Academic literature on the topic 'Cybersecurity frameworks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cybersecurity frameworks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cybersecurity frameworks"
Taherdoost, Hamed. "Understanding Cybersecurity Frameworks and Information Security Standards—A Review and Comprehensive Overview." Electronics 11, no. 14 (July 12, 2022): 2181. http://dx.doi.org/10.3390/electronics11142181.
Full textAlghamdi, Ahmed. "Comparative Analysis of ISO27001 and NIST CSF." International Journal of Membrane Science and Technology 10, no. 4 (September 30, 2023): 1423–29. http://dx.doi.org/10.15379/ijmst.v10i4.2258.
Full textMelaku, Henock Mulugeta. "A Dynamic and Adaptive Cybersecurity Governance Framework." Journal of Cybersecurity and Privacy 3, no. 3 (June 30, 2023): 327–50. http://dx.doi.org/10.3390/jcp3030017.
Full textLee, In. "Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management." Future Internet 12, no. 9 (September 18, 2020): 157. http://dx.doi.org/10.3390/fi12090157.
Full textDedeke, Adenekan, and Katherine Masterson. "Contrasting cybersecurity implementation frameworks (CIF) from three countries." Information & Computer Security 27, no. 3 (July 8, 2019): 373–92. http://dx.doi.org/10.1108/ics-10-2018-0122.
Full textMalatji, Masike, Annlizé L. Marnewick, and Suné Von Solms. "Cybersecurity capabilities for critical infrastructure resilience." Information & Computer Security 30, no. 2 (October 14, 2021): 255–79. http://dx.doi.org/10.1108/ics-06-2021-0091.
Full textMalatji, Masike, Annlizé L. Marnewick, and Suné Von Solms. "Cybersecurity capabilities for critical infrastructure resilience." Information & Computer Security 30, no. 2 (October 14, 2021): 255–79. http://dx.doi.org/10.1108/ics-06-2021-0091.
Full textMPHATHENI, Mandlenkosi Richard. "Cybersecurity: An Appraisal of Policy Frameworks and Related Conventions." International Journal of Information Security and Cybercrime 12, no. 1 (June 28, 2023): 45–60. http://dx.doi.org/10.19107/ijisc.2023.01.06.
Full textAlSagri, Hatoon S., Shahab Saquib Sohail, and Shiju Sebastian. "The role of deep reinforcement learning in developing adaptive cybersecurity defenses for smart grid systems." Journal of Information and Optimization Sciences 45, no. 8 (2024): 2299–307. https://doi.org/10.47974/jios-1807.
Full textShelly, Elizabeth. "Cybersecurity Frameworks for Cloud Computing Environments." International Journal of Computing and Engineering 6, no. 1 (July 12, 2024): 30–44. http://dx.doi.org/10.47941/ijce.2058.
Full textDissertations / Theses on the topic "Cybersecurity frameworks"
Smith, Willarvis. "A Comprehensive Cybersecurity Defense Framework for Large Organizations." Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1083.
Full textRaina, Ravi. "A systems perspective on cybersecurity in the cloud : frameworks, metrics and migration strategy." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/107602.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (pages 119-124).
Cloud computing represents the next generation of disruptive technologies in computing. However, there are several barriers to massive adoption of cloud and among them security remains one of the principal concerns. Traditional failure analysis and prevention frameworks fall exceedingly short to address cybersecurity as is evident by every increasing cybersecurity breaches. New frameworks for cybersecurity are required which take a holistic view of the problem and a systems perspective. Migrating to cloud also represents a key decision point for CEO/CTO's today, especially from security perspective. The objective of this thesis is to illustrate the effectiveness of taking a Systems Approach to cybersecurity and provide a framework for migration to cloud with specific emphasis on critical cybersecurity issues pertaining to various cloud deployment models and delivery services. The thesis is divided into three phases. Firstly, it will aim to explore the major security threats and critical areas of focus for security in cloud. It will explore the major security frameworks, metrics and controls, especially the major ones from NIST, CIS and CSA. SLA's for different cloud service models will then be presented. A high level cloud migration framework strategy and framework, with special emphasis on cybersecurity will also be discussed. In the second phase, System- Theoretic Accident Model and Processes (STAMP) which is based on Systems Theory will be applied to Target security breach and key recommendations as well as new insights will be presented. The analysis will highlight the need for holistic approach and Systems Thinking to cybersecurity and new insights that are not produced by traditional methods will be presented. Finally, in the third phase, the cloud migration framework discussed in phase one will be applied to Target. A case will be made that in certain scenarios, moving the less critical applications to cloud and utilizing the security benefits of cloud can actually reduce the threat vectors and security exposures and bring IT systems from a higher risk state to lower risk state. The thesis integrates cybersecurity methods and frameworks as well as security metrics with the cloud migration strategy. Additionally, it also presents STAMP/CAST failure model for cybersecurity breaches and highlights the need for integrated view of safety and security and Systems Thinking in cybersecurity both in traditional systems and cloud.
by Ravi Raina.
S.M. in Engineering and Management
Yu, Xiaodong. "Algorithms and Frameworks for Accelerating Security Applications on HPC Platforms." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/93510.
Full textDoctor of Philosophy
Typical cybersecurity solutions emphasize on achieving defense functionalities. However, execution efficiency and scalability are equally important, especially for the real-world deployment. Straightforward mappings of applications onto High-Performance Computing (HPC) platforms may significantly underutilize the HPC devices’ capacities. In this dissertation, we demonstrate how application-specific characteristics can be leveraged to optimize various types of HPC executions for cybersecurity. We investigate several sub-areas, including mobile software security, network security, and system security. For example, we present a new GPU-assisted framework and a collection of optimization strategies for fast Android static data-flow analysis that achieve up to 128X speedups against the unoptimized GPU implementation. For network intrusion detection systems (IDS), we design and implement an algorithm capable of eliminating the state explosion in out-of-order packet situations, which reduces up to 400X of the memory overhead. We also present tools for improving the usability of HPC programming. To study the cache configurations’ impact on time-driven cache side-channel attacks’ performance, we design an approach to conducting comparative measurement. We propose a quantifiable success rate metric to measure the performance of time-driven cache attacks and utilize the GEM5 platform to emulate the configurable cache.
Hedåker, Johanna. "Ramverk för cybersäkerhet: Möjligheter och begränsningar." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20211.
Full textAs the technological advancements of our society continue to thrive, there is a need foran exponential growth in the field of cybersecurity. Trends suggest this has not beenthe case and the amount of data- and security breaches has drastically increased overthe past few years. Earlier studies suggest that these incidents could be prevented, orat least limited, by implementing modern cyber security frameworks, such as CISCritical Security Controls.The main aim of this study is to, by conducting an initial investigative survey, examine the existing opinions of professionals from the cybersecurity industry regardingthe significance and effects of implementing such cyber security frameworks.The results of our initial study suggest that cyber security frameworks could contribute to a both sufficient and substantial level of security. However, some caution shouldbe taken into consideration as the frameworks require both experience and adaptation. Furthermore, our results also show that there is a need to introduce basic cybersecurity competence in education, including education traditionally considered to beoutside the field of cybersecurity, as a result of the transformed digital environment.
Kuznietsova, Tetiania, and Andrii Chyrkov. "State and perspectives of aircraft cybersecurity." Thesis, National aviation university, 2021. https://er.nau.edu.ua/handle/NAU/50678.
Full textCamporesi, Mirko. "Securopoly: un gioco per l'insegnamento della Cybersecurity." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/13274/.
Full textLeon, Ryan James. "An Event Management Framework to Aid Solution Providers in Cybersecurity." Thesis, The George Washington University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10745141.
Full textCybersecurity event management is critical to the successful accomplishment of an organization’s mission. To put it in perspective, in 2016 Symantec tracked over 700 global adversaries and recorded events from 98 million sensors (Aimoto et al., 2017). Studies show that in 2015, more than 55% of the cyberattacks on government operation centers were due to negligence and the lack of skilled personnel to perform network security duties including the failure to properly identify events (Ponemon, 2015a). Practitioners are charged to perform as first responders to any event that affects the network. Inconsistencies and errors that occur at this level can determine the outcome of an event.
In a time when 91% of Americans believe they have lost control over how information is collected and secured, there is nothing more dangerous than thinking new technology is not vulnerable to attacks (Rainie, 2016). Assailants target those with weak security postures who are unprepared, distracted or lack fundamental elements to identify significant events and secure the environment.
Under executive order, to address these concerns organizations such as the National Institute of Standards and Technology (NIST) and International Organization of Standards (ISO) developed cybersecurity frameworks, which have been widely accepted as industry standards. These standards focus on business drivers to guide cybersecurity activities and risks within critical infrastructure. It outlines a set of cybersecurity activities, references, and outcomes that can be used to align its cyber activities with business requirements at a high-level.
This praxis explores the solution provider’s role in and method of securing environments through their event management practices. Solution providers are a critical piece of proper event management. They are often contracted to provide solutions that adhere to a NIST type framework with little to no guidance. There are supportive documents and guides for event management but nothing substantive like the Cybersecurity Framework and ISO 27001 has been adopted. Using existing processes and protocols an event management framework is proposed that can be utilized to properly manage events and aid solution providers in their cybersecurity mission.
Knowledge of event management was captured through subject matter expertise and supported through literature review and investigation. Statistical methods were used to identify deficiencies in cyber operations that would be worth addressing in an event management framework.
Snyder, Justin Charles. "A Framework and Exploration of a Cybersecurity Education Escape Room." BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/6958.
Full textNewby, Chandler Ryan. "Designing Cybersecurity Competitions in the Cloud: A Framework and Feasibility Study." BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/7417.
Full textCornel, Caralea May. "A Methodology to Measure the Impact of Diversity on Cybersecurity Team Effectiveness." BYU ScholarsArchive, 2019. https://scholarsarchive.byu.edu/etd/8594.
Full textBooks on the topic "Cybersecurity frameworks"
United States. Congress. House. Committee on Homeland Security. Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. Oversight of Executive Order 13636 and development of the cybersecurity framework: Hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, first session, July 18, 2013. Washington: U.S. Government Printing Office, 2014.
Find full textMaksurov, Aleksey. Ensuring information security on the Internet. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1942595.
Full textShah, Imdad Ali, Samina Rajper, and Noor Zaman. Cybersecurity Measures for e-Government Frameworks. IGI Global, 2021.
Find full textZaman, Noor, Imdad Ali Shah, and Samina Rajper, eds. Cybersecurity Measures for E-Government Frameworks. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-7998-9624-1.
Full textShah, Imdad Ali, Samina Rajper, and Noor Zaman. Cybersecurity Measures for e-Government Frameworks. IGI Global, 2022.
Find full textShah, Imdad Ali, Samina Rajper, and Noor Zaman. Cybersecurity Measures for e-Government Frameworks. IGI Global, 2022.
Find full textShah, Imdad Ali, Samina Rajper, and Noor Zaman. Cybersecurity Measures for e-Government Frameworks. IGI Global, 2022.
Find full textShah, Imdad Ali, Samina Rajper, and Noor Zaman. Cybersecurity Measures for e-Government Frameworks. IGI Global, 2022.
Find full textBelli, Luca. CyberBRICS: Mapping Cybersecurity Frameworks in the BRICS. Springer International Publishing AG, 2021.
Find full textQuest to Cyber Superiority: Cybersecurity Regulations, Frameworks, and Strategies of Major Economies. Springer, 2016.
Find full textBook chapters on the topic "Cybersecurity frameworks"
Donaldson, Scott E., Stanley G. Siegel, Chris K. Williams, and Abdul Aslam. "Cybersecurity Frameworks." In Enterprise Cybersecurity, 297–309. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4302-6083-7_17.
Full textWeis, Dan. "Cybersecurity Frameworks." In Boardroom Cybersecurity, 55–75. Berkeley, CA: Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0785-5_5.
Full textManjikian, Mary. "Three Ethical Frameworks." In Cybersecurity Ethics, 23–42. 2nd ed. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003248828-3.
Full textDonaldson, Scott E., Stanley G. Siegel, Chris K. Williams, and Abdul Aslam. "Mapping Against Cybersecurity Frameworks." In Enterprise Cybersecurity, 231–39. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4302-6083-7_13.
Full textThompson, Eric C. "Incident Response Frameworks." In Cybersecurity Incident Response, 17–46. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3870-7_3.
Full textDonaldson, Scott E., Stanley G. Siegel, Chris K. Williams, and Abdul Aslam. "Mapping Against Cybersecurity Frameworks." In Enterprise Cybersecurity Study Guide, 429–47. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3258-3_13.
Full textAlexander, Richard D., and Srinivas Panguluri. "Cybersecurity Terminology and Frameworks." In Cyber-Physical Security, 19–47. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-32824-9_2.
Full textLoi, Michele, and Markus Christen. "Ethical Frameworks for Cybersecurity." In The International Library of Ethics, Law and Technology, 73–95. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-29053-5_4.
Full textSchoenherr, F. Jordan Richard, and Robert Thomson. "Ethical Frameworks for Cybersecurity." In The Frontlines of Artificial Intelligence Ethics, 141–61. New York: Routledge, 2022. http://dx.doi.org/10.4324/9781003030928-12.
Full textDeutscher, Stefan A., and William Yin. "Standards and Frameworks for Cybersecurity." In The Cyber Risk Handbook, 81–96. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2017. http://dx.doi.org/10.1002/9781119309741.ch6.
Full textConference papers on the topic "Cybersecurity frameworks"
Kumar Jain, Yogesh, CA Dhaarna Singh Rathore, Anjani Johrawanshi, Manish Gupta, Deepak Kumar Choudhary, and Ankur Pandey. "Cybersecurity Frameworks: A Roadmap for Business Resilience." In 2024 International Conference on Cybernation and Computation (CYBERCOM), 102–8. IEEE, 2024. https://doi.org/10.1109/cybercom63683.2024.10803234.
Full textLatoni, Anthony, and Xiaowen Zhang. "Enhancing Cybersecurity in Healthcare 5.0 Through Innovative Frameworks." In 2024 IEEE Long Island Systems, Applications and Technology Conference (LISAT), 1–6. IEEE, 2024. https://doi.org/10.1109/lisat63094.2024.10808000.
Full textHanson, Danielle, and Jeremy Straub. "A Systematic Review of Cybersecurity Audit Frameworks for the Internet of Things." In 2024 IEEE International Conference on Cyber Security and Resilience (CSR), 133–38. IEEE, 2024. http://dx.doi.org/10.1109/csr61664.2024.10679377.
Full textRamesh, Keshav, Nikita Christ Miller, Aariz Faridi, Fadi Aloul, Imran Zualkernan, and Ali Reza Sajun. "Efficient Machine Learning Frameworks for Strengthening Cybersecurity in Internet of Medical Things (IoMT) Ecosystems." In 2024 IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS), 92–98. IEEE, 2024. https://doi.org/10.1109/iotais64014.2024.10799438.
Full textPandey, Radhika, Shaik Anjimoon, V. Asha, Atul Singla, Irfan Khan, and Zain Alabdeen Hasan Abed. "Developing Robust Cybersecurity Policies and Governance Frameworks in Response to Evolving Legal and Regulatory Landscapes." In 2024 OPJU International Technology Conference (OTCON) on Smart Computing for Innovation and Advancement in Industry 4.0, 1–6. IEEE, 2024. http://dx.doi.org/10.1109/otcon60325.2024.10687438.
Full textSheh, R., K. Geappen, and D. Harriss. "AUTONOMOUS CYBERSECURITY AND AI RISK MANAGEMENT FOR UNCREWED SYSTEMS: CHALLENGES AND OPPORTUNITIES USING THE NIST FRAMEWORKS." In XPONENTIAL 2024, 46–67. Arlington, Virginia, USA: Association for Unmanned Vehicle Systems International, 2024. http://dx.doi.org/10.52202/075106-0003.
Full textMarek, James. "Cybersecurity and Risk Management Framework in Avionics." In Vertical Flight Society 74th Annual Forum & Technology Display, 1–10. The Vertical Flight Society, 2018. http://dx.doi.org/10.4050/f-0074-2018-12893.
Full textChew, M. D., and J. Buongiorno. "A Cybersecurity Framework For Nuclear Microreactors." In 2024 International Congress on Advances in Nuclear Power Plants (ICAPP), 442–50. Illinois: American Nuclear Society, 2024. http://dx.doi.org/10.13182/t130-43781.
Full textWang, Wenjia, Seyed Masoud Sadjadi, and Naphtali Rishe. "A Survey of Major Cybersecurity Compliance Frameworks." In 2024 IEEE 10th Conference on Big Data Security on Cloud (BigDataSecurity). IEEE, 2024. http://dx.doi.org/10.1109/bigdatasecurity62737.2024.00013.
Full textFalé, Pedro, Leonilde Reis, and Rui Almeida. "Cybersecurity – Security Operations Center." In Sixth International Scientific Conference ITEMA Recent Advances in Information Technology, Tourism, Economics, Management and Agriculture. Association of Economists and Managers of the Balkans, Belgrade, Serbia, 2022. http://dx.doi.org/10.31410/itema.2022.99.
Full textReports on the topic "Cybersecurity frameworks"
Raza, Haider. Research work on cybersecurity frameworks. Ames (Iowa): Iowa State University, January 2020. http://dx.doi.org/10.31274/cc-20240624-1224.
Full textSrinivasan, Piya. Strengthening cybersecurity frameworks remains a global challenge. Edited by Sam Hendricks. Monash University, December 2023. http://dx.doi.org/10.54377/d1ef-9335.
Full textPulivarti, Ronald. Genomic Data Cybersecurity and Privacy Frameworks Community Profile. Gaithersburg, MD: National Institute of Standards and Technology, 2024. https://doi.org/10.6028/nist.ir.8467.2pd.
Full textDavid, Aharon. Unsettled Topics Concerning Airport Cybersecurity Standards and Regulation. SAE International, September 2021. http://dx.doi.org/10.4271/epr2021020.
Full textScarfone, Karen. Development of Relationship Mapping between Documentary Standards, Regulations, Frameworks, and Guidelines: Cybersecurity and Privacy Content Mapping. Gaithersburg, MD: National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.ir.8477.
Full textScarfone, Karen. Development of Relationship Mapping between Documentary Standards, Regulations, Frameworks, and Guidelines: Cybersecurity and Privacy Content Mapping. Gaithersburg, MD: National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.ir.8477.ipd.
Full textCoyner, Kelley, and Jason Bittner. Automated Vehicles and Infrastructure Enablers: Cybersecurity. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, August 2024. http://dx.doi.org/10.4271/epr2024018.
Full textPetersen, Rodney, Danielle Santos, Matthew C. Smith, Karen A. Wetzel, and Greg Witte. Workforce Framework for Cybersecurity (NICE Framework). National Institute of Standards and Technology, November 2020. http://dx.doi.org/10.6028/nist.sp.800-181r1.
Full textStouffer, Keith, Timothy Zimmerman, CheeYee Tang, Joshua Lubell, Jeffrey Cichonski, and John McCarthy. Cybersecurity framework manufacturing profile. Gaithersburg, MD: National Institute of Standards and Technology, September 2017. http://dx.doi.org/10.6028/nist.ir.8183.
Full textScarfone, Karen. NIST Cybersecurity Framework 2.0:. Gaithersburg, MD: National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.sp.1302.ipd.
Full text