Zeitschriftenartikel zum Thema „Cybersecurity maturity model“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Cybersecurity maturity model" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Kour, Ravdeep, Ramin Karim und Adithya Thaduri. „Cybersecurity for railways – A maturity model“. Proceedings of the Institution of Mechanical Engineers, Part F: Journal of Rail and Rapid Transit 234, Nr. 10 (18.10.2019): 1129–48. http://dx.doi.org/10.1177/0954409719881849.
Der volle Inhalt der QuelleYigit Ozkan, Bilge, Sonny van Lingen und Marco Spruit. „The Cybersecurity Focus Area Maturity (CYSFAM) Model“. Journal of Cybersecurity and Privacy 1, Nr. 1 (13.02.2021): 119–39. http://dx.doi.org/10.3390/jcp1010007.
Der volle Inhalt der QuelleP, Dr Rachana. „Strategic Approaches to Cybersecurity Audits for Control Evaluation“. INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, Nr. 12 (24.12.2024): 1–5. https://doi.org/10.55041/ijsrem40065.
Der volle Inhalt der QuelleDotsenko, T. V., und M. V. Kuzmenko. „Maturity of the country's cybersecurity system in the conditions of war: assessment trends“. Economic Bulletin of Dnipro University of Technology 87 (September 2024): 34–43. http://dx.doi.org/10.33271/ebdut/87.034.
Der volle Inhalt der QuelleAliyu, Aliyu, Leandros Maglaras, Ying He, Iryna Yevseyeva, Eerke Boiten, Allan Cook und Helge Janicke. „A Holistic Cybersecurity Maturity Assessment Framework for Higher Education Institutions in the United Kingdom“. Applied Sciences 10, Nr. 10 (25.05.2020): 3660. http://dx.doi.org/10.3390/app10103660.
Der volle Inhalt der QuellePeliukh, O. I., M. V. Yesina und D. Yu Holubnychyi. „CERT-UA assessment based on the CSIRT ENISA Maturity Model“. Radiotekhnika, Nr. 213 (16.06.2023): 41–48. http://dx.doi.org/10.30837/rt.2023.2.213.04.
Der volle Inhalt der QuelleAbdullahi Garba, Adamu, Aliyu Musa Bade, Muktar Yahuza und Ya’u Nuhu. „Cybersecurity capability maturity models review and application domain“. International Journal of Engineering & Technology 9, Nr. 3 (02.09.2020): 779. http://dx.doi.org/10.14419/ijet.v9i3.30719.
Der volle Inhalt der QuelleRazikin, Khairur, und Agus Widodo. „General Cybersecurity Maturity Assessment Model: Best Practice to Achieve Payment Card Industry-Data Security Standard (PCI-DSS) Compliance“. CommIT (Communication and Information Technology) Journal 15, Nr. 2 (31.08.2021): 91–104. http://dx.doi.org/10.21512/commit.v15i2.6931.
Der volle Inhalt der QuelleColeman, Joe. „The DOD's CMMC 2.0: What Heat Treaters Need to Know“. AM&P Technical Articles 182, Nr. 2 (01.03.2024): 37–39. http://dx.doi.org/10.31399/asm.amp.2024-02.p037.
Der volle Inhalt der QuelleAbhilash Maroju, Srinivas A Vaddadi, Sravanthi Dontu, Rohith Vallabhaneni,. „An Empirical Paradigm on Cybersecurity Vulnerability Mitigation Framework“. International Journal on Recent and Innovation Trends in Computing and Communication 11, Nr. 9s (31.08.2023): 786–92. http://dx.doi.org/10.17762/ijritcc.v11i9s.9484.
Der volle Inhalt der QuelleRoy, Yanina, Olena Riabchun und Valeriy Yermoshin. „MATURITY MODEL OF CYBER SECURITY SYSTEM OPPORTUNITIES AT CRITICAL INFRASTRUCTURE FACILITIES OF THE ES-C2M2 ENERGY SECTOR“. Cybersecurity: Education, Science, Technique 2, Nr. 10 (2020): 67–74. http://dx.doi.org/10.28925/2663-4023.2020.10.6774.
Der volle Inhalt der QuelleSabillon, Regner, Juan Ramon Bermejo Higuera, Jeimy Cano, Javier Bermejo Higuera und Juan Antonio Sicilia Montalvo. „Assessing the Effectiveness of Cyber Domain Controls When Conducting Cybersecurity Audits: Insights from Higher Education Institutions in Canada“. Electronics 13, Nr. 16 (16.08.2024): 3257. http://dx.doi.org/10.3390/electronics13163257.
Der volle Inhalt der QuelleDomnik, Jan, und Alexander Holland. „On Data Leakage Prevention Maturity: Adapting the C2M2 Framework“. Journal of Cybersecurity and Privacy 4, Nr. 2 (30.03.2024): 167–95. http://dx.doi.org/10.3390/jcp4020009.
Der volle Inhalt der QuellePatrick, Mayala, Edrick Mugisha, Keneth Mbaga und Mansour Likamba. „Cybersecurity in Tanzanian Maritime Operations: Exploring Global Best Practices and Their Local Adaptation Using the Cybersecurity Capability Maturity Model (C2M2)“. Social Science and Humanities Journal 8, Nr. 10 (26.10.2024): 5688–97. http://dx.doi.org/10.18535/sshj.v8i10.1421.
Der volle Inhalt der QuelleVarona Taborda, María Alejandra. „Dynamic Cybersecurity Model based on ISO standards for Higher Education Institutions in Colombia“. Ingeniería Solidaria 17, Nr. 3 (06.09.2021): 1–21. http://dx.doi.org/10.16925/2357-6014.2021.03.05.
Der volle Inhalt der QuelleAlmomani, Iman, Mohanned Ahmed und Leandros Maglaras. „Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia“. PeerJ Computer Science 7 (09.09.2021): e703. http://dx.doi.org/10.7717/peerj-cs.703.
Der volle Inhalt der QuellePigola, Angélica, und Priscila Rezende da Costa. „Dynamic Capabilities in Cybersecurity Intelligence: A Meta-Synthesis to Enhance Protection Against Cyber Threats“. Communications of the Association for Information Systems 53, Nr. 1 (2023): 1099–135. http://dx.doi.org/10.17705/1cais.05347.
Der volle Inhalt der QuelleUraipan, Naris, Prasong Praneetpolgrang und Tharini Manisri. „Application of an Analytic Hierarchy Process to Select the Level of a Cyber Resilient Capability Maturity Model in Digital Supply Chain Systems“. ECTI Transactions on Computer and Information Technology (ECTI-CIT) 15, Nr. 2 (27.04.2021): 198–207. http://dx.doi.org/10.37936/ecti-cit.2021152.240631.
Der volle Inhalt der QuelleFerreira, Daniel Jorge, und Henrique São Mamede. „Predicting Cybersecurity Risk - A Methodology for Assessments“. ARIS2 - Advanced Research on Information Systems Security 2, Nr. 2 (30.12.2022): 50–63. http://dx.doi.org/10.56394/aris2.v2i2.23.
Der volle Inhalt der QuelleMori, Shigeo, und Atsuhiro Goto. „Reviewing National Cybersecurity Strategies“. Journal of Disaster Research 13, Nr. 5 (01.10.2018): 957–66. http://dx.doi.org/10.20965/jdr.2018.p0957.
Der volle Inhalt der QuelleBaykız, Tekin, und Şuay Nilhan Açıkalın. „THE DIGITALIZATION OF DIPLOMACY MATURITY MODEL (DD-MM): A NEW MODEL FOR OPTIMIZING DIPLOMATIC DIGITALIZATION“. Journal of Nusantara Studies (JONUS) 9, Nr. 2 (31.07.2024): 441–73. http://dx.doi.org/10.24200/jonus.vol9iss2pp441-473.
Der volle Inhalt der QuelleHochstetter-Diez, Jorge, Mauricio Diéguez-Rebolledo, Julio Fenner-López und Cristina Cachero. „AIM Triad: A Prioritization Strategy for Public Institutions to Improve Information Security Maturity“. Applied Sciences 13, Nr. 14 (19.07.2023): 8339. http://dx.doi.org/10.3390/app13148339.
Der volle Inhalt der QuelleFleming, Courtney, Mark Reith und Wayne Henry. „Securing Commercial Satellites for Military Operations: A Cybersecurity Supply Chain Framework“. International Conference on Cyber Warfare and Security 18, Nr. 1 (28.02.2023): 85–92. http://dx.doi.org/10.34190/iccws.18.1.1062.
Der volle Inhalt der QuelleLevy, Yair, und Ruti Gafni. „Towards the quantification of cybersecurity footprint for SMBs using the CMMC 2.0“. Online Journal of Applied Knowledge Management 10, Nr. 1 (06.09.2022): 43–61. http://dx.doi.org/10.36965/ojakm.2022.10(1)43-61.
Der volle Inhalt der QuelleTabim, Verônica Maurer, Cíntia Wilke Franco und João Pedro Hoerde. „Digital transformation in e-commerce logistics“. Brazilian Journal of Operations & Production Management 21, Nr. 1 (02.03.2024): 1641. http://dx.doi.org/10.14488/bjopm.1641.2024.
Der volle Inhalt der QuelleAmanda, Delpia, Nurul Mutiah und Syahru Rahmayudha. „Analisis Tingkat Kematangan Keamanan Informasi Menggunakan NIST Cybersecurity Framework dan CMMI“. Coding Jurnal Komputer dan Aplikasi 11, Nr. 2 (01.09.2023): 291. http://dx.doi.org/10.26418/coding.v11i2.65088.
Der volle Inhalt der QuelleFajri, Khafidh Sunny Al, und Ruki Harwahyu. „Information Security Management System Assessment Model by Integrating ISO 27002 and 27004“. MALCOM: Indonesian Journal of Machine Learning and Computer Science 4, Nr. 2 (24.02.2024): 498–506. http://dx.doi.org/10.57152/malcom.v4i2.1245.
Der volle Inhalt der QuelleKvint, V. L., A. V. Babkin und E. V. Shkarupeta. „Strategizing of forming a platform operating model to increase the level of digital maturity of industrial systems“. Russian Journal of Industrial Economics 15, Nr. 3 (08.10.2022): 249–61. http://dx.doi.org/10.17073/2072-1633-2022-3-249-261.
Der volle Inhalt der QuelleMuttaqin, Hidayatul, und Kalamullah Ramli. „Designing An Information Security Framework For The Indonesia Water Industry Sector“. Cakrawala Repositori IMWI 6, Nr. 3 (07.07.2023): 771–80. http://dx.doi.org/10.52851/cakrawala.v6i3.352.
Der volle Inhalt der QuelleTolkachov, Maksym, Nataliia Dzheniuk, Serhii Yevseiev, Yurii Lysetskyi, Volodymyr Shulha, Ivan Grod, Serhii Faraon, Ihor Ivanchenko, Igor Pasko und Dmytro Balagura. „Development of a method for protecting information resources in a corporate network by segmenting traffic“. Eastern-European Journal of Enterprise Technologies 5, Nr. 9 (131) (23.10.2024): 63–78. http://dx.doi.org/10.15587/1729-4061.2024.313158.
Der volle Inhalt der QuelleGarba, Adamu Abdullahi, Maheyzah Muhamad Siraj und Siti Hajar Othman. „An Explanatory Review on Cybersecurity Capability Maturity Models“. Advances in Science, Technology and Engineering Systems Journal 5, Nr. 4 (2020): 762–69. http://dx.doi.org/10.25046/aj050490.
Der volle Inhalt der QuelleMiron, Walter, und Kevin Muita. „Cybersecurity Capability Maturity Models for Providers of Critical Infrastructure“. Technology Innovation Management Review 4, Nr. 10 (30.10.2014): 33–39. http://dx.doi.org/10.22215/timreview/837.
Der volle Inhalt der QuelleMiron, Walter, und Kevin Muita. „Cybersecurity Capability Maturity Models for Providers of Critical Infrastructure“. Technology Innovation Management Review 4, Nr. 10 (30.10.2014): 33–39. http://dx.doi.org/10.22215/timreview837.
Der volle Inhalt der QuelleKolomiyets, Ganna M., und Maryna O. Moskalenko. „Confidence-Building Challenges in e-Commerce“. Business Inform 8, Nr. 559 (2024): 224–30. http://dx.doi.org/10.32983/2222-4459-2024-8-224-230.
Der volle Inhalt der QuellePayette, Jay, Esther Anegbe, Erika Caceres und Steven Muegge. „Secure by Design: Cybersecurity Extensions to Project Management Maturity Models for Critical Infrastructure Projects“. Technology Innovation Management Review 5, Nr. 6 (26.06.2015): 26–34. http://dx.doi.org/10.22215/timreview/904.
Der volle Inhalt der QuellePayette, Jay, Esther Anegbe, Erika Caceres und Steven Muegge. „Secure by Design: Cybersecurity Extensions to Project Management Maturity Models for Critical Infrastructure Projects“. Technology Innovation Management Review 5, Nr. 6 (26.06.2015): 26–34. http://dx.doi.org/10.22215/timreview904.
Der volle Inhalt der QuelleKoolen, Christof, Kim Wuyts, Wouter Joosen und Peggy Valcke. „From insight to compliance: Appropriate technical and organisational security measures through the lens of cybersecurity maturity models“. Computer Law & Security Review 52 (April 2024): 105914. http://dx.doi.org/10.1016/j.clsr.2023.105914.
Der volle Inhalt der QuelleKour, Ravdeep, und Ramin Karim. „Cybersecurity workforce in railway: its maturity and awareness“. Journal of Quality in Maintenance Engineering ahead-of-print, ahead-of-print (18.12.2020). http://dx.doi.org/10.1108/jqme-07-2020-0059.
Der volle Inhalt der QuelleBaikloy, Ekkachat, Prasong Praneetpolgrang und Nivet Jirawichitchai. „Development of Cyber Resilient Capability Maturity Model for Cloud Computing Services“. TEM Journal, 27.08.2020, 915–23. http://dx.doi.org/10.18421/tem93-11.
Der volle Inhalt der Quelle(GCSCC), Global Cyber Security Capacity Cent. „Cybersecurity Capacity Maturity Model for Nations (CMM) 2021 Edition“. SSRN Electronic Journal, 2021. http://dx.doi.org/10.2139/ssrn.3822153.
Der volle Inhalt der Quelle(GCSCC), Global Cyber Security Capacity Cent. „Cybersecurity Capacity Maturity Model for Nations (CMM) Revised Edition“. SSRN Electronic Journal, 2016. http://dx.doi.org/10.2139/ssrn.3657116.
Der volle Inhalt der QuelleLee, GangSeok, SuHyun Kim, ImYoung Lee, Suzana Brown und Yuri Aldoradin Carbajal. „Adapting cybersecurity maturity models for resource‐constrained settings: A case study of Peru“. ELECTRONIC JOURNAL OF INFORMATION SYSTEMS IN DEVELOPING COUNTRIES, 22.10.2024. http://dx.doi.org/10.1002/isd2.12350.
Der volle Inhalt der QuelleTabansky, Lior, und Eynan Lichterman. „PROGRESS: the sectoral approach to cyber resilience“. International Journal of Information Security 24, Nr. 1 (07.11.2024). http://dx.doi.org/10.1007/s10207-024-00910-3.
Der volle Inhalt der QuelleKulugh, Victor Emmanuel, Uche M. Mbanaso und Gloria Chukwudebe. „Cybersecurity Resilience Maturity Assessment Model for Critical National Information Infrastructure“. SN Computer Science 3, Nr. 3 (10.04.2022). http://dx.doi.org/10.1007/s42979-022-01108-x.
Der volle Inhalt der QuelleJ.D., Rafael Dean Brown. „Towards a Qatar Cybersecurity Capability Maturity Model with a Legislative Framework“. International Review of Law 2018, Nr. 4 (01.12.2019). http://dx.doi.org/10.29117/irl.2018.0036.
Der volle Inhalt der QuelleSkarga-Bandurova, Inna, Igor Kotsiuba und Erkuden Rios Velasco. „Cyber Hygiene Maturity Assessment Framework for Smart Grid Scenarios“. Frontiers in Computer Science 3 (10.03.2021). http://dx.doi.org/10.3389/fcomp.2021.614337.
Der volle Inhalt der QuelleVance, David, Mingzhou Jin, Christopher Price, Sachin U. Nimbalkar und Thomas Wenning. „Smart manufacturing maturity models and their applicability: a review“. Journal of Manufacturing Technology Management, 26.04.2023. http://dx.doi.org/10.1108/jmtm-03-2022-0103.
Der volle Inhalt der Quelle„INTEGRATING CYBERSECURITY MATURITY: A HYBRID MODEL FOR BOTH TRADITIONAL ENVIRONMENT AND CLOUD ENVIRONMENT“. International Research Journal of Modernization in Engineering Technology and Science, 24.12.2023. http://dx.doi.org/10.56726/irjmets47210.
Der volle Inhalt der QuelleAlshammari, Fahad H. „Design of capability maturity model integration with cybersecurity risk severity complex prediction using bayesian-based machine learning models“. Service Oriented Computing and Applications, 15.11.2022. http://dx.doi.org/10.1007/s11761-022-00354-4.
Der volle Inhalt der QuelleHedberg, David, Martin Lundgren und Marcus Nohlberg. „Cybersecurity in modern cars: awareness and readiness of auto workshops“. Information & Computer Security, 01.02.2024. http://dx.doi.org/10.1108/ics-11-2023-0211.
Der volle Inhalt der Quelle