Academic literature on the topic 'Cyber security management tool'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyber security management tool.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cyber security management tool"
Štitilis, Darius, Irmantas Rotomskis, Marius Laurinaitis, Sergiy Nadvynychnyy, and Nadiya Khorunzhak. "National cyber security strategies: management, unification and assessment." Independent Journal of Management & Production 11, no. 9 (November 1, 2020): 2341. http://dx.doi.org/10.14807/ijmp.v11i9.1431.
Full textFakiha, Bandr. "Business Organization Security Strategies to Cyber Security Threats." International Journal of Safety and Security Engineering 11, no. 1 (February 28, 2021): 101–4. http://dx.doi.org/10.18280/ijsse.110111.
Full textСуворов, Александр, Aleksandr Suvorov, Мария Матанцева, Mariya Matanceva, Евгения Плотникова, and Evgeniya Plotnikova. "Cyber Insurance as a Way of Cyber Risks Management." Safety in Technosphere 7, no. 5 (November 19, 2019): 35–42. http://dx.doi.org/10.12737/article_5d8b1f1205ad35.02378913.
Full textSvilicic, Boris, Junzo Kamahara, Matthew Rooks, and Yoshiji Yano. "Maritime Cyber Risk Management: An Experimental Ship Assessment." Journal of Navigation 72, no. 5 (February 7, 2019): 1108–20. http://dx.doi.org/10.1017/s0373463318001157.
Full textKaragozlu, Damla. "Determination of cyber security ensuring behaviours of pre-service teachers." Cypriot Journal of Educational Sciences 15, no. 6 (December 31, 2020): 1698–706. http://dx.doi.org/10.18844/cjes.v15i6.5327.
Full textKachynskyi, A. B., and M. S. Stremetska. "Operational analytics as a data monitoring and event management tool of the cyber security management systems." Reports of the National Academy of Sciences of Ukraine, no. 1 (February 2021): 9–16. http://dx.doi.org/10.15407/dopovidi2021.01.009.
Full textRusso, Pietro, Alberto Caponi, Marco Leuti, and Giuseppe Bianchi. "A Web Platform for Integrated Vulnerability Assessment and Cyber Risk Management." Information 10, no. 7 (July 17, 2019): 242. http://dx.doi.org/10.3390/info10070242.
Full textAtoum, Issa, Ahmed Otoom, and Amer Abu Ali. "A holistic cyber security implementation framework." Information Management & Computer Security 22, no. 3 (July 8, 2014): 251–64. http://dx.doi.org/10.1108/imcs-02-2013-0014.
Full textPavlík, Lukáš, Ekaterina Chytilová, and Jarmila Zimmermannová. "Security Aspects of Healthcare Organization from the Perspective of Digitization of Facility Management." WSEAS TRANSACTIONS ON BUSINESS AND ECONOMICS 18 (January 25, 2021): 360–66. http://dx.doi.org/10.37394/23207.2021.18.36.
Full textComizio, V. Gerard, Behnam Dayanim, and Laura Bain. "Cybersecurity as a global concern in need of global solutions: an overview of financial regulatory developments in 2015." Journal of Investment Compliance 17, no. 1 (May 3, 2016): 101–11. http://dx.doi.org/10.1108/joic-01-2016-0003.
Full textDissertations / Theses on the topic "Cyber security management tool"
Strachová, Zuzana. "Implementace nástroje pro řízení kybernetické bezpečnosti." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2021. http://www.nusl.cz/ntk/nusl-444573.
Full textPech, Jan. "Aplikace zákona a vyhlášky o kybernetické bezpečnosti na úřadech státní správy." Master's thesis, Vysoká škola ekonomická v Praze, 2016. http://www.nusl.cz/ntk/nusl-203989.
Full textJohansson, Dan. "Empirical test of a tool for cyber security vulnerability assessment." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-176032.
Full textDenna rapport beskriver en studie vars mål var att verifiera ett modelleringsspråk för datasäkerhet vid namn Predictive, Probabilistic Cyber Security Modelling Language. Detta modelleringsspråk tillsammans med Enterprise Architecture Analysis Tool utgör ett verktyg för datasäkerhetsutvärderingar av systemarkitekturer. För att verifiera exaktheten och mognadsnivån på verktyget så skapades en generisk modell av ett verkligt Supervisory Control And Data Acquisition System-systems arkitektur. Denna modell utvärderades i ett senare skede. Utvärderingsprocessen bestod av ett Turingtest, som är samma metod som användes i en tidigare utvärdering av Predictive, Probabilistic Cyber Security Modelling Languages föregångare Cyber Security Modelling Language. För Turingtestet hölls fem intervjuer med domänexperter inom datasäkerhet. Fyra av dessa fick i uppgift att skapa attackvägar givet ett scenario i den modellerade systemarkitekturen. Attackvägarna som skapades sammanställdes i ett standardiserat formulär för den sista interna företagsexperten inom datasäkerhet att utvärdera. En expertutvärderare fick i uppgift att betygsätta de attackvägar som hade producerats av de fyra experterna och Predictive, Probabilistic Cyber Security Modelling Language. Betygsättningen baserades på hur sannolika de olika attackvägarna uppfattades av den interna experten. Slutsatsen som gjordes var att givet begränsningarna i studien, så producerade Predictive, Probabilistic Cyber Security Modelling Language en datasäkerhetsutvärdering som var likvärdigt sannolik jämfört med de som skapades av mänskliga experter. Resultaten som producerades var också konsistenta med resultaten som producerades av Predictive, Probabilistic Cyber Security Modelling Language föregångare Cyber Security Modelling Language i en tidigare studie. Förslag på kommande studier som skulle komplettera denna studie och stärka resultaten ytterligare introducerades också. Detta examensarbete var ett samarbete mellan ABB Enterprise Software och medlemmarna i teamet bakom Predictive, Probabilistic Cyber Security Modelling Language på ICS på KTH.
Moe, Lwin P. "Cyber security risk analysis framework : network traffic anomaly detection." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/118536.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (pages 84-86).
Cybersecurity is a growing research area with direct commercial impact to organizations and companies in every industry. With all other technological advancements in the Internet of Things (IoT), mobile devices, cloud computing, 5G network, and artificial intelligence, the need for cybersecurity is more critical than ever before. These technologies drive the need for tighter cybersecurity implementations, while at the same time act as enablers to provide more advanced security solutions. This paper will discuss a framework that can predict cybersecurity risk by identifying normal network behavior and detect network traffic anomalies. Our research focuses on the analysis of the historical network traffic data to identify network usage trends and security vulnerabilities. Specifically, this thesis will focus on multiple components of the data analytics platform. It explores the big data platform architecture, and data ingestion, analysis, and engineering processes. The experiments were conducted utilizing various time series algorithms (Seasonal ETS, Seasonal ARIMA, TBATS, Double-Seasonal Holt-Winters, and Ensemble methods) and Long Short-Term Memory Recurrent Neural Network algorithm. Upon creating the baselines and forecasting network traffic trends, the anomaly detection algorithm was implemented using specific thresholds to detect network traffic trends that show significant variation from the baseline. Lastly, the network traffic data was analyzed and forecasted in various dimensions: total volume, source vs. destination volume, protocol, port, machine, geography, and network structure and pattern. The experiments were conducted with multiple approaches to get more insights into the network patterns and traffic trends to detect anomalies.
by Lwin P. Moe.
S.M. in Engineering and Management
Ellithorpe, James O. "The Role and Impact of Cyber Security Mentoring." Thesis, Walden University, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10126660.
Full textBusiness organizations are faced with an enormous challenge to improve cyber security, as breeches and lapses through firewalls are increasingly commonplace. The Chief Information Security Officer (CISO) and Information Technology (IT) staff are constantly challenged to identify and purge online and network structural weaknesses. The goal is to reduce overall business risk because unresolved risks are a constant concern to consumers who are uneasy about cyber security failures. The purpose of this general qualitative study was to examine the role and impact of Cyber Security Mentoring (CSM) from the perspectives of the workplace CISO, mentors, and protégés, who were randomly polled from various workplace settings across the United States. Mentoring allows IT staff members to learn from their CISOs and from workplace mentor mistakes and successes. Workplace IT staff are also closest to the various attack methodologies used by cyber hackers, and cohort and dyadic mentoring may provide insight into and responding to cyber-attacks and improving cyber defenses. Sixty-eight sets of respondent data relating to field experience, formal education, professional industry cyber security certifications, and mentoring were compared and examined between respondents. The goal was to determine where respondents agreed and disagreed on issues pertaining to cyber security and CSM. The findings suggested that CSM with a qualified mentor could improve cyber security in the workplace; in addition, more time must be devoted to continued professional education. Implications for positive social change included the use of CSM to enhance cyber security through the sharing of incidents, mindsets, procedures and expertise, and improvement of customer-consumer security confidence.
Cook, Kimberly Diane. "Effective Cyber Security Strategies for Small Businesses." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3871.
Full textSalim, Hamid M. "Cyber safety : a systems thinking and systems theory approach to managing cyber security risks." Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/90804.
Full textThesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2014.
93
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 148-156).
If we are to manage cyber security risks more effectively in today's complex and dynamic Web 2.0 environment, then a new way of thinking is needed to complement traditional approaches. According to Symantec's 2014 Internet Security Threat Report, in 2012 more than ten million identities that included real names, dates of birth, and social security were exposed by a single breach. In 2013 there were eight breaches that each exposed over ten million identities. These breaches were recorded despite the fact that significant resources are expended, on managing cyber security risks each year by businesses and governments. The objective of this thesis was twofold. The first objective was to understand why traditional approaches for managing cyber security risks were not yielding desired results. Second, propose a new method for managing cyber security risks more effectively. The thesis investigated widely used approaches and standards, and puts forward a method based on the premise that traditional technology centric approaches have become ineffective on their own. This lack of efficacy can be attributed primarily to the fact that, Web 2.0 is a dynamic and a complex socio-technical system that is continuously evolving. This thesis proposes a new method for managing cyber security risks based on a model for accident or incident analysis, used in Systems Safety field. The model is called System-Theoretic Accident Model and Processes (STAMP). It is rooted in Systems Thinking and Systems Theory. Based on a case study specifically written for this thesis, the largest cyber-attack reported in 2007 on a major US based retailer, is analyzed using the STAMP model. The STAMP based analysis revealed insights both at systemic and detailed level, which otherwise would not be available, if traditional approaches were used for analysis. Further, STAMP generated specific recommendations for managing cyber security risks more effectively.
by Hamid M. Salim.
S.M. in Engineering and Management
S.M.
Dutta, Saurabh. "Striking a balance between usability and cyber-security in IoT devices/." Thesis, Massachusetts Institute of Technology, 2017. http://hdl.handle.net/1721.1/113508.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (pages 67-74).
Today more and more physical objects are being connected to internet. The Internet of Things, or loT, is dramatically changing the way of living and the way we interact with things and each other. Home doors can be opened remotely with a watch, cars' performance can be upgraded remotely, devices monitor health and send updates to physicians remotely. loT technology has made some labor-intensive jobs simple and has the potential to simplify and enhance nearly every aspect of our lives. On the other hand, increased levels of high profile cyber security breaches in recent years have made it clear how important it is to make sure these devices are trustworthy and secure. While most users are aware of how critical it is to secure their laptops, mobile devices, and apps, due to the seamless ways in which loT devices integrates into our daily lives, users are often unaware of risks associated with them. At the same time, IoT device makers are aggressively releasing new products in a mad race to establish themselves in this emerging market. Increased pressure to differentiate on usability based functionalities has spurred products and features that are not properly vetted for security. Gartner predicts that by 2020, more than 25% of identified enterprise attacks will involve IoT, though loT will account for only 10% of IT security budgets. As loT continues to grow, vendors will favor usability over security and IT security practitioners remain unsure of the correct amount of acceptable risk.
by Saurabh Dutta.
S.M. in Engineering and Management
Sheen, Frank Jordan. "An Extensible Technology Framework for Cyber Security Education." BYU ScholarsArchive, 2015. https://scholarsarchive.byu.edu/etd/4375.
Full textReid, Rayne. "A brain-compatible approach to the presentation of cyber security educational material." Thesis, Nelson Mandela Metropolitan University, 2012. http://hdl.handle.net/10948/d1019895.
Full textBooks on the topic "Cyber security management tool"
Cyber security essentials. Boca Raton: Auerbach Publications, 2010.
Find full textUnited States. Dept. of Energy. Office of Audit Services. Audit report: The department's cyber security incident management capability. Washington, DC: Office of Inspector General, Dept. of Energy, 2008.
Find full textUnited States. Dept. of Energy. Office of Audit Services. Audit report: The department's cyber security incident management capability. [Washington, DC: Office of Inspector General, Dept. of Energy, 2008.
Find full textGustin, Joseph F. Cyber terrorism: A guide for facility managers. Lilburn, Ga: Fairmont Press, 2004.
Find full textScott, Lynn M. Human capital management for the USAF cyber force. Santa Monica, CA: RAND Project Air Force, 2010.
Find full textCyber challenges and national security: Threats, opportunities, and power in a virtual world. Washington, D.C: Georgetown University Press, 2012.
Find full textUnited States. Dept. of Energy. Office of Audit Services. Management controls over the Federal Energy Regulatory Commission's unclassified cyber security program, 2006. Washington, D.C: U.S. Department of Energy, Office of Inspector General, 2006.
Find full textCyber terrorism: Political and economic implications. Hershey, PA: Idea Group Pub., 2006.
Find full textCriminal major case management: Persons of Interest Priority Assessment Tool (POIPAT). Boca Raton: Taylor & Francis, 2012.
Find full textBuford, John F. Koegel. Cyber security, situation management, and impact assessment II and visual analytics for homeland defense and security II: 5 and 8-9 April 2010, Orlando, Florida, United States. Bellingham, Wash: SPIE, 2010.
Find full textBook chapters on the topic "Cyber security management tool"
Rajamäki, Jyri. "Cyber Security, Trust-Building, and Trust-Management: As Tools for Multi-agency Cooperation Within the Functions Vital to Society." In Cyber-Physical Security, 233–49. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-32824-9_12.
Full textAlsmadi, Izzat. "Cyber Security Management." In The NICE Cyber Security Framework, 243–51. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-02360-7_10.
Full textBurghouwt, Pieter, Marinus Maris, Sjaak van Peski, Eric Luiijf, Imelda van de Voorde, and Marcel Spruit. "Cyber Targets Water Management." In Critical Information Infrastructures Security, 38–49. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-71368-7_4.
Full textDavis, Robert E. "Security Governance Management." In Auditing Information and Cyber Security Governance, 74–107. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003099673-3.
Full textTawalbeh, Lo’ai. "Network Management." In The NICE Cyber Security Framework, 99–115. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41987-5_5.
Full textTawalbeh, Lo’ai. "Risk Management." In The NICE Cyber Security Framework, 117–30. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41987-5_6.
Full textAlsmadi, Izzat. "Software Management." In The NICE Cyber Security Framework, 131–74. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41987-5_7.
Full textAlsmadi, Izzat. "Identity Management." In The NICE Cyber Security Framework, 313–29. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-02360-7_12.
Full textAlsmadi, Izzat. "Acquisition Management." In The NICE Cyber Security Framework, 9–40. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-02360-7_2.
Full textAlsmadi, Izzat. "Information Systems Security Management." In The NICE Cyber Security Framework, 31–53. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41987-5_2.
Full textConference papers on the topic "Cyber security management tool"
Ekstedt, Mathias, Pontus Johnson, Robert Lagerstrom, Dan Gorton, Joakim Nydren, and Khurram Shahzad. "Securi CAD by Foreseeti: A CAD Tool for Enterprise Cyber Security Management." In 2015 IEEE 19th International Enterprise Distributed Object Computing Workshop (EDOCW). IEEE, 2015. http://dx.doi.org/10.1109/edocw.2015.40.
Full textAlmroth, Jonas, and Tommy Gustafsson. "CRATE Exercise Control – A cyber defense exercise management and support tool." In 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, 2020. http://dx.doi.org/10.1109/eurospw51379.2020.00014.
Full textHuang, Yi, Jayanta Debnath, Michaela Iorga, Anup Kumar, and Bin Xie. "CSAT: A User-interactive Cyber Security Architecture Tool based on NIST-compliance Security Controls for Risk Management." In 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON). IEEE, 2019. http://dx.doi.org/10.1109/uemcon47517.2019.8993090.
Full textGavėnaitė-Sirvydienė, Julija, and Algita Miečinskienė. "FORECASTING COSTS OF CYBER ATTACKS USING ESTIMATION THE GLOBAL COST OF CYBER RISK CALCULATOR V 1.2." In International Scientific Conference „Contemporary Issues in Business, Management and Economics Engineering". Vilnius Gediminas Technical University, 2021. http://dx.doi.org/10.3846/cibmee.2021.618.
Full textMassel, Liudmila, and Vladimir Kuzmin. "Tools for Strategic Decision Support in Energy Sector Based on Situation Management and Semantic Modeling." In Vth International workshop "Critical infrastructures: Contingency management, Intelligent, Agent-based, Cloud computing and Cyber security" (IWCI 2018). Paris, France: Atlantis Press, 2018. http://dx.doi.org/10.2991/iwci-18.2018.23.
Full textKhayrullina, Elena. "Methodical Approach and Tools for Creating and Modifying Ontology-based Information System." In Proceedings of the VIth International Workshop 'Critical Infrastructures: Contingency Management, Intelligent, Agent-Based, Cloud Computing and Cyber Security' (IWCI 2019). Paris, France: Atlantis Press, 2019. http://dx.doi.org/10.2991/iwci-19.2019.4.
Full textPavlov, Alexander, and Alexander Stolbov. "The Application of the Knowledge-Based Systems Development Platform for Creating Scenario Analysis Support Tools." In Proceedings of the VIth International Workshop 'Critical Infrastructures: Contingency Management, Intelligent, Agent-Based, Cloud Computing and Cyber Security' (IWCI 2019). Paris, France: Atlantis Press, 2019. http://dx.doi.org/10.2991/iwci-19.2019.8.
Full textKawano, K. "Cyber security threat management." In IEE Seminar on Security of Distributed Control Systems. IEEE, 2005. http://dx.doi.org/10.1109/iee.2005.201377.
Full textKawano, K. "Cyber security threat management." In IEE Seminar on Security of Distributed Control Systems. IEE, 2005. http://dx.doi.org/10.1049/ic:20050259.
Full textRajput, Prashant Hari Narayan, and Michail Maniatakos. "JTAG: A Multifaceted Tool for Cyber Security." In 2019 IEEE 25th International Symposium on On-Line Testing And Robust System Design (IOLTS). IEEE, 2019. http://dx.doi.org/10.1109/iolts.2019.8854430.
Full textReports on the topic "Cyber security management tool"
Nielsen, Roy S. CS651 Computer Systems Security Foundations 3d Imagination Cyber Security Management Plan. Office of Scientific and Technical Information (OSTI), March 2015. http://dx.doi.org/10.2172/1171665.
Full textEdgar, Thomas W. Conformance Tool High Level Design Document: IEC 61850 Cyber Security Acceleration Project. Office of Scientific and Technical Information (OSTI), May 2013. http://dx.doi.org/10.2172/1134528.
Full textHaller, John, Samuel A. Merrell, Matthew J. Butkovic, and Bradford J. Willke. Best Practices for National Cyber Security: Building a National Computer Security Incident Management Capability. Fort Belvoir, VA: Defense Technical Information Center, June 2010. http://dx.doi.org/10.21236/ada536721.
Full textLong, Michael, Daniel Bush, Stephen Briggs, Tapan Patel, Eileen Westervelt, Daniel Shepard, Eric Lynch, and David Schwenk. An Army guide to navigating the cyber security process for Facility Related Control Systems : cybersecurity and risk management framework explanations for the real world. Engineer Research and Development Center (U.S.), January 2020. http://dx.doi.org/10.21079/11681/35294.
Full textRico, Helen M., Fred Hall, II Maciolek, and Michael J. From Garage-Band to World Tour: Technical, Security, and Scalability Challenges of a Web-Based Program Management Tool from Workgroup-Level to Enterprise-Class in 24 Months. Fort Belvoir, VA: Defense Technical Information Center, June 2004. http://dx.doi.org/10.21236/ada465793.
Full textHoward, Heidi, Chad Helmle, Raina Dwivedi, and Daniel Gambill. Stormwater Management and Optimization Toolbox. Engineer Research and Development Center (U.S.), January 2021. http://dx.doi.org/10.21079/11681/39480.
Full text