Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Cybersecurity maturity model“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Cybersecurity maturity model" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Cybersecurity maturity model"
Kour, Ravdeep, Ramin Karim, and Adithya Thaduri. "Cybersecurity for railways – A maturity model." Proceedings of the Institution of Mechanical Engineers, Part F: Journal of Rail and Rapid Transit 234, no. 10 (2019): 1129–48. http://dx.doi.org/10.1177/0954409719881849.
Der volle Inhalt der QuelleYigit Ozkan, Bilge, Sonny van Lingen, and Marco Spruit. "The Cybersecurity Focus Area Maturity (CYSFAM) Model." Journal of Cybersecurity and Privacy 1, no. 1 (2021): 119–39. http://dx.doi.org/10.3390/jcp1010007.
Der volle Inhalt der QuelleP, Dr Rachana. "Strategic Approaches to Cybersecurity Audits for Control Evaluation." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–5. https://doi.org/10.55041/ijsrem40065.
Der volle Inhalt der QuelleDotsenko, T. V., and M. V. Kuzmenko. "Maturity of the country's cybersecurity system in the conditions of war: assessment trends." Economic Bulletin of Dnipro University of Technology 87 (September 2024): 34–43. http://dx.doi.org/10.33271/ebdut/87.034.
Der volle Inhalt der QuelleAliyu, Aliyu, Leandros Maglaras, Ying He, et al. "A Holistic Cybersecurity Maturity Assessment Framework for Higher Education Institutions in the United Kingdom." Applied Sciences 10, no. 10 (2020): 3660. http://dx.doi.org/10.3390/app10103660.
Der volle Inhalt der QuellePeliukh, O. I., M. V. Yesina, and D. Yu Holubnychyi. "CERT-UA assessment based on the CSIRT ENISA Maturity Model." Radiotekhnika, no. 213 (June 16, 2023): 41–48. http://dx.doi.org/10.30837/rt.2023.2.213.04.
Der volle Inhalt der QuelleAbdullahi Garba, Adamu, Aliyu Musa Bade, Muktar Yahuza, and Ya’u Nuhu. "Cybersecurity capability maturity models review and application domain." International Journal of Engineering & Technology 9, no. 3 (2020): 779. http://dx.doi.org/10.14419/ijet.v9i3.30719.
Der volle Inhalt der QuelleRazikin, Khairur, and Agus Widodo. "General Cybersecurity Maturity Assessment Model: Best Practice to Achieve Payment Card Industry-Data Security Standard (PCI-DSS) Compliance." CommIT (Communication and Information Technology) Journal 15, no. 2 (2021): 91–104. http://dx.doi.org/10.21512/commit.v15i2.6931.
Der volle Inhalt der QuelleColeman, Joe. "The DOD's CMMC 2.0: What Heat Treaters Need to Know." AM&P Technical Articles 182, no. 2 (2024): 37–39. http://dx.doi.org/10.31399/asm.amp.2024-02.p037.
Der volle Inhalt der QuelleAbhilash Maroju, Srinivas A Vaddadi, Sravanthi Dontu, Rohith Vallabhaneni,. "An Empirical Paradigm on Cybersecurity Vulnerability Mitigation Framework." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9s (2023): 786–92. http://dx.doi.org/10.17762/ijritcc.v11i9s.9484.
Der volle Inhalt der QuelleDissertationen zum Thema "Cybersecurity maturity model"
Santos, Ricardo Meléndez, Anthony Aguilar Gallardo, and Jimmy Armas Aguirre. "Reference Model to Identify the Maturity Level of Cyber Threat Intelligence on the Dark Web." Repositorio Academico - UPC, 2021. http://hdl.handle.net/10757/653788.
Der volle Inhalt der QuellePérez, Navarro Henry Bryan, and Jara Humberto Luis Salcedo. "Modelo de madurez en ciberseguridad para empresas que manejan datos de salud." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2021. http://hdl.handle.net/10757/655801.
Der volle Inhalt der QuelleAguilar, Gallardo Anthony Josue, and Santos Ricardo Alfonso Meléndez. "Modelo de referencia para identificar el nivel de madurez de ciberinteligencia de amenazas en la dark web." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2020. http://hdl.handle.net/10757/653512.
Der volle Inhalt der QuelleBücher zum Thema "Cybersecurity maturity model"
Cybersecurity Maturity Model Certification (CMMC) - a Pocket Guide. IT Governance Ltd, 2020.
Den vollen Inhalt der Quelle findenVoice), Maxwell (Male Synthesized. Cybersecurity Maturity Model Certification (CMMC) - a Pocket Guide. de Gruyter GmbH, Walter, 2020.
Den vollen Inhalt der Quelle findenMARK A RUSSO CISSP-ISSAP CISO. Cybersecurity Maturity Model Certification ~ 2ND EDITION: CUI Classification, Marking, and Storage Guide. Independently Published, 2019.
Den vollen Inhalt der Quelle findenMARK A RUSSO CISSP-ISSAP CISO. Cybersecurity Maturity Model Certification : Levels 1-3 Manual: Detailed Security Control Implementation Guidance. Independently Published, 2019.
Den vollen Inhalt der Quelle findenGovernment, U. S., and Department of Homeland Security. Best Practices for Planning a Cybersecurity Workforce and the National Initiative for Cybersecurity Education (NICE) Cybersecurity Capability Maturity Model - Benefits of Workforce Planning. Independently Published, 2018.
Den vollen Inhalt der Quelle findenCybersecurity Maturity Model Certification Handbook: A Complete Guide for Preparing for Levels 1-3 CMMC Certification. Repose Reading, 2021.
Den vollen Inhalt der Quelle findenCybersecurity Maturity Model Certification CMMC 2. 0 Assessment Handbook: An Implementation and Self-Assessment Guide for CUI, NIST SP 800-171, and CMMC 2. 0. Independently Published, 2022.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Cybersecurity maturity model"
Donalds, Charlette, Corlane Barclay, and Kweku-Muata Osei-Bryson. "The Cybersecurity Capability Maturity Model for Sustainable Security Advantage." In Cybercrime and Cybersecurity in the Global South. Routledge, 2022. http://dx.doi.org/10.1201/9781003028710-12.
Der volle Inhalt der QuelleKreppein, Alexander, Alexander Kies, and Robert H. Schmitt. "Novel Maturity Model for Cybersecurity Evaluation in Industry 4.0." In Communications in Computer and Information Science. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-8059-5_12.
Der volle Inhalt der QuelleYigit Ozkan, Bilge, and Marco Spruit. "A Questionnaire Model for Cybersecurity Maturity Assessment of Critical Infrastructures." In Lecture Notes in Computer Science. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12085-6_5.
Der volle Inhalt der QuelleGao, Zimeng, Fei Xing, and Guochao Peng. "Research on the Capability Maturity Model of Data Security in the Era of Digital Transformation." In HCI for Cybersecurity, Privacy and Trust. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-35822-7_11.
Der volle Inhalt der QuelleBaninemeh, Elena, Harold Toomey, Katsiaryna Labunets, Gerard Wagenaar, and Slinger Jansen. "An Evaluation of the Product Security Maturity Model Through Case Studies at 15 Software Producing Organizations." In Lecture Notes in Business Information Processing. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-53227-6_23.
Der volle Inhalt der QuelleAhouanmenou, Steve. "Towards a Cybersecurity Maturity Model Specific for the Healthcare Sector: Focus on Hospitals." In Research Challenges in Information Science. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-59468-7_16.
Der volle Inhalt der QuelleKendzierskyj, Stefan, Hamid Jahankhani, Arshad Jamal, Osama Hussien, and Longzhi Yang. "The Role of Blockchain with a Cybersecurity Maturity Model in the Governance of Higher Education Supply Chains." In Advanced Sciences and Technologies for Security Applications. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33627-0_1.
Der volle Inhalt der QuelleAcosta, Mauricio Alexander Nieto, and Hamid Jahankhani. "An Empirical Study into Ransomware Campaigns Against the Education Sector and Adopting the Cybersecurity Maturity Model Certification Framework." In Advanced Sciences and Technologies for Security Applications. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33627-0_4.
Der volle Inhalt der QuelleBuzdugan, Aurelian, and Gheorghe Căpățână. "The Trends in Cybersecurity Maturity Models." In Education, Research and Business Technologies. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-6755-9_18.
Der volle Inhalt der QuelleMöller, Dietmar P. F. "Cybersecurity Maturity Models and SWOT Analysis." In Advances in Information Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-26845-8_7.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Cybersecurity maturity model"
Cobos, Salvador, Armando Garayar, and David Mauricio. "Cybersecurity Maturity Model Against Ransomware Attacks for the Financial Sector." In 2024 IEEE ANDESCON. IEEE, 2024. http://dx.doi.org/10.1109/andescon61840.2024.10755867.
Der volle Inhalt der QuelleGourisetti, Sri Nikhil Gupta, Scott Mix, Michael Mylrea, Christopher Bonebrake, and Md Touhiduzzaman. "Secure Design and Development Cybersecurity Capability Maturity Model (SD2-C2M2)." In NCS '19: Northwest Cybersecurity Symposium. ACM, 2019. http://dx.doi.org/10.1145/3332448.3332461.
Der volle Inhalt der QuelleBhattacharya, Souradeep, Burhan Hyder, and Manimaran Govindarasu. "ICS-CTM2: Industrial Control System Cybersecurity Testbed Maturity Model." In 2022 Resilience Week (RWS). IEEE, 2022. http://dx.doi.org/10.1109/rws55399.2022.9984023.
Der volle Inhalt der QuelleAzambuja, Antonio João, and João Souza Neto. "Modelo de maturidade de segurança cibernética para os órgãos da Administração Pública Federal." In II Workshop de Segurança Cibernética em Dispositivos Conectados. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/wscdc.2019.7707.
Der volle Inhalt der QuelleRojas, Aaron Joseph Serrano, Erick Fabrizzio Paniura Valencia, Jimmy Armas-Aguirre, and Juan Manuel Madrid Molina. "Cybersecurity maturity model for the protection and privacy of personal health data." In 2022 IEEE 2nd International Conference on Advanced Learning Technologies on Education & Research (ICALTER). IEEE, 2022. http://dx.doi.org/10.1109/icalter57193.2022.9964729.
Der volle Inhalt der QuelleAlayo, Jorge Gutierrez, Paul Necochea Mendoza, Jimmy Armas-Aguirre, and Juan Madrid Molina. "Cybersecurity maturity model for providing services in the financial sector in Peru." In 2021 Congreso Internacional de Innovación y Tendencias en Ingeniería (CONIITI). IEEE, 2021. http://dx.doi.org/10.1109/coniiti53815.2021.9619733.
Der volle Inhalt der QuelleArenas, Ethan, Juan Palomino, and Juan-Pablo Mansilla. "Cybersecurity Maturity Model to Prevent Cyberattacks on Web Applications Based on ISO 27032 and NIST." In 2023 IEEE XXX International Conference on Electronics, Electrical Engineering and Computing (INTERCON). IEEE, 2023. http://dx.doi.org/10.1109/intercon59652.2023.10326028.
Der volle Inhalt der QuelleBarclay, Corlane. "Sustainable security advantage in a changing environment: The Cybersecurity Capability Maturity Model (CM2)." In 2014 ITU Kaleidoscope: Living in a Converged World - Impossible without Standards? (K-2014). IEEE, 2014. http://dx.doi.org/10.1109/kaleidoscope.2014.6858466.
Der volle Inhalt der QuelleKioskli, Kitty, Spyridon Papastergiou, Theofanis Fotis, Stefano Silvestri, and Haralambos Mouratidis. "A Self-Organized Swarm Intelligence Solution for Healthcare ICT Security." In 15th International Conference on Applied Human Factors and Ergonomics (AHFE 2024). AHFE International, 2024. http://dx.doi.org/10.54941/ahfe1004780.
Der volle Inhalt der QuelleRea-Guaman, A. M., I. D. Sanchez-Garcia, T. San Feliu, and J. A. Calvo-Manzano. "Maturity models in cybersecurity: A systematic review." In 2017 12th Iberian Conference on Information Systems and Technologies (CISTI). IEEE, 2017. http://dx.doi.org/10.23919/cisti.2017.7975865.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Cybersecurity maturity model"
Lewis, James Andrew. Advanced Experiences in Cybersecurity Policies and Practices: An Overview of Estonia, Israel, South Korea, and the United States. Inter-American Development Bank, 2016. http://dx.doi.org/10.18235/0007970.
Der volle Inhalt der QuelleGeorgiev, Venelin. Comparative Analysis of Models for Assessing the Maturity of Cybersecurity Capabilities. Procon, 2021. http://dx.doi.org/10.11610/it4sec.0138.
Der volle Inhalt der QuelleCybersecurity: Are We Ready in Latin America and the Caribbean? Inter-American Development Bank, 2016. http://dx.doi.org/10.18235/0006517.
Der volle Inhalt der Quelle