To see the other types of publications on this topic, follow the link: Cybersecurity certification.

Journal articles on the topic 'Cybersecurity certification'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cybersecurity certification.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Al Harrack, Micheline. "Connecting O*Net® Database to Cybersecurity Workforce Professional Certifications." International Journal on Integrating Technology in Education 10, no. 2 (2021): 65–76. http://dx.doi.org/10.5121/ijite.2021.10206.

Full text
Abstract:
The Occupational Information Network O*NET is considered the primary source of occupational information in the U.S. I explore here possible uses of O*NET data to inform cybersecurity workforce readiness certification programs. The O*NET database is used to map out education requirements and how they relate to professional certifications as required by employers and job designers in accordance with the National Initiative for Cybersecurity Careers and Studies (NICCS). The search focuses on the “Information Security Analysts” occupation as listed on O*NET, Careeronestop, U.S. Bureau of Labor Sta
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Ping, and Hubert D'Cruze. "Certifications in Cybersecurity Workforce Development." International Journal of Hyperconnectivity and the Internet of Things 3, no. 2 (2019): 38–57. http://dx.doi.org/10.4018/ijhiot.2019070104.

Full text
Abstract:
The workforce demand for cybersecurity professionals has been substantial and fast growing. Qualified cybersecurity professionals with appropriate knowledge, skills, and abilities for various tasks and job roles are needed to perform the challenging work of defending the cyber space. The certified information systems security professional (CISSP) certification is a globally recognized premier cybersecurity credential and validation of qualifications. This case study analyzes the CISSP certification requirements, domains and objectives and attempts to map them to the cybersecurity industry comp
APA, Harvard, Vancouver, ISO, and other styles
3

Tsvilii, Olena. "Cybersecurity regulation: cybersecurity certification of operational technologies." Technology audit and production reserves 1, no. 2(57) (2021): 54–60. http://dx.doi.org/10.15587/2706-5448.2021.225271.

Full text
Abstract:
The object of research is the system and schemes of conformity assessment (certification) of cybersecurity of operational technologies (OT), as a set of rules and procedures that describe the objects of certification, determine the specified requirements and provide a methodology for certification. The terminological base and conceptual apparatus of the study of cybersecurity certification of operational technologies are based on the international standard ISO 17000:2020 Conformity assessment – Vocabulary and general principles. Cybersecurity certification systems and schemes are based on asse
APA, Harvard, Vancouver, ISO, and other styles
4

Olena, Tsvilii. "Cybersecurity regulation: cybersecurity certification of operational technologies." Technology audit and production reserves 1, no. 2(57) (2021): 54–60. https://doi.org/10.15587/2706-5448.2021.225271.

Full text
Abstract:
<em>The object of research is the system and schemes of conformity assessment (certification) of cybersecurity of operational technologies (OT), as a set of rules and procedures that describe the objects of certification, determine the specified requirements and provide a methodology for certification. The terminological base and conceptual apparatus of the study of cybersecurity certification of operational technologies are based on the international standard ISO 17000:2020 Conformity assessment &ndash; Vocabulary and general principles. Cybersecurity certification systems and schemes are bas
APA, Harvard, Vancouver, ISO, and other styles
5

Tsvilii, Olena. "SYSTEM OF CERTIFICATION OF CYBERSECURITY OF INFORMATION AND COMMUNICATIONS TECHNOLOGIES." Proceedings of the O.S. Popov ОNAT 1, no. 2 (2020): 121–34. http://dx.doi.org/10.33243/2518-7139-2020-1-2-121-134.

Full text
Abstract:
Cybersecurity of information and communication technologies (hereinafter - ICT) is a key issue for maintaining the functioning and security of the digital economy and public administration in the soon. An important role in the field of cybersecurity is played by the conformity assessment (certification) of cybersecurity. This may apply to the cybersecurity of ICT components, products, equipment, services and processes, to the cybersecurity of cloud services, to the cybersecurity of technological processes, to personal competence in the field of cybersecurity, and so on. Cybersecurity certifica
APA, Harvard, Vancouver, ISO, and other styles
6

Matheu-García, Sara Nieves, José Luis Hernández-Ramos, Antonio Skarmeta, and Gianmarco Baldini. "A Survey of Cybersecurity Certification for the Internet of Things." ACM Computing Surveys 53, no. 5 (2020): 1–36. https://doi.org/10.1145/3410160.

Full text
Abstract:
In recent years, cybersecurity certification is gaining momentum as the baseline to build a structured approach to mitigate cybersecurity risks in the Internet of Things (IoT). This initiative is driven by industry, governmental institutions, and research communities, which have the goal to make IoT more secure for the end-users. In this survey, we analyze the current cybersecurity certification schemes, as well as the potential challenges to make them applicable for the IoT ecosystem. We also examine current efforts related to risk assessment and testing processes, which are widely recognized
APA, Harvard, Vancouver, ISO, and other styles
7

Hernández-Ramos, José Luis, Sara Nieves Matheu-García, and Antonio Skarmeta. "The Challenges of Software Cybersecurity Certification." IEEE Security & Privacy 19, no. 1 (2021): 99–102. https://doi.org/10.1109/MSEC.2020.3037845.

Full text
Abstract:
In 2019, the new European Union (EU) cybersecurity regulation &quot;Cybersecurity Act&quot; (&quot;CSA&quot;)<sup>1</sup> entered into force to create a common framework for the certification of any information and communication technology (ICT) system, including products, services, and processes. The main purpose of this framework is to reduce the current fragmentation of cybersecurity certification schemes2 as well as to increase end users? trust in a hyperconnected society3 by fostering a mutual recognition of certified ICT components in any EU country.
APA, Harvard, Vancouver, ISO, and other styles
8

Ananda, Safrida, Ika Putranti, and Andi Dir. "ANALYSIS OF THE EU CYBERSECURITY ACT UNDER THE THEORY OF NEOLIBERAL INSTITUTIONALISM." Arena Hukum 15, no. 1 (2022): 176–99. http://dx.doi.org/10.21776/ub.arenahukum.2022.01501.9.

Full text
Abstract:
Wannacry Ransomware epidemics have attacked several high-profile companies in European Union creating an EU-wide cybersecurity crisis in the digital economy and social order. In response, European Union established an appropriate regulation in cybercrime namely The Cybersecurity Act. The Act as an international regime does not only gives a permanent mandate that strengthens European Union Agency for Network and Information Security (ENISA) but also establishes The EU Cybersecurity Certification Scheme in order to increase cybersecurity and build cyber resilience in the European Union Digital S
APA, Harvard, Vancouver, ISO, and other styles
9

Gunawan, Budi, Barito Mulyo Ratmono, Denok Kurniasih, and Paulus Israwan Setyoko. "Cybersecurity effectiveness: The role of internal auditor certification, risk assessment and senior management." International Journal of Data and Network Science 7, no. 4 (2023): 1805–14. http://dx.doi.org/10.5267/j.ijdns.2023.7.011.

Full text
Abstract:
This study aims to analyze and examine the influence of internal auditor certification, risk assessment, and the role of senior management on the effectiveness of cybersecurity for internal auditors who have experience in cybersecurity and information technology. This research method is a quantitative method, data analysis uses structural equation modeling (SEM) with SmartPLS 3.0 software tools. The population of this study is internal auditors who have experience in cybersecurity and information technology. The sample for this study was 480 respondents who were determined by the snowball samp
APA, Harvard, Vancouver, ISO, and other styles
10

Mitrakas, Andreas. "The emerging EU framework on cybersecurity certification." Datenschutz und Datensicherheit - DuD 42, no. 7 (2018): 411–14. http://dx.doi.org/10.1007/s11623-018-0969-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Coleman, Joe. "The DOD's CMMC 2.0: What Heat Treaters Need to Know." AM&P Technical Articles 182, no. 2 (2024): 37–39. http://dx.doi.org/10.31399/asm.amp.2024-02.p037.

Full text
Abstract:
Abstract Cybersecurity Maturity Model Certification (CMMC) 2.0 represents the most recent iteration of the US Department of Defense's cybersecurity regulations. The CMMC 2.0 framework was developed to improve the cybersecurity posture of defense contractors and their supply chain, including heat treaters. This article reviews key requirements and how DoD contractors can prepare for compliance.
APA, Harvard, Vancouver, ISO, and other styles
12

Fleming, Courtney, Mark Reith, and Wayne Henry. "Securing Commercial Satellites for Military Operations: A Cybersecurity Supply Chain Framework." International Conference on Cyber Warfare and Security 18, no. 1 (2023): 85–92. http://dx.doi.org/10.34190/iccws.18.1.1062.

Full text
Abstract:
The increased reliance on commercial satellites for military operations has made it essential for the Department of Defense (DoD) to adopt a supply chain framework to address cybersecurity threats in space. This paper presents a satellite supply chain framework, the Cybersecurity Supply Chain (CSSC) Framework, for the DoD in the evaluation and selection of commercial satellite contracts. The proposed strategy is informed by research on cybersecurity threats to commercial satellites, national security concerns, current DoD policy, and previous cybersecurity frameworks. This paper aims to provid
APA, Harvard, Vancouver, ISO, and other styles
13

Nikolov, Borislav. "Maritime Cybersecurity Education and Training at Nikola Vaptsarov Naval Academy." Pedagogika-Pedagogy 95, no. 6s (2023): 48–55. http://dx.doi.org/10.53656/ped2023-6s.05.

Full text
Abstract:
As of the beginning of 2021, a set of new requirements has been introduced by the International Maritime Organization (IMO), necessitating established rules and measures about the cybersecurity of the ship’s systems. That is to ensure a certain level of cybersecurity onboard, as well as re-occurring training of onboard staff, is required, to maintain cybersecurity measures. That leads to a new vector of postgraduate certification and namely – ships’ system cybersecurity and cybersecurity management. Its purpose is to provide the necessary knowledge and skills, related to fulfilling the require
APA, Harvard, Vancouver, ISO, and other styles
14

Razikin, Khairur, and Agus Widodo. "General Cybersecurity Maturity Assessment Model: Best Practice to Achieve Payment Card Industry-Data Security Standard (PCI-DSS) Compliance." CommIT (Communication and Information Technology) Journal 15, no. 2 (2021): 91–104. http://dx.doi.org/10.21512/commit.v15i2.6931.

Full text
Abstract:
The use of technology in the era of the Industrial Revolution 4.0 is essential, marked by the use of technology in the economy and business. This situation makes many companies in the payment sector have to improve their information technology security systems. In Indonesia, Bank Indonesia and the Financial Services Authority (Otoritas Jasa Keuangan - OJK) are agencies that provide operational permits for companies by making Payment Card Industry-Data Security Standard (PCI-DSS) certification as one of the requirements for companies to obtain operating permits. However, not all companies can e
APA, Harvard, Vancouver, ISO, and other styles
15

Nwankwo, Iheanyi, Marc Stauch, Panagiotis Radoglou-Grammatikis, et al. "Data Protection and Cybersecurity Certification Activities and Schemes in the Energy Sector." Electronics 11, no. 6 (2022): 965. http://dx.doi.org/10.3390/electronics11060965.

Full text
Abstract:
Cybersecurity concerns have been at the forefront of regulatory reform in the European Union (EU) recently. One of the outcomes of these reforms is the introduction of certification schemes for information and communication technology (ICT) products, services and processes, as well as for data processing operations concerning personal data. These schemes aim to provide an avenue for consumers to assess the compliance posture of organisations concerning the privacy and security of ICT products, services and processes. They also present manufacturers, providers and data controllers with the oppo
APA, Harvard, Vancouver, ISO, and other styles
16

Kret, T. B., A. Z. Piskozub, and P. V. Stasiv. "RESEARCH OF COMPLIANCE WITH CYBER ESSENTIALS REQUIREMENTS FOR COMPANY'S CERTIFICATION." Computer systems and network 7, no. 1 (2025): 176–85. https://doi.org/10.23939/csn2025.01.176.

Full text
Abstract:
This paper examines the Cyber Essentials requirements for ensuring basic security controls, which need to be implemented to protect against the most common cyber threats. Cyber Essentials is a foundational cybersecurity certification scheme developed by the UK government, which has been in operation since 2014 and under which more than 100,000 organizations have been certified. Unlike the international standard ISO 27001:2022, which implements a comprehensive approach to building an information security management system, Cyber Essentials is a basic level of protection against cyber threats, w
APA, Harvard, Vancouver, ISO, and other styles
17

Dawson, Maurice. "Applying a holistic cybersecurity framework for global IT organizations." Business Information Review 35, no. 2 (2018): 60–67. http://dx.doi.org/10.1177/0266382118773624.

Full text
Abstract:
Examined are the three core themes: the role of education in cybersecurity, the role of technology in cybersecurity, and the role of policy in cybersecurity. These topics are essential for organizations seeking to establish environments that allow them to be successful irregardless of location while examining external and internal conditions. This study examined the research gaps within cybersecurity as it relates to core themes in an effort to develop stronger policies, education programs, and hardened technologies for cybersecurity use. This work illustrates how cybersecurity can be broken i
APA, Harvard, Vancouver, ISO, and other styles
18

Hernandez-Ramos, Jose L., Sara N. Matheu, and Antonio Skarmeta. "The Challenges of Software Cybersecurity Certification [Building Security In]." IEEE Security & Privacy 19, no. 1 (2021): 99–102. http://dx.doi.org/10.1109/msec.2020.3037845.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Kipker, Dennis-Kenji. "EU Cybersecurity Act und Certification Schemes: ein aktueller Fortschrittsbericht." Datenschutz und Datensicherheit - DuD 44, no. 4 (2020): 263–65. http://dx.doi.org/10.1007/s11623-020-1264-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Tsikteris, Sean, Odyssefs Diamantopoulos Pantaleon, and Eirini Eleni Tsiropoulou. "Cybersecurity Certification Requirements for Distributed Energy Resources: A Survey of SunSpec Alliance Standards." Energies 17, no. 19 (2024): 5017. http://dx.doi.org/10.3390/en17195017.

Full text
Abstract:
This survey paper explores the cybersecurity certification requirements defined by the SunSpec Alliance for Distributed Energy Resource (DER) devices, focusing on aspects such as software updates, device communications, authentication mechanisms, device security, logging, and test procedures. The SunSpec cybersecurity standards mandate support for remote and automated software updates, secure communication protocols, stringent authentication practices, and robust logging mechanisms to ensure operational integrity. Furthermore, the paper discusses the implementation of the SAE J3072 standard us
APA, Harvard, Vancouver, ISO, and other styles
21

Nowrozy, Raza. "GPTs or Grim Position Threats? The Potential Impacts of Large Language Models on Non-Managerial Jobs and Certifications in Cybersecurity." Informatics 11, no. 3 (2024): 45. http://dx.doi.org/10.3390/informatics11030045.

Full text
Abstract:
ChatGPT, a Large Language Model (LLM) utilizing Natural Language Processing (NLP), has caused concerns about its impact on job sectors, including cybersecurity. This study assesses ChatGPT’s impacts in non-managerial cybersecurity roles using the NICE Framework and Technological Displacement theory. It also explores its potential to pass top cybersecurity certification exams. Findings reveal ChatGPT’s promise to streamline some jobs, especially those requiring memorization. Moreover, this paper highlights ChatGPT’s challenges and limitations, such as ethical implications, LLM limitations, and
APA, Harvard, Vancouver, ISO, and other styles
22

Levy, Yair, and Ruti Gafni. "Towards the quantification of cybersecurity footprint for SMBs using the CMMC 2.0." Online Journal of Applied Knowledge Management 10, no. 1 (2022): 43–61. http://dx.doi.org/10.36965/ojakm.2022.10(1)43-61.

Full text
Abstract:
Organizations, small and big, are faced with major cybersecurity challenges over the past several decades, as the proliferation of information systems and mobile devices expand. While larger organizations invest significant efforts in developing approaches to deal with cybersecurity incidents, Small and Medium Businesses (SMBs) are still struggling with ways to both keep their businesses alive and secure their systems to the best of their abilities. When it comes to critical systems, such as defense industries, the interconnectivities of organizations in the supply-chain have demonstrated to b
APA, Harvard, Vancouver, ISO, and other styles
23

Regueiro, Cristina, and Borja Urquizu. "Blockchain-Based Evidence Trustworthiness System in Certification." Journal of Cybersecurity and Privacy 5, no. 1 (2024): 1. https://doi.org/10.3390/jcp5010001.

Full text
Abstract:
Digital evidence is a critical component in today’s organizations, as it is the foundation on which any certification is based. This paper presents a risk assessment of evidence in the certification domain to identify the main security risks. To mitigate these risks, it also proposes an adaptation of an existing Blockchain-based audit trail system to create an evidence trustworthiness system enhancing security and usability. This system covers specific additional requirements from auditors: evidence confidentiality and integrity verification automation. The system has been validated with cloud
APA, Harvard, Vancouver, ISO, and other styles
24

Parth, Kasurde, Nikorawalla Haftaandad, and Tandon Rudraksh. "Cybersecurity: Firewalls, Protocols, Needs & Algorithm." International Journal of Innovative Science and Research Technology 8, no. 1 (2023): 233–36. https://doi.org/10.5281/zenodo.7556200.

Full text
Abstract:
The volume of internet transactions has multiplied dramatically in recent years. The internet, however, has numerous security flaws. As a result, protecting our sensitive data is currently a very difficult task. The majority of medium and big businesses having an online presence are linked to a network. Security demands that a barrier be built between the internal network and the public Internet. The &quot;trusted&quot; and &quot;untrusted&quot; sides of the network can be used to describe them. There are numerous tools and gadgets available to assist safeguard our data. By enrolling in the to
APA, Harvard, Vancouver, ISO, and other styles
25

Martinez, Cristina, Iñaki Etxaniz, Alberto Molinuevo, and Juncal Alonso. "MEDINA Catalogue of Cloud Security controls and metrics: Towards Continuous Cloud Security compliance." Open Research Europe 4 (April 24, 2024): 90. http://dx.doi.org/10.12688/openreseurope.16669.1.

Full text
Abstract:
In order to address current challenges on security certification of European ICT products, processes and services, the European Comission, through ENISA (European Union Agency for Cybersecurity), has developed the European Cybersecurity Certification Scheme for Cloud Services (EUCS). This paper presents the overview of the H2020 MEDINA project approach and tools to support the adoption of EUCS and offers a detailed description of one of the core components of the framework, the MEDINA Catalogue of Controls and Metrics. The main objective of the MEDINA Catalogue is to provide automated function
APA, Harvard, Vancouver, ISO, and other styles
26

Matheu, Sara N., Jose L. Hernandez-Ramos, and Antonio F. Skarmeta. "Toward a Cybersecurity Certification Framework for the Internet of Things." IEEE Security & Privacy 17, no. 3 (2019): 66–76. http://dx.doi.org/10.1109/msec.2019.2904475.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Matheu, Sara N., José L. Hernández-Ramos, Antonio F. Skarmeta, and Gianmarco Baldini. "A Survey of Cybersecurity Certification for the Internet of Things." ACM Computing Surveys 53, no. 6 (2020): 1–36. http://dx.doi.org/10.1145/3410160.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Islam, Md Shariful, Nusrat Farah, and Thomas F. Stafford. "Factors associated with security/cybersecurity audit by internal audit function." Managerial Auditing Journal 33, no. 4 (2018): 377–409. http://dx.doi.org/10.1108/maj-07-2017-1595.

Full text
Abstract:
Purpose The purpose of the study is to explore the factors associated with the extent of security/cybersecurity audit by the internal audit function (IAF) of the firm. Specifically, the authors focused on whether IAF/CAE (certified audit executive [CAE]) characteristics, board involvement related to governance, role of the audit committee (or equivalent) and the chief risk officer (CRO) and IAF tasked with enterprise risk management (ERM) are associated with the extent to which the firm engages in security/cybersecurity audit. Design/methodology/approach For analysis, the paper uses responses
APA, Harvard, Vancouver, ISO, and other styles
29

Matheu-García, Sara Nieves, José Luis Hernández-Ramos, Antonio F. Skarmeta, and Gianmarco Baldini. "Risk-based automated assessment and testing for the cybersecurity certification and labelling of IoT devices." Computer Standards & Interfaces 62 (February 1, 2019): 64–83. https://doi.org/10.1016/j.csi.2018.08.003.

Full text
Abstract:
Nowadays, security aspects represent one of the most significant barriers for the adoption of large-scale Internet of Things (IoT) deployments. In this sense, being able to certify and communicate the security level of a certain device is crucial for their acceptance. Towards this end, we propose a security certification methodology designed for IoT to empower different stakeholders with the ability to assess security solutions for large-scale IoT deployments in an automated way. It also supports transparency on the IoT security level to the consumers because the methodology provides a label a
APA, Harvard, Vancouver, ISO, and other styles
30

DeCusatis, Casimer, Raymond Tomo, Aurn Singh, Emile Khoury, and Andrew Masone. "Cybersecurity Applications of Near-Term Large Language Models." Electronics 14, no. 13 (2025): 2704. https://doi.org/10.3390/electronics14132704.

Full text
Abstract:
This paper examines near-term generative large language models (GenLLM) for cybersecurity applications. We experimentally study three common use cases, namely the use of GenLLM as a digital assistant, analysts for threat hunting and incident response, and analysts for access management in zero trust systems. In particular, we establish that one of the most common GenLLMs, ChatGPT, can pass cybersecurity certification exams for security fundamentals, hacking and penetration testing, and mobile device security, as well as perform competitively in cybersecurity ethics assessments. We also identif
APA, Harvard, Vancouver, ISO, and other styles
31

Benyahya, Meriem, Anastasija Collen, and Niels Alexander Nijdam. "Cybersecurity and Data Privacy Certification Gaps of Connected and Automated Vehicles." Transportation Research Procedia 72 (2023): 783–90. http://dx.doi.org/10.1016/j.trpro.2023.11.468.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Matheu, Sara N., Juan F. Martínez-Gil, Irene Bicchierai, Jan Marchel, Radosław Piliszek, and Antonio Skarmeta. "A Flexible Risk-Based Security Evaluation Methodology for Information Communication Technology System Certification." Applied Sciences 15, no. 3 (2025): 1600. https://doi.org/10.3390/app15031600.

Full text
Abstract:
As Information and Communication Technology (ICT) systems become increasingly complex, the need for adaptable and efficient security certification frameworks grows. This paper introduces a flexible security evaluation methodology designed to serve as the foundation for cybersecurity certification across diverse ICT systems. The proposed methodology integrates risk assessment and test-based evaluation, offering a scalable approach that adapts to different tools and processes, addressing the limitations of existing rigid certification schemes. The certification approach expands on ETSI’s Risk-Ba
APA, Harvard, Vancouver, ISO, and other styles
33

Kipker, Dennis-Kenji. "EU Cybersecurity Act and Certification Schemes: an up-to-date progress report." Datenschutz und Datensicherheit - DuD 44, no. 6 (2020): 390–92. http://dx.doi.org/10.1007/s11623-020-1290-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Mincewicz, Wojciech. "EDUCATION IN THE FIELD OF CYBERSECURITY AT UNIVERSITIES IN POLAND." Zeszyty Naukowe SGSP 86 (June 26, 2023): 117–25. http://dx.doi.org/10.5604/01.3001.0053.7149.

Full text
Abstract:
The article characterizes the current state of development of cybersecurity education in highereducation institutions in Poland. The purpose of the study is to characterize the models of cybersecurity education, to verify the development trends and to attempt to estimate further directionsin higher education for cyber security professionals. The compiled material, obtained frompublicly available databases and curricula, allowed us to formulate conclusions related to theeducation process itself, as well as to the confirmation of skills. A quantitative as well as qualitativeanalysis of the data
APA, Harvard, Vancouver, ISO, and other styles
35

Oday, Oday, Esraa Saleh Alomari, Ali Nafea Yousif, Oday Ali Hassen, Saad M. Darwish, and Yu Yu Gromov. "Type-2 Neutrosophic Ontology for Automated Essays Scoring in Cybersecurity Education." Journal of Cybersecurity and Information Management 15, no. 2 (2025): 293–304. https://doi.org/10.54216/jcim.150222.

Full text
Abstract:
Given the growing demand for cybersecurity education, the practice of protecting network and software systems from digital and electronic attacks, investing in educational cybersecurity helps significantly reduce the risk of data breaches and protect against security breaches, and given the urgent need and growing number of students worldwide, it is also a way to connect with and between customers by building trust-based relationships, especially regarding essays. Automated Essay Scoring (AES) is a scalable solution for grading large amounts of essays with multiple uses, making it ideal for cy
APA, Harvard, Vancouver, ISO, and other styles
36

Farrand, Benjamin, Helena Carrapico, and Aleksei Turobov. "The new geopolitics of EU cybersecurity: security, economy and sovereignty." International Affairs 100, no. 6 (2024): 2379–97. http://dx.doi.org/10.1093/ia/iiae231.

Full text
Abstract:
Abstract The European Union (EU) is currently experiencing significant geopolitical shifts and is concerned that its dependence on externally produced or foreign-owned technologies risks its strategic autonomy, with implications for its security and economy. In response, it has placed sovereignty at the forefront of its agenda and at the centre of its relations with the world. Academic literature has so far paid limited attention to understanding the interactions between geopolitics, perceptions of technological dependence, and the impact on policy governance in cybersecurity. Bearing this gap
APA, Harvard, Vancouver, ISO, and other styles
37

Azzani, Ihsania Karin, Susilo Adi Purwantoro, and Hikmat Zakky Almubarok. "Enhancing awareness of cyber crime: a crucial element in confronting the challenges of hybrid warfare In Indonesia." Defense and Security Studies 5 (January 5, 2024): 1–9. http://dx.doi.org/10.37868/dss.v5.id255.

Full text
Abstract:
The Cyber Defense Center, abbreviated as Pushansiber, is an institution responsible for carrying out the duties and functions of the Defense Strategic Installation Agency. Pushansiber has an important role in implementing governance, cooperation, operations, and ensuring cyber defense security. However, this year there has been an increase in problems related to cyber attacks, such as phishing, malware, ransomware, spam. These cyber attacks are included in the concept of hybrid warfare which is believed to be a form of conflict that involves the utilization of various elements, one of which is
APA, Harvard, Vancouver, ISO, and other styles
38

Puchkov, Oleksandr, and Оlena Uvarkina. "Sustainable development of the system of formal cyber education: reflection of modern concepts." Collection "Information Technology and Security" 11, no. 1 (2023): 60–68. http://dx.doi.org/10.20535/2411-1031.2023.11.1.283635.

Full text
Abstract:
The article defines the conceptual framework for sustainable development of the formal cyberworld system. An analysis of contemporary regulatory, legal, and scientific sources on the preparation of cyber specialists for the security and defense sector has been conducted. The main research methods identified are synthesis, comparative analysis, focusing method, and cause-and-effect method. The new U.S. Cybersecurity Strategy addressing cyber education issues has been analyzed, which sets new requirements for cyber professionals in the context of the transformation of the global and national sec
APA, Harvard, Vancouver, ISO, and other styles
39

Rampášek, Michal, Matúš Mesarčík, and Jozef Andraško. "Evolving cybersecurity of AI-featured digital products and services: Rise of standardisation and certification?" Computer Law & Security Review 56 (April 2025): 106093. https://doi.org/10.1016/j.clsr.2024.106093.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Vaidyanathan R. Iyer. "Institutionalizing Trust in Healthcare Cybersecurity: A Qualitative Analysis of Cyber Assurance and Investment Readiness." Journal of Information Systems Engineering and Management 10, no. 3 (2025): 1864–78. https://doi.org/10.52783/jisem.v10i3.8754.

Full text
Abstract:
In India’s fast digitizing healthcare sector, these vulnerabilities are fast becoming evident, as the frequency and sophistication of cyberattacks are increasing. Although more people are becoming aware of the need for cybersecurity programs, most institutions have low cybersecurity maturity characterized with disjointed controls, disjointed architectures, and strongly enforced policies. The sector’s dependence on sensitive patient data, IoT devices and digital health platforms makes these gaps especially concerning. This article fills an urgent need for strategic, governance led response to c
APA, Harvard, Vancouver, ISO, and other styles
41

Apriyanto, Apriyanto, Siti Mudawanah, Edi Sutanto, Adi Dwi Purnomo, and Muhammad Wahid Murniawan. "Auditing in the Era of Cybersecurity: Challenges and Solutions." Journal Markcount Finance 2, no. 2 (2024): 285–95. https://doi.org/10.70177/jmf.v2i2.1291.

Full text
Abstract:
As threats and risks increase in the digital world, auditing in the cyber security era faces significant new challenges. Rapid digital change has increased the complexity of information systems, which makes the audit environment more complicated and requires new approaches to assessing the effectiveness of security controls. The increase in cyber threats that can threaten the integrity, confidentiality and availability of data is one of the main challenges facing auditors. Increasingly varied and sophisticated cyberattacks require proactive and adaptive audit techniques. Auditors must have the
APA, Harvard, Vancouver, ISO, and other styles
42

Fidelis Othuke Onyekwe, Oladipo Odujobi, Friday Emmanuel Adikwu, and Tari Yvonne Elete. "Innovative approaches to enhancing functional safety in Distributed Control Systems (DCS) and Safety Instrumented Systems (SIS) for Oil and Gas Applications." Open Access Research Journal of Multidisciplinary Studies 3, no. 1 (2022): 106–12. https://doi.org/10.53022/oarjms.2022.3.1.0027.

Full text
Abstract:
Functional safety in Distributed Control Systems (DCS) and Safety Instrumented Systems (SIS) is vital for ensuring operational integrity and mitigating risks in the oil and gas industry. These systems face numerous challenges, including high-risk processes, gaps in existing safety frameworks, and emerging threats such as cybersecurity vulnerabilities and aging infrastructure. This paper explores innovative approaches to enhancing functional safety by adopting advanced technologies, including artificial intelligence, machine learning, digital twins, and predictive maintenance. The integration o
APA, Harvard, Vancouver, ISO, and other styles
43

Matheu-García, Sara N., José L. Hernández-Ramos, Antonio F. Skarmeta, and Gianmarco Baldini. "Risk-based automated assessment and testing for the cybersecurity certification and labelling of IoT devices." Computer Standards & Interfaces 62 (February 2019): 64–83. http://dx.doi.org/10.1016/j.csi.2018.08.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Guan, Ran. "Future Era of Accountants under the Impact of AI." SHS Web of Conferences 218 (2025): 03028. https://doi.org/10.1051/shsconf/202521803028.

Full text
Abstract:
The integration of Artificial Intelligence (AI) in accounting is transforming the profession by automating tasks such as fraud detection, financial forecasting, and risk assessment, enhancing efficiency and accuracy. As AI reshapes the industry, accountants must develop expertise in data analytics, predictive modeling, and cybersecurity to remain competitive. CPA Canada and AICPA have incorporated AI governance and digital risk management into certification programs to equip accountants for this shift. The Big Four accounting firms—Deloitte, PwC, KPMG, and EY—are leading AI adoption, implement
APA, Harvard, Vancouver, ISO, and other styles
45

КУТОВА, Марина. "МОДЕЛЬ СТРАТЕГІЧНОГО ПЛАНУВАННЯ РОЗВИТКУ СИСТЕМИ ЕЛЕКТРОННОГО УРЯДУВАННЯ В КОНТЕКСТІ ЗАБЕЗПЕЧЕННЯ ІНФОРМАЦІЙНОЇ БЕЗПЕКИ". Herald of Khmelnytskyi National University. Economic sciences 342, № 3(1) (2025): 12–16. https://doi.org/10.31891/2307-5740-2025-342-3(1)-1.

Full text
Abstract:
The article proposes a strategic planning model for the development of e-government in Ukraine, with a central focus on ensuring information security. The research is motivated by the intensifying cyber threats accompanying digital transformation and the need for a coherent, staged approach to mitigating security risks in public administration. The author justifies the use of short-term, medium-term, and long-term planning horizons to structure the strategic response to current and anticipated digital vulnerabilities. In the short term, the focus lies on regulatory modernization, particularly
APA, Harvard, Vancouver, ISO, and other styles
46

Botha-Badenhorst, Danielle, André Martin McDonald, Graham David Barbour, Ethan Buckinjohn, and Wian Gertenbach. "On The Zero-Trust Intranet Certification Problem." International Conference on Cyber Warfare and Security 19, no. 1 (2024): 10–18. http://dx.doi.org/10.34190/iccws.19.1.2054.

Full text
Abstract:
Securing corporate networks and ensuring the trustworthiness of network resources are critical security concerns for organisations in today's interconnected digital landscape. The zero-trust security model is an approach to designing and implementing ICT systems which prescribes that clients and servers cannot be trusted automatically, even when connected to networks traditionally considered trusted. The implementation of the zero-trust model within the corporate intranet requires a secure method to verify the identity of local servers. On the Internet, trust in the identity of public servers
APA, Harvard, Vancouver, ISO, and other styles
47

Tretiak, Yurii. "System of subjects of administrative and legal support of cybersecurity." Visnik Nacional’nogo universitetu «Lvivska politehnika». Seria: Uridicni nauki 11, no. 42 (2024): 197–205. http://dx.doi.org/10.23939/law2024.42.197.

Full text
Abstract:
This article analyzes the role of administrative bodies in ensuring cyber security from a legal and administrative perspective. The key functions and tasks they perform for effective management and protection of information resources and cyber infrastructure are considered, as well as the importance of the role of subjects of administrative and legal protection of cyber security in the formation of strategies and policies aimed at ensuring cyber security is highlighted, and their contribution to the creation of a secure and stable cyberspace. Aspects that contribute to a better understanding o
APA, Harvard, Vancouver, ISO, and other styles
48

Ito, Kosuke, Shuji Morisaki, and Atsuhiro Goto. "IoT Security-Quality-Metrics Method and Its Conformity with Emerging Guidelines." IoT 2, no. 4 (2021): 761–85. http://dx.doi.org/10.3390/iot2040038.

Full text
Abstract:
This study proposes a security-quality-metrics method tailored for the Internet of things (IoT) and evaluates conformity of the proposed approach with pertinent cybersecurity regulations and guidelines for IoT. Cybersecurity incidents involving IoT devices have recently come to light; consequently, IoT security correspondence has become a necessity. The ISO 25000 series is used for software; however, the concept of security as a quality factor has not been applied to IoT devices. Because software vulnerabilities were not the device vendors’ responsibility as product liability, most vendors did
APA, Harvard, Vancouver, ISO, and other styles
49

U.E., Akpan,, and Okoye O. "Cybersecurity in the Petroleum Industry: A Comprehensive Review of Threats and Mitigation Strategies." Journal of Engineering Research and Reports 26, no. 12 (2024): 261–70. https://doi.org/10.9734/jerr/2024/v26i121356.

Full text
Abstract:
The reliance of the petroleum industry on digital technologies is on the increase. This increase has introduced significant cyber security risks, threatening operations, safety, and the environment. This review examines the current state of cyber security in the petroleum industry, highlighting the range of threats, including phishing, ransom ware, OT-specific risks, like attacks on SCADA and ICS systems, and industrial control system attacks. It also assesses the effectiveness of countermeasures, such as risk assessment, incident response planning, employee training, and advanced security mea
APA, Harvard, Vancouver, ISO, and other styles
50

Rohit, Singh Raja. "Securing Healthcare Data: A Systematic Review of Compliance, Privacy, and Cybersecurity Strategies." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 9, no. 6 (2023): 1–13. https://doi.org/10.5281/zenodo.14838616.

Full text
Abstract:
Introduction: Health Information Systems (HISs) are essential for the management of healthcare data, covering electronic health records (EHRs), clinical decision-making, and administrative functions. Healthcare organizations encounter substantial cyber risks, including ransomware and data breaches, aimed at Patient Health Information (PHI). HIPAA laws require encryption, risk management, and employee training for protecting PHI. Underfunded systems expose developing countries to additional hazards. Cloud computing provides secure solutions that improve data protection through encryption, acces
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!