Academic literature on the topic 'Cybersecurity Framework (e.g'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cybersecurity Framework (e.g.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cybersecurity Framework (e.g"

1

Rao, Yongsheng, Srinath Ponnusamy, Sundareswaran Raman, Aysha Khan, and Jana Shafi. "Fuzzy Coalition Graphs: A Framework for Understanding Cooperative Dominance in Uncertain Networks." Mathematics 12, no. 22 (2024): 3614. http://dx.doi.org/10.3390/math12223614.

Full text
Abstract:
In a fuzzy graph G, a fuzzy coalition is formed by two disjoint vertex sets V1 and V2, neither of which is a strongly dominating set, but the union V1∪V2 forms a strongly dominating set. A fuzzy coalition partition of G is defined as Π={V1,V2,⋯,Vk}, where each set Vi either forms a singleton strongly dominating set or is not a strongly dominating set but forms a fuzzy coalition with another non-strongly dominating set in Π. A fuzzy graph with such a fuzzy coalition partition Π is called a fuzzy coalition graph, denoted as FG(G,Π). The vertex set of the fuzzy coalition graph consists of {V1,V2,
APA, Harvard, Vancouver, ISO, and other styles
2

Mosaddeque, Ananna, Mantaka Rowshon, Tamim Ahmed, Umma Twaha, and Binso Babu. "The Role of AI and Machine Learning in Fortifying Cybersecurity Systems in the US Healthcare Industry." Inverge Journal of Social Sciences 1, no. 2 (2022): 70–81. https://doi.org/10.63544/ijss.v1i2.101.

Full text
Abstract:
The digital transformation of healthcare has brought about unprecedented advancements, but it has also introduced significant cybersecurity risks. Cyberattacks targeting sensitive patient data, employee information, and critical operational systems are on the rise, demanding innovative and robust security measures. Enter the powerful duo of Artificial Intelligence (AI) and Machine Learning (ML). These cutting-edge technologies offer a powerful arsenal against these cyber threats. AI algorithms can analyse massive datasets from various sources, such as network traffic, user behaviour, and medic
APA, Harvard, Vancouver, ISO, and other styles
3

Ahmed, N. B., N. Daclin, M. Olivaux, and G. Dusserre. "Addressing the Dilemma of a “Crisis within a crisis”: Exploring the Penetration Testing challenges in a Mobile Field Hospital Setting." Advances in Multidisciplinary and scientific Research Journal Publication 2, no. 2 (2023): 67–80. http://dx.doi.org/10.22624/aims/csean-smart2023p9.

Full text
Abstract:
This paper focuses on evaluating the security challenges faced by mobile field hospitals, which play a crucial role in emergency response and disaster management in remote and austere environments. The authors conducted a penetration test using the Open Source Security Testing Methodology Manual (OSSTMM) framework to assess the security posture of a mobile field hospital. The methodology employed in the study included a combination of automated and manual techniques such as network scanning, vulnerability assessments, social engineering, and exploitation. The penetration test revealed several
APA, Harvard, Vancouver, ISO, and other styles
4

Gütl, Christian. "Editorial." JUCS - Journal of Universal Computer Science 31, no. (6) (2025): 550–51. https://doi.org/10.3897/jucs.158922.

Full text
Abstract:
Dear Readers,It gives me great pleasure to announce the fifth regular issue of 2025. I would like to thank all the authors for their sound research papers and the editorial board and our guest reviewers for their extremely valuable reviews and suggestions for improvement. These contributions and the generous support of the KOALA consortium members enable us to run our journal and maintain its quality. I would also like to thank our broader community for reading and incorporating sound J.UCS papers into their research.Still, I would like to expand our editorial board: If you are a tenured assoc
APA, Harvard, Vancouver, ISO, and other styles
5

Gütl, Christian. "Editorial." JUCS - Journal of Universal Computer Science 31, no. 6 (2025): 550–51. https://doi.org/10.3897/jucs.158922.

Full text
Abstract:
Dear Readers, It gives me great pleasure to announce the fifth regular issue of 2025. I would like to thank all the authors for their sound research papers and the editorial board and our guest reviewers for their extremely valuable reviews and suggestions for improvement. These contributions and the generous support of the KOALA consortium members enable us to run our journal and maintain its quality. I would also like to thank our broader community for reading and incorporating sound J.UCS papers into their research. Still, I would like to expand our editorial board: If you are a tenured ass
APA, Harvard, Vancouver, ISO, and other styles
6

Mohammed, Mustafa Khan. "NIST Cybersecurity Framework." Journal of Scientific and Engineering Research 10, no. 8 (2023): 150–57. https://doi.org/10.5281/zenodo.13950701.

Full text
Abstract:
The NIST Cybersecurity Framework (NIST CSF) is a voluntary approach to dealing with cyber threats in an organization. The framework is developed by the National Institute of Standards and Technology and it is designed to provide organizations with a structured method and enhance their security priorities. The framework is used across the public and private sectors in various areas such as finance, the government, health care, and critical infrastructure. This essay takes an in-depth look into the NIST Cybersecurity Framework, including its different components, leadership and implementation st
APA, Harvard, Vancouver, ISO, and other styles
7

Brito-Acuña, Guillermo. "Aeronautic maturity cybersecurity: a framework." DYNA 90, no. 227 (2023): 24–34. http://dx.doi.org/10.15446/dyna.v90n227.107420.

Full text
Abstract:
This article presents the results of a systematic review of the methods to implement cybersecurity maturity. Based on them, it proposes a framework for excellence in aeronautical cybersecurity that integrates the objectives of aeronautical cybersecurity with capabilities and requirements, which contributes to increasing the maturity of aeronautical cybersecurity. It exposes 13 objectives with 120 capabilities and 5 functional maturity levels to gradually meet up to 600 aeronautical cybersecurity requirements. Which were taken from articles with good practices associated with publications of th
APA, Harvard, Vancouver, ISO, and other styles
8

Kovács, László. "National Cybersecurity Strategy Framework." Academic and Applied Research in Military and Public 18, no. 2 (2019): 65–76. http://dx.doi.org/10.32565/aarms.2019.2.9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Swire, Peter. "A pedagogic cybersecurity framework." Communications of the ACM 61, no. 10 (2018): 23–26. http://dx.doi.org/10.1145/3267354.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Liszkowska, Dominika. "Türkey’s Cybersecurity Policy Framework." Cybersecurity and Law 11, no. 1 (2024): 79–91. http://dx.doi.org/10.35467/cal/187262.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cybersecurity Framework (e.g"

1

Smith, Willarvis. "A Comprehensive Cybersecurity Defense Framework for Large Organizations." Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1083.

Full text
Abstract:
There is a growing need to understand and identify overarching organizational requirements for cybersecurity defense in large organizations. Applying proper cybersecurity defense will ensure that the right capabilities are fielded at the right locations to safeguard critical assets while minimizing duplication of effort and taking advantage of efficiencies. Exercising cybersecurity defense without an understanding of comprehensive foundational requirements instills an ad hoc and in many cases conservative approach to network security. Organizations must be synchronized across federal and civil
APA, Harvard, Vancouver, ISO, and other styles
2

Murray, Glenn Kristian. "Managing cybersecurity risk for critical infrastructure: A framework to secure critical infrastructure." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2024. https://ro.ecu.edu.au/theses/2864.

Full text
Abstract:
As cyber threats continue to evolve, the protection of critical infrastructure has become a paramount concern, particularly considering the devastating potential these threats hold. The 2024 cyberattack on Change Healthcare, which resulted in significant financial losses for UnitedHealth, $870 million in the first quarter alone and up to $1.6 billion for the year, highlights the urgent need for effective cybersecurity measures to safeguard essential services. This thesis investigates the cybersecurity maturity of Australian critical infrastructure healthcare and, food and grocery sectors., foc
APA, Harvard, Vancouver, ISO, and other styles
3

Kuznietsova, Tetiania, and Andrii Chyrkov. "State and perspectives of aircraft cybersecurity." Thesis, National aviation university, 2021. https://er.nau.edu.ua/handle/NAU/50678.

Full text
Abstract:
During the latest events in the aviation world, where experts in the field of cybersecurity (example) opened the possibility of gaining access to the aircraft's on-board systems, industry experts (and not only) thought about it. And we are doing quite a lot. There are many existing guides that contain recommendations and practices, for example: «Software Considerations in Airborne Systems and Equipment Certification» contains recommendations for evaluating security and assuring software quality. There is a separation of access, because all systems are somehow connected to each other th
APA, Harvard, Vancouver, ISO, and other styles
4

Camporesi, Mirko. "Securopoly: un gioco per l'insegnamento della Cybersecurity." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/13274/.

Full text
Abstract:
All'interno della tesi sono presentati vari argomenti legati al mondo della sicurezza informatica e del suo insegnamento. Lo scopo di questo lavoro è presentare la tecnica della gamification e la sua applicazione nel panorama della cybersecurity moderna. Inoltre, viene proposto un gioco di società chiamato Securopoly che implementa le nozioni descritte e che è basato fortemente sul Framework Nazionale per la cybersecurity, un documento che pone gli standard che ogni organizzazione e ogni azienda dovrebbero soddisfare per essere all'avanguardia nel tentativo di difendersi da attacchi informatic
APA, Harvard, Vancouver, ISO, and other styles
5

Leon, Ryan James. "An Event Management Framework to Aid Solution Providers in Cybersecurity." Thesis, The George Washington University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10745141.

Full text
Abstract:
<p> Cybersecurity event management is critical to the successful accomplishment of an organization&rsquo;s mission. To put it in perspective, in 2016 Symantec tracked over 700 global adversaries and recorded events from 98 million sensors (Aimoto et al., 2017). Studies show that in 2015, more than 55% of the cyberattacks on government operation centers were due to negligence and the lack of skilled personnel to perform network security duties including the failure to properly identify events (Ponemon, 2015a). Practitioners are charged to perform as first responders to any event that affects th
APA, Harvard, Vancouver, ISO, and other styles
6

Snyder, Justin Charles. "A Framework and Exploration of a Cybersecurity Education Escape Room." BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/6958.

Full text
Abstract:
This thesis presents a review of educational-escape-room literature followed by a design-oriented framework (the Snyder Escape Room Framework or SERF) and demonstrates the potential efficacy of escape-rooms in cybersecurity education. Several authors have proposed frameworks and guidelines for game and educational design regarding escape rooms. This work coalesces some of those ideas into a more substantial and comprehensive framework (SERF) that designers can use when developing educational escape rooms. The Snyder Escape Room Framework provides heuristics for goals and objectives, players, a
APA, Harvard, Vancouver, ISO, and other styles
7

Newby, Chandler Ryan. "Designing Cybersecurity Competitions in the Cloud: A Framework and Feasibility Study." BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/7417.

Full text
Abstract:
Cybersecurity is an ever-expanding field. In order to stay current, training, development, and constant learning are necessary. One of these training methods has historically been competitions. Cybersecurity competitions provide a method for competitors to experience firsthand cybersecurity concepts and situations. These experiences can help build interest in, and improve skills in, cybersecurity. While there are diverse types of cybersecurity competitions, most are run with on-premise hardware, often centralized at a specific location, and are usually limited in scope by available hardware. T
APA, Harvard, Vancouver, ISO, and other styles
8

Tisdale, Susan M. "Architecting a Cybersecurity Management Framework| Navigating and Traversing Complexity, Ambiguity, and Agility." Thesis, Robert Morris University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10825513.

Full text
Abstract:
<p> Despite advancements in technology, countermeasure, and situational awareness, cybersecurity (CS) breaches continue to increase in number, complexity, and severity. This qualitative study is one of a few to comprehensively explore CS management. The study used a systems&rsquo; approach to identify business, socioeconomic, and information technology (IT) factors, and their interrelationships. The study examined IT management frameworks and CS standards and literature. Interviews and a focus group of subject matter experts followed. The research found CS is a leadership, not a technical issu
APA, Harvard, Vancouver, ISO, and other styles
9

Bakare, Adeyinka A. "A Methodology for Cyberthreat ranking: Incorporating the NIST Cybersecurity Framework into FAIR Model." University of Cincinnati / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1583247043269043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cornel, Caralea May. "A Methodology to Measure the Impact of Diversity on Cybersecurity Team Effectiveness." BYU ScholarsArchive, 2019. https://scholarsarchive.byu.edu/etd/8594.

Full text
Abstract:
In recent years, the definition of cybersecurity professional has been diluted to include more individuals, particularly women, to be included. Depending on the definition used, women currently comprise between 11% and 25% of the cybersecurity workforce. While multiple studies have indicated the benefits to diverse teams, research in the cybersecurity area is lacking.This research proposes a framework that uses a modified escape-the-room gamified scenario to measure the effectiveness of cybersecurity teams in technical problem-solving. The framework presents two routes, incident response and p
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Cybersecurity Framework (e.g"

1

Singh, Pramod K. Towards a framework for g-governance: Case study of India. Institute of Rural Management Anand, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

United States. Congress. House. Committee on Homeland Security. Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. Oversight of Executive Order 13636 and development of the cybersecurity framework: Hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, first session, July 18, 2013. U.S. Government Printing Office, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

OPEC Fund for International Development., ed. Coherence or dissonance in the international institutional framework: A shifting paradigm ; proceedings of a workshop of the G-24 held at the OPEC Fund for International Development. OPEC Fund for International Development, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Office, General Accounting. Department of Energy: A framework for restructuring DOE and its missions : report to the Congress. The Office, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Andronati, S. A. Managementul bazinului transfrontalier al fl. Nistru și Directiva-cadru a apelor a Uniunii Europene: Materialele conferinței internaționale, Chișinaŭ, 2-3 octombrie 2008 = Upravlenie basseĭnom transgranichnoĭ reki Dnestr i Vodnai︠a︡ ramochnai︠a︡ direktiva Evropeĭskogo Soi︠u︡za : materialy mezhdunarodnoĭ konferent︠s︡ii, Kishinev, 2-3 okti︠a︡bri︠a︡ 2008 g. = Transboundary Dniester River Basin management and the EU Water Framework Directive : proceedings of the international conference, Chișinaŭ, October 2-3, 2008. Eco-TIRAS, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Maksurov, Aleksey. Ensuring information security on the Internet. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1942595.

Full text
Abstract:
The monograph examines the features of legal relations in the field of information security in the global information space. The concept of "cybersecurity" is investigated, the institutional independence of the norms of law on ensuring security in the cyber environment is substantiated from the point of view of the subject and method of legal regulation. Considerable attention is paid to the characteristics of the sources of law on ensuring information security on the Internet. Substantial proposals have been made to improve legal regulation in this area both at the national (primarily Russian
APA, Harvard, Vancouver, ISO, and other styles
7

Dambrino, Roddy. Cybersecurity 104: Deploying a Framework. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Isaca. Implementing the NIST Cybersecurity Framework. Information Systems Audit and Control Association, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

MARK A RUSSO CISSP-ISSAP CISO. National Cybersecurity Framework : a Solution for Agile Cybersecurity: Blueprint for Rapid Cybersecurity Implementation. Independently Published, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Snyder, Don, Ryan Henry, Stacie L. Pettyjohn, Sina Beaghley, and Igor Mikolic Torreira. Framework for Exploring Cybersecurity Policy Options. RAND Corporation, The, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Cybersecurity Framework (e.g"

1

Ayala, Luis. "G." In Cybersecurity Lexicon. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2068-9_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Young, Richard Gwashy. "Cybersecurity Framework." In The Cybersecurity Handbook. Productivity Press, 2025. https://doi.org/10.4324/9781003608059-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Datta, Pratim Milton. "Cybersecurity Protection Framework." In Global Technology Management 4.0. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96929-5_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Alsmadi, Izzat. "Cybersecurity Management." In The NICE Cyber Security Framework. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-21651-0_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Möller, Dietmar P. F. "NIST Cybersecurity Framework and MITRE Cybersecurity Criteria." In Advances in Information Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-26845-8_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kissoon, Tara. "Cybersecurity Risk Management Framework." In Optimal Spending on Cybersecurity Measures. CRC Press, 2024. http://dx.doi.org/10.1201/9781003497523-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kissoon, Tara. "Cybersecurity risk-management framework." In Optimal Spending on Cybersecurity Measures. Routledge, 2021. http://dx.doi.org/10.4324/9781003200895-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kissoon, Tara. "Cybersecurity Risk Management Framework." In Optimal Spending on Cybersecurity Measures. CRC Press, 2025. https://doi.org/10.1201/9781003587576-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kissoon, Tara. "Cybersecurity Risk Management Framework." In Optimal Spending on Cybersecurity Measures. CRC Press, 2025. https://doi.org/10.1201/9781003587569-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kissoon, Tara. "Cybersecurity Risk Management Framework." In Optimal Spending on Cybersecurity Measures. CRC Press, 2025. https://doi.org/10.1201/9781003527213-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cybersecurity Framework (e.g"

1

Taylor, Steve, Norbert Goetze, Joerg Abendroth, et al. "Cybersecurity Indicators Within a Cybersecurity Testing and Monitoring Framework." In 10th International Conference on Internet of Things, Big Data and Security. SCITEPRESS - Science and Technology Publications, 2025. https://doi.org/10.5220/0013465100003944.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Senni, Valerio, Davide Martintoni, Laurent Leonardon, Timo Warns, and Cristian Bertoldi. "Collaborative Cybersecurity Framework for CNS." In 2025 Integrated Communications, Navigation and Surveillance Conference (ICNS). IEEE, 2025. https://doi.org/10.1109/icns65417.2025.10976753.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chew, M. D., and J. Buongiorno. "A Cybersecurity Framework For Nuclear Microreactors." In 2024 International Congress on Advances in Nuclear Power Plants (ICAPP). American Nuclear Society, 2024. http://dx.doi.org/10.13182/t130-43781.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Marek, James. "Cybersecurity and Risk Management Framework in Avionics." In Vertical Flight Society 74th Annual Forum & Technology Display. The Vertical Flight Society, 2018. http://dx.doi.org/10.4050/f-0074-2018-12893.

Full text
Abstract:
It is impossible to open a newspaper, turn on a television, or visit a news website these days without being barraged with cybersecurity related news. Every domain is being attacked, penetrated, and impacted by cyber-crime and the range, complexity, and frequency of attacks is expanding daily. Across the board we face a wide range of adversaries from disgruntled employees to nation states that are bent on taking our critical systems down temporarily or permanently. Avionics systems are not immune from this and over the past several years, cybersecurity policies and the Risk Management Framewor
APA, Harvard, Vancouver, ISO, and other styles
5

Arias, Clariel, and Thaier Hayajneh. "An International Framework for Cybersecurity Incident Collaboration." In 2024 4th Intelligent Cybersecurity Conference (ICSC). IEEE, 2024. https://doi.org/10.1109/icsc63108.2024.10895874.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Oranekwu, Ikechukwu, Lavanya Elluri, and Gunjan Batra. "Automated Knowledge Framework for IoT Cybersecurity Compliance." In 2024 IEEE International Conference on Big Data (BigData). IEEE, 2024. https://doi.org/10.1109/bigdata62323.2024.10825755.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kurnala, Vishnu, Hema Sriya Kanigolla, Mojesh Manda, and Anudeep Meda. "Cross-Domain Cybersecurity: Integrated Intrusion Detection Framework." In 2024 Global Conference on Communications and Information Technologies (GCCIT). IEEE, 2024. https://doi.org/10.1109/gccit63234.2024.10862451.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kabulov, I., C. Karthikeyan, Prashant Chourasiya, Sandeep Singh, Myasar Mundher Adnan, and Arti Badhoutiya. "Contemporary Cybersecurity Framework for Industrial Cloud Deployment." In 2024 International Conference on Communication, Computing and Energy Efficient Technologies (I3CEET). IEEE, 2024. https://doi.org/10.1109/i3ceet61722.2024.10993635.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Figueroa, Víctor, Luis E. Sánchez, Antonio Santos-Olmo, David G. Rosado, and Eduardo Fernández-Medina. "Towards a Holistic Cybersecurity Framework for e-Governments." In 2024 IEEE Biennial Congress of Argentina (ARGENCON). IEEE, 2024. http://dx.doi.org/10.1109/argencon62399.2024.10735846.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

M, Jeimy J. Cano. "Enterprise cybersecurity investment priorities. A framework for executives." In 2024 IEEE Colombian Conference on Communications and Computing (COLCOM). IEEE, 2024. http://dx.doi.org/10.1109/colcom62950.2024.10720248.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cybersecurity Framework (e.g"

1

Petersen, Rodney, Danielle Santos, Matthew C. Smith, Karen A. Wetzel, and Greg Witte. Workforce Framework for Cybersecurity (NICE Framework). National Institute of Standards and Technology, 2020. http://dx.doi.org/10.6028/nist.sp.800-181r1.

Full text
Abstract:
This publication from the National Initiative for Cybersecurity Education (NICE) describes the Workforce Framework for Cybersecurity (NICE Framework), a fundamental reference for describing and sharing information about cybersecurity work. It expresses that work as Task statements and describes Knowledge and Skill statements that provide a foundation for learners including students, job seekers, and employees. The use of these statements helps students to develop skills, job seekers to demonstrate competencies, and employees to accomplish tasks. As a common, consistent lexicon that categorizes
APA, Harvard, Vancouver, ISO, and other styles
2

Stouffer, Keith, Timothy Zimmerman, CheeYee Tang, Joshua Lubell, Jeffrey Cichonski, and John McCarthy. Cybersecurity framework manufacturing profile. National Institute of Standards and Technology, 2017. http://dx.doi.org/10.6028/nist.ir.8183.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Scarfone, Karen. NIST Cybersecurity Framework 2.0:. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.sp.1302.ipd.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Eliot, Daniel. NIST Cybersecurity Framework 2.0:. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.sp.1300.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Pascoe, Cheri. NIST Cybersecurity Framework 2.0:. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.sp.1305.ipd.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rigopoulos, Kristina. NIST Cybersecurity Framework 2.0:. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.sp.1299.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Boyens, Jon. NIST Cybersecurity Framework 2.0:. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.sp.1306.ipd.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Scarfone, Karen. NIST Cybersecurity Framework 2.0:. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.sp.1301.ipd.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pascoe, Cheri. NIST Cybersecurity Framework 2.0:. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.sp.1304.ipd.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Quinn, Steve. NIST Cybersecurity Framework 2.0:. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.sp.1310.ipd.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!