Academic literature on the topic 'Cybersecurity Best Practices'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cybersecurity Best Practices.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cybersecurity Best Practices"

1

Sobel, Ann, and Ron Vetter. "Cybersecurity Best Practices for CISE Programs." Computer 55, no. 5 (2022): 64–72. http://dx.doi.org/10.1109/mc.2021.3109841.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nalley, Catlin. "Cybersecurity Best Practices for the Audiologist." Hearing Journal 75, no. 7 (2022): 8,9. http://dx.doi.org/10.1097/01.hj.0000843244.47169.01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Szumski, Oskar. "Cybersecurity best practices among Polish students." Procedia Computer Science 126 (2018): 1271–80. http://dx.doi.org/10.1016/j.procs.2018.08.070.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jagadish, Ravi. "Enhancing Cybersecurity in Cloud - Based Banking - Best Practices and Technologies." International Journal of Science and Research (IJSR) 13, no. 3 (2024): 422–26. http://dx.doi.org/10.21275/sr24306144435.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Samuel Onimisi Dawodu, Adedolapo Omotosho, Odunayo Josephine Akindote, Abimbola Oluwatoyin Adegbite, and Sarah Kuzankah Ewuga. "CYBERSECURITY RISK ASSESSMENT IN BANKING: METHODOLOGIES AND BEST PRACTICES." Computer Science & IT Research Journal 4, no. 3 (2023): 220–43. http://dx.doi.org/10.51594/csitrj.v4i3.659.

Full text
Abstract:
Cybersecurity risk assessment in banking is the process of identifying, analyzing, and evaluating the cyber threats and vulnerabilities that may affect the confidentiality, integrity, and availability of the information systems and data of banks and their customers. Cybersecurity risk assessment in banking helps banks to prioritize and implement appropriate controls and measures to mitigate the cyber risks and to comply with the relevant regulations and standards. This study focusses on identifying effective risk assessment strategies, highlighting how they can be adapted and applied in various banking environments, especially in developing economies like Nigeria. As the banking industry continues to evolve in the digital era, the significance of robust cybersecurity measures cannot be overstated. This paper delves into the critical domain of Cybersecurity Risk Assessment in Banking, exploring various methodologies and best practices employed to safeguard financial institutions against evolving cyber threats. The dynamic landscape of cyber risks faced by banks, ranging from sophisticated malware and phishing attacks to insider threats and system vulnerabilities are examined. The paper provides an in-depth analysis of established and emerging methodologies for conducting effective cybersecurity risk assessments in the banking sector. It explores quantitative and qualitative risk assessment approaches, threat modeling, and scenario analysis, shedding light on their respective strengths and limitations. Moreover, the document highlights the importance of aligning risk assessment methodologies with industry regulations and compliance standards to ensure a comprehensive and regulatory-compliant cybersecurity framework. Best practices for cybersecurity risk management in banking are scrutinized, emphasizing the integration of proactive threat intelligence, continuous monitoring, and incident response planning. The role of advanced technologies, including artificial intelligence and machine learning, in enhancing the efficiency of risk assessment processes is also discussed. Furthermore, the paper addresses the human element in cybersecurity, emphasizing the significance of training and awareness programs to mitigate risks associated with human error and social engineering attacks. By synthesizing insights from industry practices, regulatory guidelines, and technological advancements, this paper offers a comprehensive guide for banking professionals, cybersecurity practitioners, and policymakers involved in fortifying the resilience of financial institutions against cyber threats. Ultimately, the research aims to contribute to the ongoing discourse on cybersecurity risk assessment in banking, providing actionable insights to navigate the complex landscape of digital risks and ensuring the continued trust and security of the financial ecosystem.
 Keywords: Cybersecurity; Risk Assessment; Banking; Methodologies; Cyber Threat; Artificial Intelligence; Best Practices
APA, Harvard, Vancouver, ISO, and other styles
6

Anwuli Nkemchor Obiki-Osafiele, Edith Ebele Agu, and Njideka Rita Chiekezie. "Protecting digital assets in Fintech: Essential cybersecurity measures and best practices." Computer Science & IT Research Journal 5, no. 8 (2024): 1884–96. http://dx.doi.org/10.51594/csitrj.v5i8.1449.

Full text
Abstract:
Cybersecurity is paramount for protecting digital assets and maintaining consumer trust in the rapidly evolving fintech sector. This review paper explores essential cybersecurity measures and best practices, focusing on encryption, multi-factor authentication, security audits, secure software development, and network security. The paper also examines the threat landscape, highlighting common cyber threats such as phishing, malware, insider threats, and data breaches and their impact on fintech operations. Future trends in fintech cybersecurity, including the role of emerging technologies like artificial intelligence (AI) and blockchain, are discussed, along with predictions for future challenges. Strategic recommendations for fintech companies emphasize the importance of employee training, incident response planning, collaboration with cybersecurity experts, regulatory compliance, and continuous monitoring. The paper concludes by underscoring the necessity of proactive cybersecurity measures to safeguard financial data and ensure the integrity of fintech services. Keywords: Fintech cybersecurity, Encryption, Multi-factor Authentication, Artificial Intelligence, Blockchain, Threat Intelligence.
APA, Harvard, Vancouver, ISO, and other styles
7

Sekhar Nanda, Ardhendu. "The Future of Cybersecurity in Fintech: Challenges, Trends and Best Practices." International Journal of Science and Research (IJSR) 13, no. 7 (2024): 1509–15. http://dx.doi.org/10.21275/sr24717223220.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lawrence Damilare Oyeniyi, Chinonye Esther Ugochukwu, and Noluthando Zamanjomane Mhlongo. "DEVELOPING CYBERSECURITY FRAMEWORKS FOR FINANCIAL INSTITUTIONS: A COMPREHENSIVE REVIEW AND BEST PRACTICES." Computer Science & IT Research Journal 5, no. 4 (2024): 903–25. http://dx.doi.org/10.51594/csitrj.v5i4.1049.

Full text
Abstract:
In the digital epoch, where the financial sector stands as the cornerstone of global economic stability, the escalating sophistication of cyber threats poses an unprecedented challenge. This scholarly pursuit aimed to dissect the intricate web of cybersecurity within the financial domain, elucidating the evolving threat landscape, scrutinizing the efficacy of existing cybersecurity frameworks, and delineating strategic pathways for fortification against digital adversaries. Anchored in a qualitative methodology, the study embarked on a systematic literature review, meticulously sifting through contemporary academic discourse to unveil the nuances of cybersecurity challenges besieging financial institutions. The scope of this inquiry spanned the assessment of regulatory landscapes, the exploration of technological innovations in cybersecurity, and the critical examination of human factors influencing cybersecurity efficacy. The findings illuminate a stark reality—the existing cybersecurity frameworks, though foundational, are increasingly inadequate in the face of sophisticated cyber threats. The study advocates for a paradigmatic shift towards more adaptable, robust, and technology-driven cybersecurity frameworks, underscored by the imperative for regulatory agility and international collaboration. Conclusively, the paper posits that the future of cybersecurity in the financial sector hinges on a tripartite alliance among financial institutions, regulatory bodies, and technology providers, urging a unified front to navigate the cyber tempest. Recommendations call for an integrated approach that marries regulatory compliance with cutting-edge technological solutions, fostering a cybersecurity ecosystem that is both resilient and responsive to the digital zeitgeist. This scholarly endeavor not only contributes to the academic discourse on financial cybersecurity but also serves as a beacon for policymakers, practitioners, and stakeholders in charting a secure course in the digital financial frontier.
 Keywords: Cybersecurity, Financial Sector, Systematic Literature Review, Regulatory Compliance, Technological Innovation, Strategic Recommendations.
APA, Harvard, Vancouver, ISO, and other styles
9

Sadiq Nasir, Sadiq Nasir. "Exploring the Effectiveness of Cybersecurity Training Programs: Factors, Best Practices, and Future Directions." Advances in Multidisciplinary and scientific Research Journal Publication 2, no. 1 (2023): 151–60. http://dx.doi.org/10.22624/aims/csean-smart2023p18.

Full text
Abstract:
Cybersecurity education is essential in equipping individuals with the proper knowledge and skill sets to protect devices, computers, networks and data from cybersecurity risk. This research examines past research in cybersecurity education and training, evaluates the existing literature on Cybersecurity risk to identify research gaps and suggests the future direction of the research phenomenon. The paper evaluates the mechanics that influence the effectiveness of cybersecurity training programs. The paper also presents best practices and success factors for developing cybersecurity training programs. The research presents the benefits of cybersecurity training and awareness program underpinned around addressing human vulnerability to promote a better and positive cybersecurity awareness culture within organisations. It also highlights the need for a company to adhere to legal and regulatory requirements, which is essential in mitigating cybersecurity risk. The findings of this work propose a model for examining the relationship between cybersecurity training and user behaviour; this is made up of the input, process and output components, which are presented with a model to show the connection of the three elements. Key words: Cybersecurity awareness, Training effectiveness, Human factor, Organisational support, Evaluation methodologies, Security culture, User behaviour Proceedings Citation Format Sadiq Nasir (2023): Exploring the Effectiveness of Cybersecurity Training Programs: Factors, Best Practices, and Future Directions. Proceedings of the Cyber Secure Nigeria Conference. Nigerian Army Resource Centre (NARC) Abuja, Nigeria. 11-12th July, 2023. Pp 151-160. https://cybersecurenigeria.org/conference-proceedings/volume-2-2023/. dx.doi.org/10.22624/AIMS/CSEAN-SMART2023P18
APA, Harvard, Vancouver, ISO, and other styles
10

NEDELCHEV, Miroslav, and Delyan SLAVOV. "CYBERSECURITY RECOMMENDATIONS AND BEST PRACTICES FOR DIGITAL EDUCATION." SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE 24 (July 28, 2023): 47–52. http://dx.doi.org/10.19062/2247-3173.2023.24.6.

Full text
Abstract:
In light of Covid-19, there has been an increasing trend over the past few years to use e-learning platforms more frequently. Hackers use various methods to play with the human mind of the learner or instructor, using their unexperienced internet habits. The article examines the risks and benefits of using augmented, mixed, and virtual reality applications in e-learning. Good practices for cyber risk assessment and measures to improve cyber security are shown.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cybersecurity Best Practices"

1

Gonçalves, Ricardo Jorge Girante. "Cybersecurity in social networks." Master's thesis, 2022. http://hdl.handle.net/10362/133016.

Full text
Abstract:
Dissertation presented as the partial requirement for obtaining a Master's degree in Information Management, specialization in Knowledge Management and Business Intelligence<br>In recent years, the use of social networks has been increasing substantially. As we know, platforms such as Facebook, Twitter, Google +, Pinterest, LinkedIn or Instagram allow millions of individuals to create online profiles and share personal information with several friends through social networks – and, often, it’s possible to do the same with a large amount of strangers. By itself, social networks should not be considered a cyber threat. However, there are several issues related to maintaining the user’s data security and privacy, especially when they upload personal information, photos and / or videos. The large majority of users ignores the security best practices, which sometimes facilitates the hackers’ attacks. The main goal of this research is to understand patterns of information that are revealed on online social networks and their privacy implications. The goal is to map people behaviour on social networks and understand if they care about the security of their data exposed on the Internet. This research also aims to understand the impact of cybersecurity in social networks and a comparison of which social network is most concerned with the exposure of its user. It will be also addressed the current defence solutions that can protect social network users from these kinds of threats.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Cybersecurity Best Practices"

1

Bartsch, Michael, and Stefanie Frey, eds. Cybersecurity Best Practices. Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-21655-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Murphy, Randall J., Michael Sukkarieh, Jon Haass, and Paul Hriljac. Guidebook on Best Practices for Airport Cybersecurity. Transportation Research Board, 2015. http://dx.doi.org/10.17226/22116.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cybersecurity Best Practices for Lawyers 2020. Practising Law Institute, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mustard, Steve. Industrial Cybersecurity Case Studies and Best Practices. ISA, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mastering Cybersecurity: Strategies, Technologies, and Best Practices. Apress L. P., 2024.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Power Systems Cybersecurity: Methods, Concepts, and Best Practices. Springer International Publishing AG, 2024.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dong, Zhao Yang, Nikos Hatziargyriou, and Hassan Haes Alhelou. Power Systems Cybersecurity: Methods, Concepts, and Best Practices. Springer International Publishing AG, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Practical Cybersecurity: A Fat-Free Guide to Network Security Best Practices. Independently Published, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mongeau, Scott, and Andrzej Hajdasinski. Cybersecurity Data Science: Best Practices in an Emerging Profession. Springer International Publishing AG, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mongeau, Scott, and Andrzej Hajdasinski. Cybersecurity Data Science: Best Practices in an Emerging Profession. Springer International Publishing AG, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Cybersecurity Best Practices"

1

van den Berg, Jan. "Cybersecurity for Everyone." In Cybersecurity Best Practices. Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-21655-9_40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Frey, Stefanie. "How to Eliminate the Prevailing Ignorance and Complacency Around Cybersecurity." In Cybersecurity Best Practices. Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-21655-9_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Duvillard, André, and Melanie Friedli. "Nationale Cyber-Strategie: Einbezug der lokalen Ebene in einem föderalen Staat." In Cybersecurity Best Practices. Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-21655-9_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Saxer, Mark A. "…limitem esse delendam – Grenzen sind zu überwinden." In Cybersecurity Best Practices. Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-21655-9_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Folini, Christian, and Denis Morel. "E-Voting in der Schweiz – Herausforderungen und Schutzprinzipen." In Cybersecurity Best Practices. Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-21655-9_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Warnecke, Dieter, and Sorin Ducaru. "NATO: Ein transatlantischer Blick auf die Cybersicherheit." In Cybersecurity Best Practices. Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-21655-9_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Unger, Walter J. "Cyber Defence – eine zwingende Notwendigkeit!" In Cybersecurity Best Practices. Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-21655-9_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Vernez, Gérald, and Adolf J. Dörig. "Erfahrungselemente erfolgreicher Strategie-Entwicklung und -Umsetzung im Umgang mit existenziellen Risiken im Cyber-Raum." In Cybersecurity Best Practices. Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-21655-9_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Karrer, Heinz, and Holger Mühlbauer. "Vorworte." In Cybersecurity Best Practices. Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-21655-9_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Frey, Stefanie. "Was Unternehmen von Staaten lernen können: Cyberstrategieentwicklung." In Cybersecurity Best Practices. Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-21655-9_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cybersecurity Best Practices"

1

Zade, Sharvayu, Sharvil Barhanpure, Shambhavii V. Jaiswal, Gagandeep Kaur, Poorva Agrawal, and Latika Pinjarkar. "E-Commerce Cybersecurity: A Comprehensive Review of Types, Breaches and Best Practices." In 2024 10th International Conference on Electrical Energy Systems (ICEES). IEEE, 2024. https://doi.org/10.1109/icees61253.2024.10776843.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Marek, James. "Cybersecurity and Risk Management Framework in Avionics." In Vertical Flight Society 74th Annual Forum & Technology Display. The Vertical Flight Society, 2018. http://dx.doi.org/10.4050/f-0074-2018-12893.

Full text
Abstract:
It is impossible to open a newspaper, turn on a television, or visit a news website these days without being barraged with cybersecurity related news. Every domain is being attacked, penetrated, and impacted by cyber-crime and the range, complexity, and frequency of attacks is expanding daily. Across the board we face a wide range of adversaries from disgruntled employees to nation states that are bent on taking our critical systems down temporarily or permanently. Avionics systems are not immune from this and over the past several years, cybersecurity policies and the Risk Management Framework (DoD 8510.01) approach to securing US cyber systems, have been maturing and rapidly growing in adoption. However, many in the avionics community remain uninformed regarding the impacts of these new policies and initiatives to their systems nor how best to ensure they are taking a practical and efficient approach to implementing them. Gone are the days of a magic box that all of the security requirements are allocated to. Modern Cybersecurity is a systems discipline and cuts across the entire avionics suite. This paper will introduce the Risk Management Framework (RMF) and Cybersecurity and discuss what they are, how we got here, how they are related, and how they are impacting and will impact legacy and future avionics systems on tactical military aircraft. The paper will present some observations and best practices associated with application of Cybersecurity and RMF to avionics. It will also include some benefits of safety critical designs toward cyber-hardening and where safety and security are mutually exclusive. It will touch briefly on some impacts to avionics systems related to hot Cybersecurity topics such as HBSS (Host Based Security System), STIGs (Security Technical Implementation Guides), Static code analysis, DoD PKI (Department of Defense Public Key Infrastructure), electronic delivery, and insider threats. The paper will include a perspective on the development environment, the deployed systems, and deployment sites and how RMF and Cybersecurity impact both the contractor and the DoD customer related to these perspectives.
APA, Harvard, Vancouver, ISO, and other styles
3

Jin, Xiaojian, and Elena Griffor. "Cybersecurity Best Practices for Managing Mixed Fleets." In 14th International Conference on Applied Human Factors and Ergonomics (AHFE 2023). AHFE International, 2023. http://dx.doi.org/10.54941/ahfe1003820.

Full text
Abstract:
This paper provides an overview of the cybersecurity of mixed fleets with vehicles both equipped and not equipped with automated driving systems. The focus is cybersecurity from the perspective of ADS-equipped commercial motor vehicle (CMV) fleets that incorporate some level of automated driving capabilities after being manufactured and during their commercial operation. The owners and operators of these fleets are naturally concerned about the threats and vulnerabilities of ADS technologies and the security of their operations. This paper includes sections on cybersecurity best practices, both general and specific. The intended audience includes mixed fleet owners and operators, policymakers, and other stakeholders. This overview is best viewed as a starting point for CMV fleets and other audiences with a general interest in the practical real-world implementation of cybersecurity measures and ADS deployment. It provides general guidelines on cybersecurity and specifics related to cybersecurity for mixed fleets.
APA, Harvard, Vancouver, ISO, and other styles
4

Flynn, Lori, Carly Huth, Randy Trzeciak, and Palma Buttles. "Best practices against insider threats for all nations." In 2012 Third Worldwide Cybersecurity Summit (WCS). IEEE, 2012. http://dx.doi.org/10.1109/wcs.2012.6780874.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Smith, Jess, Joshua Pereyda, and Dennis Gammel. "Cybersecurity best practices for creating resilient control systems." In 2016 Resilience Week (RWS). IEEE, 2016. http://dx.doi.org/10.1109/rweek.2016.7573308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kaksonen, Rauli, Kimmo Halunen, and Juha Röning. "Common Cybersecurity Requirements in IoT Standards, Best Practices, and Guidelines." In 7th International Conference on Internet of Things, Big Data and Security. SCITEPRESS - Science and Technology Publications, 2022. http://dx.doi.org/10.5220/0011041700003194.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mohan, Vaishnavi, Lotfi ben Othmane, and Andre Kres. "BP: Security Concerns and Best Practices for Automation of Software Deployment Processes: An Industrial Case Study." In 2018 IEEE Cybersecurity Development (SecDev). IEEE, 2018. http://dx.doi.org/10.1109/secdev.2018.00011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chennamaneni, Suprith, Phalguni Pradhan, Varsha Chebolu, Manjunadh Vejendla, Sathish Kumar Kannaiah, and S. S. Aravinth. "Designing Cybersecurity AI Based Awareness Games for Citizens: Best Practices and Future Directions." In 2023 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS). IEEE, 2023. http://dx.doi.org/10.1109/icscds56580.2023.10104800.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Llanso, Thomas. "Viewing the State of Cybersecurity Through Its “Best Practices” and “Top 10” Lists." In Hawaii International Conference on System Sciences. Hawaii International Conference on System Sciences, 2025. https://doi.org/10.24251/hicss.2025.853.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ghadge, Nikhil. "Enhancing Identity Management: Best Practices for Governance and Administration." In 12th International Conference of Security, Privacy and Trust Management. Academy & Industry Research Collaboration Center, 2024. http://dx.doi.org/10.5121/csit.2024.141119.

Full text
Abstract:
Identity management has become increasingly critical in today's digital landscape, where sensitive data is exposed to frequent breaches and unauthorized access. This research seeks to explore optimal governance and administrative practices to enhance identity management systems, with a particular emphasis on security, privacy, and usability. By examining current industry standards, regulations, and technological advancements, the study seeks to provide valuable insights for organizations looking to enhance their identity management capabilities. The research methodology utilizes a mixed-methods approach, integrating quantitative surveys and data analysis with qualitative interviews. This combination aims to provide a comprehensive understanding of current practices and challenges in identity governance and administration. The study explores key components such as authentication, authorization, and access control, offering practical recommendations to improve the effectiveness of identity management strategies. The research highlights the importance of adopting role-based access control (RBAC), continuous monitoring and compliance, identity lifecycle management, and the integration of identity governance with IT infrastructure. It also emphasizes the significance of effective password management, authentication measures, and the implementation of Single Sign-On (SSO) solutions to enhance security and user experience. Furthermore, the study underscores the critical role of data encryption and protection measures in safeguarding sensitive information and mitigating the risk of data breaches. By adhering to best practices in identity management, organizations can improve their overall cybersecurity posture, ensure compliance with regulations, and foster trust among stakeholders in an increasingly complex digital environment.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cybersecurity Best Practices"

1

Gourisetti, Sri Nikhil, Hayden Reeve, Julia Rotondo, and Grant Richards. Facility Cybersecurity Framework Best Practices. Office of Scientific and Technical Information (OSTI), 2020. http://dx.doi.org/10.2172/1660771.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Powell, Charisa, Konrad Hauck, Anuj D. Sanghvi, and Tamara L. Reynolds. Distributed Energy Resource Cybersecurity Framework Best Practices. Office of Scientific and Technical Information (OSTI), 2020. http://dx.doi.org/10.2172/1598143.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gourisetti, Sri Nikhil Gupta, Michael Mylrea, Hayden Reeve, Julia Rotondo, Grant Richards, and Jacob Irwin. Facility Cybersecurity Framework Best Practices Version 2.0. Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1829732.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gourisetti, Sri Nikhil Gupta, Michael Mylrea, Hayden Reeve, Julia Rotondo, Grant Richards, and Jacob Irwin. Facility Cybersecurity Framework Best Practices Version 2.0. Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1829733.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

David, Aharon. Unsettled Topics Concerning Airport Cybersecurity Standards and Regulation. SAE International, 2021. http://dx.doi.org/10.4271/epr2021020.

Full text
Abstract:
A large international airport is a microcosm of the entire aviation sector, hosting hundreds of different types of aviation and non-aviation stakeholders: aircraft, passengers, airlines, travel agencies, air traffic management and control, retails shops, runway systems, building management, ground transportation, and much more. Their associated information technology and cyber physical systems—along with an exponentially resultant number of interconnections—present a massive cybersecurity challenge. Unlike the physical security challenge, which was treated in earnest throughout the last decades, cyber-attacks on airports keep coming, but most airport lack essential means to confront such cyber-attacks. These missing means are not technical tools, but rather holistic regulatory directives, technical and process standards, guides, and best practices for airports cybersecurity—even airport cybersecurity concepts and basic definitions are missing in certain cases. Unsettled Topics Concerning Airport Cybersecurity Standards and Regulation offers a deeper analysis of these issues and their causes, focusing on the unique characteristics of airports in general, specific cybersecurity challenges, missing definitions, and conceptual infrastructure for the standardization and regulation of airports cybersecurity. This last item includes the gaps and challenges in the existing guides, best-practices, standards, and regulation pertaining to airport cybersecurity. Finally, practical solution-seeking processes are proposed, as well as some specific potential frameworks and solutions.
APA, Harvard, Vancouver, ISO, and other styles
6

Hendrick, Stephen. Software Bill of Materials (SBOM) and Cybersecurity Readiness. The Linux Foundation, 2022. https://doi.org/10.70828/rytl5793.

Full text
Abstract:
The State of Software Bill of Materials (SBOM) and Cybersecurity Readiness, produced in partnership with SPDX, OpenChain, and OpenSSF, reports on the extent of organizational SBOM readiness and adoption and its significance to improving cybersecurity throughout the open source ecosystem. The study comes on the heels of the US Administration’s Executive Order on Improving the Nation’s Cybersecurity, and the disclosure of the most recent and far-reaching log4j security vulnerability. Its timing coincides with increasing recognition across the globe of the importance of identifying software components and helping accelerate widespread implementation of cybersecurity best practices to mitigate the impact of software vulnerabilities.
APA, Harvard, Vancouver, ISO, and other styles
7

Boehm, Mirko, Hilary Carter, and Cailean Osborne. Pathways to Cybersecurity Best Practices in Open Source: How the Civil Infrastructure Platform, Yocto Project, and Zephyr Project are Closing the Gap to Meeting the Requirements of the Cyber Resilience Act. The Linux Foundation, 2025. https://doi.org/10.70828/updc4713.

Full text
Abstract:
This case study report from the Linux Foundation investigates the impacts of the Cyber Resilience Act on open source software, including new cybersecurity obligations and the role of manufacturers and stewards. The analysis highlights the security practices of Linux Foundation projects and notes challenges like long-term support, regulatory uncertainty, and standardization gaps. The report recommends investing in security tools, fostering collaboration, and addressing emerging threats such as AI-driven risks. By featuring the cybersecurity practices of three LF projects—Yocto Project, Zephyr, and Civil Infrastructure Platform—this report provides tried-and-tested pathways for the rest of the open source community to consider when preparing for this new regulatory landscape.
APA, Harvard, Vancouver, ISO, and other styles
8

Belcher, Scott, Terri Belcher, James Grimes, Lusa Holmstrom, and Andy Souders. Does the Transit Industry Understand the Risks of Cybersecurity and are the Risks Being Appropriately Prioritized? Mineta Transportation Institute, 2025. https://doi.org/10.31979/mti.2025.2405.

Full text
Abstract:
The intent of this study is to assess the readiness, resourcing, and capabilities of public transit agencies to detect, identify, be protected from, respond to, and recover from cybersecurity vulnerabilities and threats. This study is an update of the 2020 Mineta Transportation Institute (MTI) study, “Is the Transit Industry Prepared for the Cyber Revolution? Policy Recommendations to Enhance Surface Transit Cyber Preparedness.” In the previous study, the authors found that the transit industry was ill-prepared for cybersecurity attacks. Unfortunately, after four years and the development of new, and often free, resources, the situation has not markedly improved. In fact, this survey, which included a larger number of small rural transit agencies, shows that they lag far behind their larger peers. The increasing sophistication of cybercriminals, in combination with a greater reliance on technology within the transit industry, puts the industry at greater risk than in 2020. This study reviews and updates the state of best cybersecurity practices in public surface transit; outlines U.S. public surface transit operators’ cybersecurity operations and the resources available to them; reviews U.S. policy on cybersecurity in public surface transportation; and provides policy recommendations that address gaps or identify issues for Congress, the Executive Branch, public surface transit agencies, and their associations and other supporting organizations. Research methods include an online survey and oral interviews with public surface transit agencies in the United States as well as oral interviews with members of the Executive Branch (e.g., the U.S. Department of Transportation, the U.S. Department of Homeland Security), as well as research of literature published in periodicals. There is an exponentially expanding gap between the cybersecurity preparedness that should exist and the growing threats from increased reliance on technology and the opportunities by malicious actors. This research provides information that can be used to help close that gap.
APA, Harvard, Vancouver, ISO, and other styles
9

Lawson, Adrienn, and Stephen Hendrick. Unaware and Uncertain: The Stark Realities of Cyber Resilience Act Readiness in Open Source. The Linux Foundation, 2025. https://doi.org/10.70828/twbs3885.

Full text
Abstract:
This survey-based report investigates the awareness and readiness of the open source community to comply with the EU's Cyber Resilience Act (CRA). The report reveals significant knowledge gaps in the open source ecosystem that must be addressed to adequately comply with the new regulation while maintaining sustainable open source development. The survey data shows that most respondents are unfamiliar with the CRA, are uncertain about compliance deadlines, and are unaware of non-compliance penalties. The recommendations developed from these findings include establishing a more active role for manufacturers in cybersecurity, increasing funding and legal support to open source projects, and developing guidance and best practices to prevent unintended negative impacts on development.
APA, Harvard, Vancouver, ISO, and other styles
10

Herrera, Diego, Walter Pereira, Ludmila Volochen, and Ana María Zárate Moreno. Open Finance in Latin America and the Caribbean: Great Opportunities, Large Challenges. Inter-American Development Bank, 2023. http://dx.doi.org/10.18235/0004937.

Full text
Abstract:
This document is a comprehensive study of open finance, its context, and its value for the financial system in Latin America and the Caribbean. It also delves into the intricacies of the open finance ecosystem and analyzes its risks and opportunities. The document describes the status of the development of open finance in the region and discusses the challenges faced in implementing the ecosystem there. Finally, this text guides financial regulators and supervisors, considering international best practices and regional distinctions. This document examines how the regulatory framework can contribute to handing power over data to financial consumers, allowing them to obtain better conditions for accessing and using financial products with security and efficiency. These conditions translate into facilitating access to the financial market for financially excluded consumers, reducing the prices for financial services among those already served, and facilitating portability or switching between providers. A study of the region highlights the benefits of open finance, such as increased competition, greater financial inclusion, and reduced entry barriers for consumers, but also acknowledges the risks, including cybersecurity and consumer-protection risks. The document emphasizes the need for robust data-protection regulations, consumer safeguards, and technological infrastructure to establish a sustainable and secure open finance ecosystem. The objective is to understand open finance, its role in the modern financial landscape, and its potential benefits and challenges. This document also aims to establish principles for a specific regulatory framework that facilitates the development of open finance in the region. This research is a collaborative effort between the Financial Data and Technology Association and the Inter-American Development Bank through its FintechLAC initiative.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!