Gotowa bibliografia na temat „Cybersecurity Maturity Model Certification”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Cybersecurity Maturity Model Certification”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Cybersecurity Maturity Model Certification"
Razikin, Khairur, i Agus Widodo. "General Cybersecurity Maturity Assessment Model: Best Practice to Achieve Payment Card Industry-Data Security Standard (PCI-DSS) Compliance". CommIT (Communication and Information Technology) Journal 15, nr 2 (31.08.2021): 91–104. http://dx.doi.org/10.21512/commit.v15i2.6931.
Pełny tekst źródłaColeman, Joe. "The DOD's CMMC 2.0: What Heat Treaters Need to Know". AM&P Technical Articles 182, nr 2 (1.03.2024): 37–39. http://dx.doi.org/10.31399/asm.amp.2024-02.p037.
Pełny tekst źródłaFleming, Courtney, Mark Reith i Wayne Henry. "Securing Commercial Satellites for Military Operations: A Cybersecurity Supply Chain Framework". International Conference on Cyber Warfare and Security 18, nr 1 (28.02.2023): 85–92. http://dx.doi.org/10.34190/iccws.18.1.1062.
Pełny tekst źródłaLevy, Yair, i Ruti Gafni. "Towards the quantification of cybersecurity footprint for SMBs using the CMMC 2.0". Online Journal of Applied Knowledge Management 10, nr 1 (6.09.2022): 43–61. http://dx.doi.org/10.36965/ojakm.2022.10(1)43-61.
Pełny tekst źródłaTsvilii, Olena. "Cybersecurity regulation: cybersecurity certification of operational technologies". Technology audit and production reserves 1, nr 2(57) (28.02.2021): 54–60. http://dx.doi.org/10.15587/2706-5448.2021.225271.
Pełny tekst źródłaTsvilii, Olena. "SYSTEM OF CERTIFICATION OF CYBERSECURITY OF INFORMATION AND COMMUNICATIONS TECHNOLOGIES". Proceedings of the O.S. Popov ОNAT 1, nr 2 (31.12.2020): 121–34. http://dx.doi.org/10.33243/2518-7139-2020-1-2-121-134.
Pełny tekst źródłaKour, Ravdeep, Ramin Karim i Adithya Thaduri. "Cybersecurity for railways – A maturity model". Proceedings of the Institution of Mechanical Engineers, Part F: Journal of Rail and Rapid Transit 234, nr 10 (18.10.2019): 1129–48. http://dx.doi.org/10.1177/0954409719881849.
Pełny tekst źródłaYigit Ozkan, Bilge, Sonny van Lingen i Marco Spruit. "The Cybersecurity Focus Area Maturity (CYSFAM) Model". Journal of Cybersecurity and Privacy 1, nr 1 (13.02.2021): 119–39. http://dx.doi.org/10.3390/jcp1010007.
Pełny tekst źródłaKunsook, Kritiyaporn, Sotarat Thammaboosadee i Rojjalak Chuckpaiwong. "Sustainable Organic Farming Maturity Model". International Journal on Advanced Science, Engineering and Information Technology 14, nr 2 (23.04.2024): 706–16. http://dx.doi.org/10.18517/ijaseit.14.2.19504.
Pełny tekst źródłaMorales-Fernández, Rogelio, José Alfonso Brito-Rojas i Jaime Arturo Villaseñor Marcial. "CAPABILITY MATURITY MODEL INTEGRATION (CMMI)". Revista de Investigación en Tecnologías de la Información 2, nr 3 (czerwiec 2014): 15–20. http://dx.doi.org/10.36825/riti.02.03.003.
Pełny tekst źródłaRozprawy doktorskie na temat "Cybersecurity Maturity Model Certification"
Santos, Ricardo Meléndez, Anthony Aguilar Gallardo i Jimmy Armas Aguirre. "Reference Model to Identify the Maturity Level of Cyber Threat Intelligence on the Dark Web". Repositorio Academico - UPC, 2021. http://hdl.handle.net/10757/653788.
Pełny tekst źródłaIn this article, we propose a reference model to identify the maturity level of the cyber intelligence threat process. This proposal considers the dark web as an important source of cyber threats causing a latent risk that organizations do not consider in their cybersecurity strategies. The proposed model aims to increase the maturity level of the process through a set of proposed controls according to the information found on the dark web. The model consists of three phases: (1) Identification of information assets using cyber threat intelligence tools. (2) Diagnosis of the exposure of information assets. (3) Proposal of controls according to the proposed categories and criteria. The validation of the proposal was carried out in an insurance institution in Lima, Peru, with data obtained by the institution. The measurement was made with artifacts that allowed to obtain an initial value of the current panorama of the company. Preliminary results showed 196 emails and passwords exposed on the dark web of which one corresponded to the technology manager of the company under evaluation. With this identification, it was diagnosed that the institution was at a “Normal” maturity level, and from the implementation of the proposed controls, the “Advanced” level was reached.
Revisión por pares
Pérez, Navarro Henry Bryan, i Jara Humberto Luis Salcedo. "Modelo de madurez en ciberseguridad para empresas que manejan datos de salud". Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2021. http://hdl.handle.net/10757/655801.
Pełny tekst źródłaThe advancement of digitalization in different sectors brings along with it new potential risks. One of the sectors that have to confront said risks is the health sector. Data privacy in the health sector is heavily regulated and fines for non-compliance can affect the companies since it implies putting the client’s personal data at risk. Because of this, businesses belonging to the health sector need a tool to help with the identification of capabilities in Cybersecurity, Privacy and Health data management to achieve compliance with the current norms and reduce risks that might compromise the Confidentiality, Integrity and Availability of data This work proposes a capability maturity model that can identify the reliability of Cybersecurity and Privacy elements applied to the Health Sector. This was achieved through the use of models, frameworks and norms; allowing us to increase their complexity through the integration of privacy and health information management capacities. The model was validated by using a diagnosis tool in a health sector business and observing the results. The obtained results were compared with the original components of the model to verify the holistic integration of said components. We also used a model evaluation form to measure the satisfaction level of the business regarding the use of the model and its components.
Tesis
Aguilar, Gallardo Anthony Josue, i Santos Ricardo Alfonso Meléndez. "Modelo de referencia para identificar el nivel de madurez de ciberinteligencia de amenazas en la dark web". Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2020. http://hdl.handle.net/10757/653512.
Pełny tekst źródłaThe dark web is an area conducive to illegal activities of all kinds. In recent times, cybercriminals are changing their approach towards information trafficking (personal or corporate) because the risks are much lower compared to other types of crime. There is a wealth of information hosted here, but few companies know how to access this data, evaluate it, and minimize the damage it can cause. In this work, we propose a reference model to identify the maturity level of the Cyber Intelligence Threat process. This proposal considers the dark web as an important source of cyber threats causing a latent risk that organizations do not consider in their cybersecurity strategies. The proposed model aims to increase the maturity level of the process through a set of proposed controls according to the information found on the dark web. The model consists of 3 phases: 1. Identification of information assets using cyber threat intelligence tools. 2. Diagnosis of the exposure of information assets. 3. Proposal of controls according to the proposed categories and criteria. The validation of the proposal was carried out in an insurance institution in Lima, Peru with data obtained by the institution. Preliminary results showed 196 emails and passwords exposed on the dark web of which 1 corresponded to the Technology Manager of the company under evaluation. With this identification, it was diagnosed that the institution was at a “Normal” maturity level, and from the implementation of the proposed controls the “Advanced” level was reached.
Tesis
Albanez, Altamar Urbanetz de Araújo. "Associação entre CMMI-DEV 1.2 e ISO/TS 16949". Universidade Tecnológica Federal do Paraná, 2012. http://repositorio.utfpr.edu.br/jspui/handle/1/558.
Pełny tekst źródłaThe automotive sector is one of the most daring in terms of quality, requiring because of that certification to ISO/TS 16949. Although these companies dominate this certification, some lose in the subsequent audits or get little improvement beyond existing. There is evidence that they do not have the maturity to obtain or maintain such certification or guidelines to continually improve. In previous work, it was found out that certified companies had at least level 2 maturity, 1 (minimum) and 5 (maximum), which means a company defined and manageable process. However, what enables the company to improve its indexes have the process is controlled and integrated. The lack of maturity of a product development process (PDP) triggers scrap and rework, compromising the efficient use of resources, impacting the time and cost of development and, indirectly, the quality of the process and final product. However, the guidelines do not have certified companies to improve their processes. For this, the ISO would require some resource associated in order to provide guidance on the aspects that need to be improved. Whereas CMMI is an effective method for obtaining diagnostic and maturity that considers the integration of PDP, this work aims to identify the association between the ISO/TS 16949 and CMMI-DEV 1.2 method. Presenting an overview of PDPs, quality certification and process maturity. Later, associated variables are involved in a process of ISO 9001 certification and the variables evaluated in the ISO/TS 16949 with the variables involved in assessing the maturity level 2 with CMMI-DEV 1.2. The paper explains which items are considered by the ISO/TS 16949, CMMI highlighting items that could be used for diagnosis complement for companies that wish to improve the quality factor, adding, in parallel, more efficiency and productivity of their production processes.
Książki na temat "Cybersecurity Maturity Model Certification"
Cybersecurity Maturity Model Certification (CMMC) - a Pocket Guide. IT Governance Ltd, 2020.
Znajdź pełny tekst źródłaMARK A RUSSO CISSP-ISSAP CISO. Cybersecurity Maturity Model Certification ~ 2ND EDITION: CUI Classification, Marking, and Storage Guide. Independently Published, 2019.
Znajdź pełny tekst źródłaMARK A RUSSO CISSP-ISSAP CISO. Cybersecurity Maturity Model Certification : Levels 1-3 Manual: Detailed Security Control Implementation Guidance. Independently Published, 2019.
Znajdź pełny tekst źródłaLandoll, Douglas. Cybersecurity Maturity Model Certification CMMC 2. 0 Assessment Handbook: An Implementation and Self-Assessment Guide for CUI, NIST SP 800-171, and CMMC 2. 0. Independently Published, 2022.
Znajdź pełny tekst źródłaMARK A RUSSO CISSP-ISSAP CISO. Capability Maturity Model Certification: Companion CUI Marking Guide. Independently Published, 2019.
Znajdź pełny tekst źródłaGovernment, U. S., i Department of Homeland Security. Best Practices for Planning a Cybersecurity Workforce and the National Initiative for Cybersecurity Education (NICE) Cybersecurity Capability Maturity Model - Benefits of Workforce Planning. Independently Published, 2018.
Znajdź pełny tekst źródłaCzęści książek na temat "Cybersecurity Maturity Model Certification"
Acosta, Mauricio Alexander Nieto, i Hamid Jahankhani. "An Empirical Study into Ransomware Campaigns Against the Education Sector and Adopting the Cybersecurity Maturity Model Certification Framework". W Advanced Sciences and Technologies for Security Applications, 67–103. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33627-0_4.
Pełny tekst źródłaDonalds, Charlette, Corlane Barclay i Kweku-Muata Osei-Bryson. "The Cybersecurity Capability Maturity Model for Sustainable Security Advantage". W Cybercrime and Cybersecurity in the Global South, 175–90. Boca Raton: Routledge, 2022. http://dx.doi.org/10.1201/9781003028710-12.
Pełny tekst źródłaKreppein, Alexander, Alexander Kies i Robert H. Schmitt. "Novel Maturity Model for Cybersecurity Evaluation in Industry 4.0". W Communications in Computer and Information Science, 198–210. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-8059-5_12.
Pełny tekst źródłaYigit Ozkan, Bilge, i Marco Spruit. "A Questionnaire Model for Cybersecurity Maturity Assessment of Critical Infrastructures". W Lecture Notes in Computer Science, 49–60. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12085-6_5.
Pełny tekst źródłaGao, Zimeng, Fei Xing i Guochao Peng. "Research on the Capability Maturity Model of Data Security in the Era of Digital Transformation". W HCI for Cybersecurity, Privacy and Trust, 151–62. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-35822-7_11.
Pełny tekst źródłaAhouanmenou, Steve. "Towards a Cybersecurity Maturity Model Specific for the Healthcare Sector: Focus on Hospitals". W Research Challenges in Information Science, 141–48. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-59468-7_16.
Pełny tekst źródłaBaninemeh, Elena, Harold Toomey, Katsiaryna Labunets, Gerard Wagenaar i Slinger Jansen. "An Evaluation of the Product Security Maturity Model Through Case Studies at 15 Software Producing Organizations". W Lecture Notes in Business Information Processing, 327–43. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-53227-6_23.
Pełny tekst źródłaKendzierskyj, Stefan, Hamid Jahankhani, Arshad Jamal, Osama Hussien i Longzhi Yang. "The Role of Blockchain with a Cybersecurity Maturity Model in the Governance of Higher Education Supply Chains". W Advanced Sciences and Technologies for Security Applications, 1–35. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33627-0_1.
Pełny tekst źródła"THE ROAD TO CERTIFICATION". W The Cybersecurity Maturity Model Certification (CMMC) – A pocket guide, 65–71. IT Governance Publishing, 2020. http://dx.doi.org/10.2307/j.ctv17f12mb.8.
Pełny tekst źródłaMuller, S. Raschid. "An Analysis of the Design of the Cybersecurity Maturity Model Certification (CMMC) and Its Direct Effect on Supply Chain Management". W Advances in Human Resources Management and Organizational Development, 220–43. IGI Global, 2023. http://dx.doi.org/10.4018/978-1-6684-8691-7.ch014.
Pełny tekst źródłaStreszczenia konferencji na temat "Cybersecurity Maturity Model Certification"
Oliveira, Andre da Silva, i Henrique Santos. "Continuous Industrial Sector Cybersecurity Assessment Paradigm* : Proposed Model of Cybersecurity Certification". W 2022 18th International Conference on the Design of Reliable Communication Networks (DRCN). IEEE, 2022. http://dx.doi.org/10.1109/drcn53993.2022.9758022.
Pełny tekst źródłaGourisetti, Sri Nikhil Gupta, Scott Mix, Michael Mylrea, Christopher Bonebrake i Md Touhiduzzaman. "Secure Design and Development Cybersecurity Capability Maturity Model (SD2-C2M2)". W NCS '19: Northwest Cybersecurity Symposium. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3332448.3332461.
Pełny tekst źródłaBhattacharya, Souradeep, Burhan Hyder i Manimaran Govindarasu. "ICS-CTM2: Industrial Control System Cybersecurity Testbed Maturity Model". W 2022 Resilience Week (RWS). IEEE, 2022. http://dx.doi.org/10.1109/rws55399.2022.9984023.
Pełny tekst źródłaAlvaro, Alexandre, i Silvio Lemos Meira. "Software Component Certification: A Component Quality Model". W Simpósio Brasileiro de Qualidade de Software. Sociedade Brasileira de Computação - SBC, 2006. http://dx.doi.org/10.5753/sbqs.2006.15630.
Pełny tekst źródłaRojas, Aaron Joseph Serrano, Erick Fabrizzio Paniura Valencia, Jimmy Armas-Aguirre i Juan Manuel Madrid Molina. "Cybersecurity maturity model for the protection and privacy of personal health data". W 2022 IEEE 2nd International Conference on Advanced Learning Technologies on Education & Research (ICALTER). IEEE, 2022. http://dx.doi.org/10.1109/icalter57193.2022.9964729.
Pełny tekst źródłaAlayo, Jorge Gutierrez, Paul Necochea Mendoza, Jimmy Armas-Aguirre i Juan Madrid Molina. "Cybersecurity maturity model for providing services in the financial sector in Peru". W 2021 Congreso Internacional de Innovación y Tendencias en Ingeniería (CONIITI). IEEE, 2021. http://dx.doi.org/10.1109/coniiti53815.2021.9619733.
Pełny tekst źródłaArenas, Ethan, Juan Palomino i Juan-Pablo Mansilla. "Cybersecurity Maturity Model to Prevent Cyberattacks on Web Applications Based on ISO 27032 and NIST". W 2023 IEEE XXX International Conference on Electronics, Electrical Engineering and Computing (INTERCON). IEEE, 2023. http://dx.doi.org/10.1109/intercon59652.2023.10326028.
Pełny tekst źródłaBarclay, Corlane. "Sustainable security advantage in a changing environment: The Cybersecurity Capability Maturity Model (CM2)". W 2014 ITU Kaleidoscope: Living in a Converged World - Impossible without Standards? (K-2014). IEEE, 2014. http://dx.doi.org/10.1109/kaleidoscope.2014.6858466.
Pełny tekst źródłaAzambuja, Antonio João, i João Souza Neto. "Modelo de maturidade de segurança cibernética para os órgãos da Administração Pública Federal". W II Workshop de Segurança Cibernética em Dispositivos Conectados. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/wscdc.2019.7707.
Pełny tekst źródłaGottschall, Marcel, Bastian Binder i Alexis Castel. "Towards Certification by Simulation with Model-based continuous Engineering Processes showcased on eVTOL Application". W Vertical Flight Society 78th Annual Forum & Technology Display. The Vertical Flight Society, 2022. http://dx.doi.org/10.4050/f-0078-2022-17586.
Pełny tekst źródłaRaporty organizacyjne na temat "Cybersecurity Maturity Model Certification"
Lewis, James Andrew. Advanced Experiences in Cybersecurity Policies and Practices: An Overview of Estonia, Israel, South Korea, and the United States. Inter-American Development Bank, lipiec 2016. http://dx.doi.org/10.18235/0007970.
Pełny tekst źródłaCybersecurity: Are We Ready in Latin America and the Caribbean? Inter-American Development Bank, marzec 2016. http://dx.doi.org/10.18235/0006517.
Pełny tekst źródła