrates cybersecurity methods and frameworks as well as security metrics with the cloud migration strategy. Additionally, it also presents STAMP/CAST failure model for cybersecurity breaches and highlights the need for integrated view of safety and security and Systems Thinking in cybersecurity both in traditional systems and cloud.
by Ravi Raina.
S.M. in Engineering and Management
Yu, Xiaodong. „Algorithms and Frameworks for Accelerating Security Applications on HPC Platforms“. Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/93510.
Der volle Inhalt der QuelleDoctor of Philosophy
Typical cybersecurity solutions emphasize on achieving defense functionalities. However, execution efficiency and scalability are equally important, especially for the real-world deployment. Straightforward mappings of applications onto High-Performance Computing (HPC) platforms may significantly underutilize the HPC devices’ capacities. In this dissertation, we demonstrate how application-specific characteristics can be leveraged to optimize various types of HPC executions for cybersecurity. We investigate several sub-areas, including mobile software security, network security, and system security. For example, we present a new GPU-assisted framework and a collection of optimization strategies for fast Android static data-flow analysis that achieve up to 128X speedups against the unoptimized GPU implementation. For network intrusion detection systems (IDS), we design and implement an algorithm capable of eliminating the state explosion in out-of-order packet situations, which reduces up to 400X of the memory overhead. We also present tools for improving the usability of HPC programming. To study the cache configurations’ impact on time-driven cache side-channel attacks’ performance, we design an approach to conducting comparative measurement. We propose a quantifiable success rate metric to measure the performance of time-driven cache attacks and utilize the GEM5 platform to emulate the configurable cache.
Hedåker, Johanna. „Ramverk för cybersäkerhet: Möjligheter och begränsningar“. Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20211.
Der volle Inhalt der QuelleAs the technological advancements of our society continue to thrive, there is a need foran exponential growth in the field of cybersecurity. Trends suggest this has not beenthe case and the amount of data- and security breaches has drastically increased overthe past few years. Earlier studies suggest that these incidents could be prevented, orat least limited, by implementing modern cyber security frameworks, such as CISCritical Security Controls.The main aim of this study is to, by conducting an initial investigative survey, examine the existing opinions of professionals from the cybersecurity industry regardingthe significance and effects of implementing such cyber security frameworks.The results of our initial study suggest that cyber security frameworks could contribute to a both sufficient and substantial level of security. However, some caution shouldbe taken into consideration as the frameworks require both experience and adaptation. Furthermore, our results also show that there is a need to introduce basic cybersecurity competence in education, including education traditionally considered to beoutside the field of cybersecurity, as a result of the transformed digital environment.
Kuznietsova, Tetiania, und Andrii Chyrkov. „State and perspectives of aircraft cybersecurity“. Thesis, National aviation university, 2021. https://er.nau.edu.ua/handle/NAU/50678.
Der volle Inhalt der QuelleCamporesi, Mirko. „Securopoly: un gioco per l'insegnamento della Cybersecurity“. Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/13274/.
Der volle Inhalt der QuelleLeon, Ryan James. „An Event Management Framework to Aid Solution Providers in Cybersecurity“. Thesis, The George Washington University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10745141.
Der volle Inhalt der QuelleCybersecurity event management is critical to the successful accomplishment of an organization’s mission. To put it in perspective, in 2016 Symantec tracked over 700 global adversaries and recorded events from 98 million sensors (Aimoto et al., 2017). Studies show that in 2015, more than 55% of the cyberattacks on government operation centers were due to negligence and the lack of skilled personnel to perform network security duties including the failure to properly identify events (Ponemon, 2015a). Practitioners are charged to perform as first responders to any event that affects the network. Inconsistencies and errors that occur at this level can determine the outcome of an event.
In a time when 91% of Americans believe they have lost control over how information is collected and secured, there is nothing more dangerous than thinking new technology is not vulnerable to attacks (Rainie, 2016). Assailants target those with weak security postures who are unprepared, distracted or lack fundamental elements to identify significant events and secure the environment.
Under executive order, to address these concerns organizations such as the National Institute of Standards and Technology (NIST) and International Organization of Standards (ISO) developed cybersecurity frameworks, which have been widely accepted as industry standards. These standards focus on business drivers to guide cybersecurity activities and risks within critical infrastructure. It outlines a set of cybersecurity activities, references, and outcomes that can be used to align its cyber activities with business requirements at a high-level.
This praxis explores the solution provider’s role in and method of securing environments through their event management practices. Solution providers are a critical piece of proper event management. They are often contracted to provide solutions that adhere to a NIST type framework with little to no guidance. There are supportive documents and guides for event management but nothing substantive like the Cybersecurity Framework and ISO 27001 has been adopted. Using existing processes and protocols an event management framework is proposed that can be utilized to properly manage events and aid solution providers in their cybersecurity mission.
Knowledge of event management was captured through subject matter expertise and supported through literature review and investigation. Statistical methods were used to identify deficiencies in cyber operations that would be worth addressing in an event management framework.
Snyder, Justin Charles. „A Framework and Exploration of a Cybersecurity Education Escape Room“. BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/6958.
Der volle Inhalt der QuelleNewby, Chandler Ryan. „Designing Cybersecurity Competitions in the Cloud: A Framework and Feasibility Study“. BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/7417.
Der volle Inhalt der QuelleCornel, Caralea May. „A Methodology to Measure the Impact of Diversity on Cybersecurity Team Effectiveness“. BYU ScholarsArchive, 2019. https://scholarsarchive.byu.edu/etd/8594.
Der volle Inhalt der QuelleBücher zum Thema "Cybersecurity frameworks"
United States. Congress. House. Committee on Homeland Security. Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. Oversight of Executive Order 13636 and development of the cybersecurity framework: Hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, first session, July 18, 2013. Washington: U.S. Government Printing Office, 2014.
Den vollen Inhalt der Quelle findenMaksurov, Aleksey. Ensuring information security on the Internet. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1942595.
Der volle Inhalt der QuelleShah, Imdad Ali, Samina Rajper und Noor Zaman. Cybersecurity Measures for e-Government Frameworks. IGI Global, 2021.
Den vollen Inhalt der Quelle findenZaman, Noor, Imdad Ali Shah und Samina Rajper, Hrsg. Cybersecurity Measures for E-Government Frameworks. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-7998-9624-1.
Der volle Inhalt der QuelleShah, Imdad Ali, Samina Rajper und Noor Zaman. Cybersecurity Measures for e-Government Frameworks. IGI Global, 2022.
Den vollen Inhalt der Quelle findenShah, Imdad Ali, Samina Rajper und Noor Zaman. Cybersecurity Measures for e-Government Frameworks. IGI Global, 2022.
Den vollen Inhalt der Quelle findenShah, Imdad Ali, Samina Rajper und Noor Zaman. Cybersecurity Measures for e-Government Frameworks. IGI Global, 2022.
Den vollen Inhalt der Quelle findenShah, Imdad Ali, Samina Rajper und Noor Zaman. Cybersecurity Measures for e-Government Frameworks. IGI Global, 2022.
Den vollen Inhalt der Quelle findenBelli, Luca. CyberBRICS: Mapping Cybersecurity Frameworks in the BRICS. Springer International Publishing AG, 2021.
Den vollen Inhalt der Quelle findenQuest to Cyber Superiority: Cybersecurity Regulations, Frameworks, and Strategies of Major Economies. Springer, 2016.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Cybersecurity frameworks"
Donaldson, Scott E., Stanley G. Siegel, Chris K. Williams und Abdul Aslam. „Cybersecurity Frameworks“. In Enterprise Cybersecurity, 297–309. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4302-6083-7_17.
Der volle Inhalt der QuelleWeis, Dan. „Cybersecurity Frameworks“. In Boardroom Cybersecurity, 55–75. Berkeley, CA: Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0785-5_5.
Der volle Inhalt der QuelleManjikian, Mary. „Three Ethical Frameworks“. In Cybersecurity Ethics, 23–42. 2. Aufl. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003248828-3.
Der volle Inhalt der QuelleDonaldson, Scott E., Stanley G. Siegel, Chris K. Williams und Abdul Aslam. „Mapping Against Cybersecurity Frameworks“. In Enterprise Cybersecurity, 231–39. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4302-6083-7_13.
Der volle Inhalt der QuelleThompson, Eric C. „Incident Response Frameworks“. In Cybersecurity Incident Response, 17–46. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3870-7_3.
Der volle Inhalt der QuelleDonaldson, Scott E., Stanley G. Siegel, Chris K. Williams und Abdul Aslam. „Mapping Against Cybersecurity Frameworks“. In Enterprise Cybersecurity Study Guide, 429–47. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3258-3_13.
Der volle Inhalt der QuelleAlexander, Richard D., und Srinivas Panguluri. „Cybersecurity Terminology and Frameworks“. In Cyber-Physical Security, 19–47. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-32824-9_2.
Der volle Inhalt der QuelleLoi, Michele, und Markus Christen. „Ethical Frameworks for Cybersecurity“. In The International Library of Ethics, Law and Technology, 73–95. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-29053-5_4.
Der volle Inhalt der QuelleSchoenherr, F. Jordan Richard, und Robert Thomson. „Ethical Frameworks for Cybersecurity“. In The Frontlines of Artificial Intelligence Ethics, 141–61. New York: Routledge, 2022. http://dx.doi.org/10.4324/9781003030928-12.
Der volle Inhalt der QuelleDeutscher, Stefan A., und William Yin. „Standards and Frameworks for Cybersecurity“. In The Cyber Risk Handbook, 81–96. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2017. http://dx.doi.org/10.1002/9781119309741.ch6.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Cybersecurity frameworks"
Kumar Jain, Yogesh, CA Dhaarna Singh Rathore, Anjani Johrawanshi, Manish Gupta, Deepak Kumar Choudhary und Ankur Pandey. „Cybersecurity Frameworks: A Roadmap for Business Resilience“. In 2024 International Conference on Cybernation and Computation (CYBERCOM), 102–8. IEEE, 2024. https://doi.org/10.1109/cybercom63683.2024.10803234.
Der volle Inhalt der QuelleLatoni, Anthony, und Xiaowen Zhang. „Enhancing Cybersecurity in Healthcare 5.0 Through Innovative Frameworks“. In 2024 IEEE Long Island Systems, Applications and Technology Conference (LISAT), 1–6. IEEE, 2024. https://doi.org/10.1109/lisat63094.2024.10808000.
Der volle Inhalt der QuelleHanson, Danielle, und Jeremy Straub. „A Systematic Review of Cybersecurity Audit Frameworks for the Internet of Things“. In 2024 IEEE International Conference on Cyber Security and Resilience (CSR), 133–38. IEEE, 2024. http://dx.doi.org/10.1109/csr61664.2024.10679377.
Der volle Inhalt der QuelleRamesh, Keshav, Nikita Christ Miller, Aariz Faridi, Fadi Aloul, Imran Zualkernan und Ali Reza Sajun. „Efficient Machine Learning Frameworks for Strengthening Cybersecurity in Internet of Medical Things (IoMT) Ecosystems“. In 2024 IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS), 92–98. IEEE, 2024. https://doi.org/10.1109/iotais64014.2024.10799438.
Der volle Inhalt der QuellePandey, Radhika, Shaik Anjimoon, V. Asha, Atul Singla, Irfan Khan und Zain Alabdeen Hasan Abed. „Developing Robust Cybersecurity Policies and Governance Frameworks in Response to Evolving Legal and Regulatory Landscapes“. In 2024 OPJU International Technology Conference (OTCON) on Smart Computing for Innovation and Advancement in Industry 4.0, 1–6. IEEE, 2024. http://dx.doi.org/10.1109/otcon60325.2024.10687438.
Der volle Inhalt der QuelleSheh, R., K. Geappen und D. Harriss. „AUTONOMOUS CYBERSECURITY AND AI RISK MANAGEMENT FOR UNCREWED SYSTEMS: CHALLENGES AND OPPORTUNITIES USING THE NIST FRAMEWORKS“. In XPONENTIAL 2024, 46–67. Arlington, Virginia, USA: Association for Unmanned Vehicle Systems International, 2024. http://dx.doi.org/10.52202/075106-0003.
Der volle Inhalt der QuelleMarek, James. „Cybersecurity and Risk Management Framework in Avionics“. In Vertical Flight Society 74th Annual Forum & Technology Display, 1–10. The Vertical Flight Society, 2018. http://dx.doi.org/10.4050/f-0074-2018-12893.
Der volle Inhalt der QuelleChew, M. D., und J. Buongiorno. „A Cybersecurity Framework For Nuclear Microreactors“. In 2024 International Congress on Advances in Nuclear Power Plants (ICAPP), 442–50. Illinois: American Nuclear Society, 2024. http://dx.doi.org/10.13182/t130-43781.
Der volle Inhalt der QuelleWang, Wenjia, Seyed Masoud Sadjadi und Naphtali Rishe. „A Survey of Major Cybersecurity Compliance Frameworks“. In 2024 IEEE 10th Conference on Big Data Security on Cloud (BigDataSecurity). IEEE, 2024. http://dx.doi.org/10.1109/bigdatasecurity62737.2024.00013.
Der volle Inhalt der QuelleFalé, Pedro, Leonilde Reis und Rui Almeida. „Cybersecurity – Security Operations Center“. In Sixth International Scientific Conference ITEMA Recent Advances in Information Technology, Tourism, Economics, Management and Agriculture. Association of Economists and Managers of the Balkans, Belgrade, Serbia, 2022. http://dx.doi.org/10.31410/itema.2022.99.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Cybersecurity frameworks"
Raza, Haider. Research work on cybersecurity frameworks. Ames (Iowa): Iowa State University, Januar 2020. http://dx.doi.org/10.31274/cc-20240624-1224.
Der volle Inhalt der QuelleSrinivasan, Piya. Strengthening cybersecurity frameworks remains a global challenge. Herausgegeben von Sam Hendricks. Monash University, Dezember 2023. http://dx.doi.org/10.54377/d1ef-9335.
Der volle Inhalt der QuellePulivarti, Ronald. Genomic Data Cybersecurity and Privacy Frameworks Community Profile. Gaithersburg, MD: National Institute of Standards and Technology, 2024. https://doi.org/10.6028/nist.ir.8467.2pd.
Der volle Inhalt der QuelleDavid, Aharon. Unsettled Topics Concerning Airport Cybersecurity Standards and Regulation. SAE International, September 2021. http://dx.doi.org/10.4271/epr2021020.
Der volle Inhalt der QuelleScarfone, Karen. Development of Relationship Mapping between Documentary Standards, Regulations, Frameworks, and Guidelines: Cybersecurity and Privacy Content Mapping. Gaithersburg, MD: National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.ir.8477.
Der volle Inhalt der QuelleScarfone, Karen. Development of Relationship Mapping between Documentary Standards, Regulations, Frameworks, and Guidelines: Cybersecurity and Privacy Content Mapping. Gaithersburg, MD: National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.ir.8477.ipd.
Der volle Inhalt der QuelleCoyner, Kelley, und Jason Bittner. Automated Vehicles and Infrastructure Enablers: Cybersecurity. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, August 2024. http://dx.doi.org/10.4271/epr2024018.
Der volle Inhalt der QuellePetersen, Rodney, Danielle Santos, Matthew C. Smith, Karen A. Wetzel und Greg Witte. Workforce Framework for Cybersecurity (NICE Framework). National Institute of Standards and Technology, November 2020. http://dx.doi.org/10.6028/nist.sp.800-181r1.
Der volle Inhalt der QuelleStouffer, Keith, Timothy Zimmerman, CheeYee Tang, Joshua Lubell, Jeffrey Cichonski und John McCarthy. Cybersecurity framework manufacturing profile. Gaithersburg, MD: National Institute of Standards and Technology, September 2017. http://dx.doi.org/10.6028/nist.ir.8183.
Der volle Inhalt der QuelleScarfone, Karen. NIST Cybersecurity Framework 2.0:. Gaithersburg, MD: National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.sp.1302.ipd.
Der volle Inhalt der Quelle