To see the other types of publications on this topic, follow the link: Cybersecurity Framework (e.g.

Journal articles on the topic 'Cybersecurity Framework (e.g'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cybersecurity Framework (e.g.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Rao, Yongsheng, Srinath Ponnusamy, Sundareswaran Raman, Aysha Khan, and Jana Shafi. "Fuzzy Coalition Graphs: A Framework for Understanding Cooperative Dominance in Uncertain Networks." Mathematics 12, no. 22 (2024): 3614. http://dx.doi.org/10.3390/math12223614.

Full text
Abstract:
In a fuzzy graph G, a fuzzy coalition is formed by two disjoint vertex sets V1 and V2, neither of which is a strongly dominating set, but the union V1∪V2 forms a strongly dominating set. A fuzzy coalition partition of G is defined as Π={V1,V2,⋯,Vk}, where each set Vi either forms a singleton strongly dominating set or is not a strongly dominating set but forms a fuzzy coalition with another non-strongly dominating set in Π. A fuzzy graph with such a fuzzy coalition partition Π is called a fuzzy coalition graph, denoted as FG(G,Π). The vertex set of the fuzzy coalition graph consists of {V1,V2,
APA, Harvard, Vancouver, ISO, and other styles
2

Mosaddeque, Ananna, Mantaka Rowshon, Tamim Ahmed, Umma Twaha, and Binso Babu. "The Role of AI and Machine Learning in Fortifying Cybersecurity Systems in the US Healthcare Industry." Inverge Journal of Social Sciences 1, no. 2 (2022): 70–81. https://doi.org/10.63544/ijss.v1i2.101.

Full text
Abstract:
The digital transformation of healthcare has brought about unprecedented advancements, but it has also introduced significant cybersecurity risks. Cyberattacks targeting sensitive patient data, employee information, and critical operational systems are on the rise, demanding innovative and robust security measures. Enter the powerful duo of Artificial Intelligence (AI) and Machine Learning (ML). These cutting-edge technologies offer a powerful arsenal against these cyber threats. AI algorithms can analyse massive datasets from various sources, such as network traffic, user behaviour, and medic
APA, Harvard, Vancouver, ISO, and other styles
3

Ahmed, N. B., N. Daclin, M. Olivaux, and G. Dusserre. "Addressing the Dilemma of a “Crisis within a crisis”: Exploring the Penetration Testing challenges in a Mobile Field Hospital Setting." Advances in Multidisciplinary and scientific Research Journal Publication 2, no. 2 (2023): 67–80. http://dx.doi.org/10.22624/aims/csean-smart2023p9.

Full text
Abstract:
This paper focuses on evaluating the security challenges faced by mobile field hospitals, which play a crucial role in emergency response and disaster management in remote and austere environments. The authors conducted a penetration test using the Open Source Security Testing Methodology Manual (OSSTMM) framework to assess the security posture of a mobile field hospital. The methodology employed in the study included a combination of automated and manual techniques such as network scanning, vulnerability assessments, social engineering, and exploitation. The penetration test revealed several
APA, Harvard, Vancouver, ISO, and other styles
4

Gütl, Christian. "Editorial." JUCS - Journal of Universal Computer Science 31, no. (6) (2025): 550–51. https://doi.org/10.3897/jucs.158922.

Full text
Abstract:
Dear Readers,It gives me great pleasure to announce the fifth regular issue of 2025. I would like to thank all the authors for their sound research papers and the editorial board and our guest reviewers for their extremely valuable reviews and suggestions for improvement. These contributions and the generous support of the KOALA consortium members enable us to run our journal and maintain its quality. I would also like to thank our broader community for reading and incorporating sound J.UCS papers into their research.Still, I would like to expand our editorial board: If you are a tenured assoc
APA, Harvard, Vancouver, ISO, and other styles
5

Gütl, Christian. "Editorial." JUCS - Journal of Universal Computer Science 31, no. 6 (2025): 550–51. https://doi.org/10.3897/jucs.158922.

Full text
Abstract:
Dear Readers, It gives me great pleasure to announce the fifth regular issue of 2025. I would like to thank all the authors for their sound research papers and the editorial board and our guest reviewers for their extremely valuable reviews and suggestions for improvement. These contributions and the generous support of the KOALA consortium members enable us to run our journal and maintain its quality. I would also like to thank our broader community for reading and incorporating sound J.UCS papers into their research. Still, I would like to expand our editorial board: If you are a tenured ass
APA, Harvard, Vancouver, ISO, and other styles
6

Mohammed, Mustafa Khan. "NIST Cybersecurity Framework." Journal of Scientific and Engineering Research 10, no. 8 (2023): 150–57. https://doi.org/10.5281/zenodo.13950701.

Full text
Abstract:
The NIST Cybersecurity Framework (NIST CSF) is a voluntary approach to dealing with cyber threats in an organization. The framework is developed by the National Institute of Standards and Technology and it is designed to provide organizations with a structured method and enhance their security priorities. The framework is used across the public and private sectors in various areas such as finance, the government, health care, and critical infrastructure. This essay takes an in-depth look into the NIST Cybersecurity Framework, including its different components, leadership and implementation st
APA, Harvard, Vancouver, ISO, and other styles
7

Brito-Acuña, Guillermo. "Aeronautic maturity cybersecurity: a framework." DYNA 90, no. 227 (2023): 24–34. http://dx.doi.org/10.15446/dyna.v90n227.107420.

Full text
Abstract:
This article presents the results of a systematic review of the methods to implement cybersecurity maturity. Based on them, it proposes a framework for excellence in aeronautical cybersecurity that integrates the objectives of aeronautical cybersecurity with capabilities and requirements, which contributes to increasing the maturity of aeronautical cybersecurity. It exposes 13 objectives with 120 capabilities and 5 functional maturity levels to gradually meet up to 600 aeronautical cybersecurity requirements. Which were taken from articles with good practices associated with publications of th
APA, Harvard, Vancouver, ISO, and other styles
8

Kovács, László. "National Cybersecurity Strategy Framework." Academic and Applied Research in Military and Public 18, no. 2 (2019): 65–76. http://dx.doi.org/10.32565/aarms.2019.2.9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Swire, Peter. "A pedagogic cybersecurity framework." Communications of the ACM 61, no. 10 (2018): 23–26. http://dx.doi.org/10.1145/3267354.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Liszkowska, Dominika. "Türkey’s Cybersecurity Policy Framework." Cybersecurity and Law 11, no. 1 (2024): 79–91. http://dx.doi.org/10.35467/cal/187262.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Rangarajan (Ray) Parthasarathy, David K. Wyant, Prasad Bingi, James R. Knight, and Anuradha Rangarajan. "DeTER Framework." International Journal of Intelligent Information Technologies 17, no. 2 (2021): 1–24. http://dx.doi.org/10.4018/ijiit.2021040101.

Full text
Abstract:
The use of health apps on mobile devices by healthcare providers and receivers (patients) is proliferating. This has elevated cybersecurity concerns owing to the transmittal of personal health information through the apps. Research literature has mostly focused on the technology aspects of cybersecurity in mobile healthcare. It is equally important to focus on the ethical and regulatory perspectives. This article discusses cybersecurity concerns in mobile healthcare from the ethical perspective, the regulatory/compliance perspective, and the technology perspective. The authors present a compre
APA, Harvard, Vancouver, ISO, and other styles
12

Malatji, Masike, Sune Von Solms, and Annlizé Marnewick. "Socio-technical systems cybersecurity framework." Information & Computer Security 27, no. 2 (2019): 233–72. http://dx.doi.org/10.1108/ics-03-2018-0031.

Full text
Abstract:
Purpose This paper aims to identify and appropriately respond to any socio-technical gaps within organisational information and cybersecurity practices. This culminates in the equal emphasis of both the social, technical and environmental factors affecting security practices. Design/methodology/approach The socio-technical systems theory was used to develop a conceptual process model for analysing organisational practices in terms of their social, technical and environmental influence. The conceptual process model was then applied to specifically analyse some selected information and cybersecu
APA, Harvard, Vancouver, ISO, and other styles
13

Wang, Shouhong, and Hai Wang. "A Sociotechnical Systems Analysis of Knowledge Management for Cybersecurity." International Journal of Sociotechnology and Knowledge Development 13, no. 3 (2021): 77–94. http://dx.doi.org/10.4018/ijskd.2021070105.

Full text
Abstract:
Knowledge management (KM) is a tool to tackle cybersecurity issues, provided it emphasizes on the interrelated social, organizational, and technological factors involved in cybersecurity. This paper proposes a sociotechnical systems analysis framework of KM systems for cybersecurity. Specifically, it applies a sociotechnical systems approach to investigation of constructs of KM systems for cybersecurity and identifies five major constructs of KM systems for cybersecurity: roles of KM in cybersecurity, organizational framework of KM for cybersecurity, cybersecurity analytics process, tools of K
APA, Harvard, Vancouver, ISO, and other styles
14

Onwubiko, Cyril, and Karim Ouazzane. "Multidimensional Cybersecurity Framework for Strategic Foresight." International Journal on Cyber Situational Awareness 6, no. 1 (2022): 46–77. http://dx.doi.org/10.22619/ijcsa.2021.100137.

Full text
Abstract:
Cybersecurity is now at the forefront of most organisations’ digital transformative agendas and National economic, social and political programmes. Hence its impact to society can no longer be seen to be one dimensional. The rise in National cybersecurity laws and regulations is a good indicator of its perceived importance to nations. And the recent awakening for social and ethical transparency in society and coupled with sustainability issues demonstrate the need for a paradigm shift in how cybersecurity discourses can now happen. In response to this shift, a multidimensional cybersecurity fr
APA, Harvard, Vancouver, ISO, and other styles
15

Khader, Mohammed, Marcel Karam, and Hanna Fares. "Cybersecurity Awareness Framework for Academia." Information 12, no. 10 (2021): 417. http://dx.doi.org/10.3390/info12100417.

Full text
Abstract:
Cybersecurity is a multifaceted global phenomenon representing complex socio-technical challenges for governments and private sectors. With technology constantly evolving, the types and numbers of cyberattacks affect different users in different ways. The majority of recorded cyberattacks can be traced to human errors. Despite being both knowledge- and environment-dependent, studies show that increasing users’ cybersecurity awareness is found to be one of the most effective protective approaches. However, the intangible nature, socio-technical dependencies, constant technological evolutions, a
APA, Harvard, Vancouver, ISO, and other styles
16

Kumar, Ankit, Khushboo Mishra, Rajesh Kumar Mahto, and Binay Kumar Mishra. "A Framework for Institution to Enhancing Cybersecurity in Higher Education: A Review." LatIA 2 (January 1, 2024): 94. http://dx.doi.org/10.62486/latia202494.

Full text
Abstract:
The increasing prevalence of cybersecurity threats has highlighted the urgent need for Higher Education Institutions (HEIs) to prioritize and enhance their cybersecurity measures. This research article presents a comprehensive framework aimed at guiding institutions in strengthening their cybersecurity posture within the higher education sector. The framework addresses the unique challenges faced by HEIs, taking into account the multifaceted nature of cybersecurity and the evolving threat landscape. The proposed framework incorporates a systematic approach that encompasses key components essen
APA, Harvard, Vancouver, ISO, and other styles
17

Shingate, Prof Priyanka, Akash Trimbake, Mayur Sawant, Rushikesh Jagdhane, and Hrishikesh Jadhav. "Web Vulnerability Scanning Framework." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (2023): 3019–22. http://dx.doi.org/10.22214/ijraset.2023.50797.

Full text
Abstract:
Abstract: The increasing reliance on web-based systems has brought cybersecurity to the forefront of concerns for organizations and individuals alike. In this paper, we present a framework that leverages open-source tools for information gathering (reconnaissance) and vulnerability assessment in web-based systems. The framework is designed to be hosted as a website, providing a user-friendly interface for cybersecurity practitioners to conduct reconnaissance and identify vulnerabilities in their target systems. Through integration of various open-source tools, our framework enables efficient a
APA, Harvard, Vancouver, ISO, and other styles
18

Austin Oguejiofor Amaechi. "A methodological framework for fostering cybersecurity mindsets and behaviour." International Journal of Science and Research Archive 15, no. 2 (2025): 1799–810. https://doi.org/10.30574/ijsra.2025.15.2.1659.

Full text
Abstract:
The continuously growing attack surfaces and artificial intelligence-enabled attacks have increased the overwhelming nature of the cybersecurity challenge. The result is that to some organizations, no amount of preparedness can guarantee immunity from cyber-attacks. Cybersecurity preparedness is an ongoing process and incentivizing the right behaviour is an essential characteristic of a human-centered whole-of-enterprise approach to cybersecurity. While there are many techniques developed to improve and understand cybersecurity decision making, there is a lack of design methodologies to allow
APA, Harvard, Vancouver, ISO, and other styles
19

Dawson, Maurice. "Applying a holistic cybersecurity framework for global IT organizations." Business Information Review 35, no. 2 (2018): 60–67. http://dx.doi.org/10.1177/0266382118773624.

Full text
Abstract:
Examined are the three core themes: the role of education in cybersecurity, the role of technology in cybersecurity, and the role of policy in cybersecurity. These topics are essential for organizations seeking to establish environments that allow them to be successful irregardless of location while examining external and internal conditions. This study examined the research gaps within cybersecurity as it relates to core themes in an effort to develop stronger policies, education programs, and hardened technologies for cybersecurity use. This work illustrates how cybersecurity can be broken i
APA, Harvard, Vancouver, ISO, and other styles
20

Jansen van Vuuren, Joey, Mafika Nkambule, and Louise Leenen. "Identifying Cybersecurity Elements for a Cybersecurity Framework in Higher Education." International Conference on Cyber Warfare and Security 20, no. 1 (2025): 584–94. https://doi.org/10.34190/iccws.20.1.3313.

Full text
Abstract:
This study provides a framework and strategy for the creation of a cybersecurity culture in higher education institutions. Cybersecurity is identified as very important in higher education institutions have to accept responsibility for protecting the institution’s assets and personal information of staff and students. This study focuses on the challenges that higher education institutions confront in creating a cyber-secure environment, of which many relate to culture. Establishing a strong cybersecurity culture can be difficult due to variables such as the institution's size and the relativel
APA, Harvard, Vancouver, ISO, and other styles
21

Hossain, Sk Tahsin, Tan Yigitcanlar, Kien Nguyen, and Yue Xu. "Understanding Local Government Cybersecurity Policy: A Concept Map and Framework." Information 15, no. 6 (2024): 342. http://dx.doi.org/10.3390/info15060342.

Full text
Abstract:
Cybersecurity is a crucial concern for local governments as they serve as the primary interface between public and government services, managing sensitive data and critical infrastructure. While technical safeguards are integral to cybersecurity, the role of a well-structured policy is equally important as it provides structured guidance to translate technical requirements into actionable protocols. This study reviews local governments’ cybersecurity policies to provide a comprehensive assessment of how these policies align with the National Institute of Standards and Technology’s Cybersecurit
APA, Harvard, Vancouver, ISO, and other styles
22

Mathur, Aananaya. "Incident Response Simulation Framework." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem31743.

Full text
Abstract:
Incident response is a pivotal security role in organizations that aimed to manage incidents quickly and economically. Cybersecurity Incident Response is a valuable development in the mitigation and operational security and data protection methods to safeguard employees and their assets. Cybersecurity awareness training is a powerful approach that leverage companies to cultivate employees into developing their knowledge and awareness of best practices and strategies for safeguarding sensitive data. Incident response is an emerging field due to the exceptional rise in the security breaches. The
APA, Harvard, Vancouver, ISO, and other styles
23

Polishchuk, Volodymyr, Vitalii Yurakh, Olena Kravchenko, Wolodymyr Warawa, and Inna Kulchii. "Legal Regulation of Cybersecurity and Privacy on the Internet." Revista de Gestão Social e Ambiental 18, no. 6 (2024): e06978. http://dx.doi.org/10.24857/rgsa.v18n6-134.

Full text
Abstract:
Objective: This article examines the conceptual framework for forming and developing legal regulation of cybersecurity and privacy on the Internet. Theoretical Framework: The article aims to highlight the evolution and future prospects of legal regulation concerning cybersecurity and privacy in both Ukraine and globally. Method: The methodological principles include impartiality and unbiasedness and a comprehensive study of the legislative framework and its specifics in the context of cybersecurity and privacy. Results and Discussion: The legislative experiences of international law on cyberse
APA, Harvard, Vancouver, ISO, and other styles
24

Nkambule, Mafika, Joey Jansen van Vuuren, and Louise Leenen. "Creating a Cybersecurity Culture Framework in Higher Education." International Conference on Cyber Warfare and Security 20, no. 1 (2025): 304–12. https://doi.org/10.34190/iccws.20.1.3268.

Full text
Abstract:
The increasing cybersecurity threats to higher education institutions in Africa necessitate risk management frameworks that are resilient and sensitive to regional needs. This paper applies Modified General Morphological Analysis (MGMA) to identify essential elements for an adaptable cybersecurity framework, focusing on the African higher education context. African institutions face many challenges, like limited funding, underdeveloped digital infrastructures, and rising cyberattacks. Our proposed MGMA is a structured methodology to examine key cybersecurity dimensions: governance, policy, tec
APA, Harvard, Vancouver, ISO, and other styles
25

Sawangphol, Wudhichart, Assadarat Khurat, and Nasorn Niampradit. "SecSAGE: NIST Cybersecurity Framework Visualization on SAGE2." ECTI Transactions on Computer and Information Technology (ECTI-CIT) 18, no. 3 (2024): 417–28. http://dx.doi.org/10.37936/ecti-cit.2024183.256034.

Full text
Abstract:
Cybersecurity has been an area of great interest for an organization, given the significance of data and the increasing cybersecurity threats. The National Institute of Standards and Technology (NIST) has developed a cybersecurity framework intended for voluntary utilization by critical infrastructure owners and operators. Its primary purpose is to aid in the effective management of cybersecurity risks. This framework, similar to many other security standards, comprises a substantial volume of textual information that can be challenging to grasp comprehensively in a limited timeframe. In respo
APA, Harvard, Vancouver, ISO, and other styles
26

O'Brien, Niki, Emilia Grass, Guy Martin, Mike Durkin, Ara Darzi, and Saira Ghafur. "Developing a globally applicable cybersecurity framework for healthcare: a Delphi consensus study." BMJ Innovations 7, no. 1 (2020): 199–207. http://dx.doi.org/10.1136/bmjinnov-2020-000572.

Full text
Abstract:
BackgroundCybersecurity in healthcare has become increasingly important as the COVID-19 pandemic has increased the use of digital technologies in healthcare provision around the world, while simultaneously encouraged cybercriminals to target healthcare organisations in greater numbers. Despite the threat of cyberattack to patient safety and the provision of healthcare, cybersecurity in the health sector lags behind other industries. Additionally, no adequate cybersecurity framework exists which considers the unique needs of the health sector.MethodsAn online Delphi was carried out to develop a
APA, Harvard, Vancouver, ISO, and other styles
27

Kabanda, Gabriel, and Tinashe Chingoriwo. "A Cybersecurity Culture Framework for Grassroots Levels in Zimbabwe." Oriental journal of computer science and technology 14, no. 010203 (2022): 17–34. http://dx.doi.org/10.13005/ojcst14.010203.03.

Full text
Abstract:
Cybersecurity is a combination of technologies, processes and operations that are designed to protect information systems, computers, devices, programs, data and networks from internal or external threats, harm, damage, attacks or unauthorized access1.The research was purposed to develop a cybersecurity culture framework which ensures that grassroot users of cyberspace are secured from cyber threats. Literature review showed that in Zimbabwe, no research had attempted to come up with a cybersecurity culture framework for grassroot users of cyberspace.The research was guided by the interpretivi
APA, Harvard, Vancouver, ISO, and other styles
28

Bernardo, Luís, Silvestre Malta, and João Magalhães. "An Evaluation Framework for Cybersecurity Maturity Aligned with the NIST CSF." Electronics 14, no. 7 (2025): 1364. https://doi.org/10.3390/electronics14071364.

Full text
Abstract:
Cybersecurity is critical for mitigating the economic and reputational impacts of cyberattacks. To address these risks, frameworks like the NIST Cybersecurity Framework (NIST CSF) provide standardized guidelines for managing and reducing cybersecurity threats. This paper presents a maturity assessment approach aligned with the NIST CSF, incorporating a dual-survey methodology. The first survey engages cybersecurity experts to calibrate question importance, while the second targets organizations across management, IT staff, and other roles. The approach employs algorithms to deliver consistent
APA, Harvard, Vancouver, ISO, and other styles
29

Garba, J., J. Kaur, and E. Nuraihan Mior Ibrahim. "Design of a conceptual framework for cybersecurity culture amongst online banking users in Nigeria." Nigerian Journal of Technology 42, no. 3 (2023): 399–405. http://dx.doi.org/10.4314/njt.v42i3.13.

Full text
Abstract:
This study aims to construct a comprehensive conceptual framework that elucidates the critical human factors influencing cybersecurity culture among online banking users in Nigeria. The research methodology is grounded in a meticulous examination of existing literature in the cybersecurity culture domain, serving as the foundation for this framework. The literature review reveals a conspicuous absence of academic research on cybersecurity culture within Nigeria and underscores the importance of comprehending its unique nuances. Key findings from the literature review highlight the prominence o
APA, Harvard, Vancouver, ISO, and other styles
30

Hamza, Muhammad Ali, Usama Ejaz, and Hyun-chul Kim. "Cyber5Gym: An Integrated Framework for 5G Cybersecurity Training." Electronics 13, no. 5 (2024): 888. http://dx.doi.org/10.3390/electronics13050888.

Full text
Abstract:
The rapid evolution of 5G technology, while offering substantial benefits, concurrently presents complex cybersecurity challenges. Current cybersecurity systems often fall short in addressing challenges such as the lack of realism of the 5G network, the limited scope of attack scenarios, the absence of countermeasures, the lack of reproducible, and open-sourced cybersecurity training environments. Addressing these challenges necessitates innovative cybersecurity training systems, referred to as “cyber ranges”. In response to filling these gaps, we propose the Cyber5Gym, an integrated cyber ran
APA, Harvard, Vancouver, ISO, and other styles
31

Metin, Bilgin, Fatma Gül Özhan, and Martin Wynn. "Digitalisation and Cybersecurity: Towards an Operational Framework." Electronics 13, no. 21 (2024): 4226. http://dx.doi.org/10.3390/electronics13214226.

Full text
Abstract:
As businesses increasingly adopt digital processes and solutions to enhance efficiency and productivity, they face heightened cybersecurity threats. Through a systematic literature review and concept development, this article examines the intersection of digitalisation and cybersecurity. It identifies the methodologies and tools used for cybersecurity assessments, factors influencing the adoption of cybersecurity measures, and the critical success factors for implementing these measures. The article also puts forward the concept of cybersecurity governance process categories, which are used to
APA, Harvard, Vancouver, ISO, and other styles
32

Goel, Rajni, Anupam Kumar, and James Haddow. "PRISM: a strategic decision framework for cybersecurity risk assessment." Information & Computer Security 28, no. 4 (2020): 591–625. http://dx.doi.org/10.1108/ics-11-2018-0131.

Full text
Abstract:
Purpose This study aims to develop a framework for cybersecurity risk assessment in an organization. Existing cybersecurity frameworks are complex and implementation oriented. The framework can be systematically used to assess the strategic orientation of a firm with respect to its cybersecurity posture. The goal is to assist top-management-team with tailoring their decision-making about security investments while managing cyber risk at their organization. Design/methodology/approach A thematic analysis of existing publications using content analysis techniques generates the initial set of key
APA, Harvard, Vancouver, ISO, and other styles
33

Wang, Yunpeng, Yinghui Wang, Hongmao Qin, Haojie Ji, Yanan Zhang, and Jian Wang. "A Systematic Risk Assessment Framework of Automotive Cybersecurity." Automotive Innovation 4, no. 3 (2021): 253–61. http://dx.doi.org/10.1007/s42154-021-00140-6.

Full text
Abstract:
AbstractThe increasingly intelligent and connected vehicles have brought many unprecedented automotive cybersecurity threats, which may cause privacy breaches, personal injuries, and even national security issues. Before providing effective security solutions, a comprehensive risk assessment of the automotive cybersecurity must be carried out. A systematic cybersecurity risk assessment framework for automobiles is proposed in this study. It consists of an assessment process and systematic assessment methods considering the changes of threat environment, evaluation target, and available informa
APA, Harvard, Vancouver, ISO, and other styles
34

Albediwi, Mead, and Kishwar Sadaf. "A Framework for Cybersecurity Awareness in Saudi Arabia." Journal of Engineering and Applied Sciences 10, no. 1 (2023): 35. http://dx.doi.org/10.5455/jeas.2023050103.

Full text
Abstract:
The rapid advancement in technology has improved people's lives, but it has also increased the risks that come with using the Internet, including cybercrimes. Lately, Saudi Arabia, a booming economy, has become one of the prime targets of cyberattacks. The massive amount of cyberattacks targeting Saudi Arabia can be attributed to the lack of cybersecurity awareness among Saudi people. The objective of this study is to propose methods on the national level to increase the awareness of cybersecurity among Saudi people. We conducted a cybersecurity assessment survey to assess the cybersecurity aw
APA, Harvard, Vancouver, ISO, and other styles
35

Abhilash Maroju, Srinivas A Vaddadi, Sravanthi Dontu, Rohith Vallabhaneni,. "An Empirical Paradigm on Cybersecurity Vulnerability Mitigation Framework." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9s (2023): 786–92. http://dx.doi.org/10.17762/ijritcc.v11i9s.9484.

Full text
Abstract:
Current cybersecurity vulnerability assessment tools were developed in accordance with guidelines established by entities like the National Institute of Standards and Technology (NIST) and the United States Department of Energy. When assessing their facility's cybersecurity maturity, owners and operators of critical infrastructure frequently use frameworks like the NIST Cybersecurity Framework (CSF) and the cybersecurity capability maturity model (C2M2). These frameworks are great at finding vulnerabilities and doing qualitative cybersecurity analysis, but they don't help you get to the level
APA, Harvard, Vancouver, ISO, and other styles
36

Hijji, Mohammad, and Gulzar Alam. "Cybersecurity Awareness and Training (CAT) Framework for Remote Working Employees." Sensors 22, no. 22 (2022): 8663. http://dx.doi.org/10.3390/s22228663.

Full text
Abstract:
Currently, cybersecurity plays an essential role in computing and information technology due to its direct effect on organizations’ critical assets and information. Cybersecurity is applied using integrity, availability, and confidentiality to protect organizational assets and information from various malicious attacks and vulnerabilities. The COVID-19 pandemic has generated different cybersecurity issues and challenges for businesses as employees have become accustomed to working from home. Firms are speeding up their digital transformation, making cybersecurity the current main concern. For
APA, Harvard, Vancouver, ISO, and other styles
37

Haleem, Abid, Mohd Javaid, Ravi Pratap Singh, Shanay Rab, and Rajiv Suman. "Perspectives of cybersecurity for ameliorative Industry 4.0 era: a review-based framework." Industrial Robot: the international journal of robotics research and application 49, no. 3 (2022): 582–97. http://dx.doi.org/10.1108/ir-10-2021-0243.

Full text
Abstract:
Purpose Industry 4.0 refers to the interconnection of cyber-physical systems, which connects the physical and digital worlds by collecting digital data from physical objects/processes, and using this data to drive automation and optimisation. Digital technologies used in this revolution gather and handle massive volumes of high-velocity streams while automating field operations and supply chain activities. Cybersecurity is a complicated process that helps sort out various hacking issues of Industry 4.0. This purpose of this paper is to provide an overview on cybersecurity and its major applica
APA, Harvard, Vancouver, ISO, and other styles
38

Lyseiuk, Andrii, and Tetiana Svintsitska. "Development of International Cooperation in Cybersecurity: Normative and Legal Framework and Prospects." Law and innovative society, no. 2 (23) (December 20, 2024): 89–95. https://doi.org/10.37772/2309-9275-2024-2(23)-8.

Full text
Abstract:
The article considers certain aspects of the development of international cooperation in the field of cybersecurity in Ukraine. It emphasizes the priority of issues of cyberspace protection, the importance of continuing cooperation with foreign partners in the field of cybersecurity and the introduction of new initiatives to strengthen cyber defense and deepen cooperation with the European Union and the North Atlantic Alliance. The norms of current regulatory legal acts and strategic planning documents in the field of cybersecurity are considered. Individual provisions of the Law of Ukraine “O
APA, Harvard, Vancouver, ISO, and other styles
39

Milagros B. Barruga. "Cybersecurity Strategy for Higher Education Institutions: A Thematic Analysis on Standards and Frameworks." Journal of Information Systems Engineering and Management 10, no. 43s (2025): 1140–52. https://doi.org/10.52783/jisem.v10i43s.8533.

Full text
Abstract:
Higher education institutions (HEIs) are increasingly vulnerable to cybersecurity attacks. As HEIs shift their operations online, they inevitably employ open systems and decentralized processing, making them particularly susceptible to cyberattacks. The study aims to identify the cybersecurity frameworks that HEIs currently employ as well as the characteristics that these frameworks must have. Initially, a comprehensive literature review was conducted to determine current cybersecurity practices and frameworks used by HEIs. This is followed by expert interviews with IT and cybersecurity profes
APA, Harvard, Vancouver, ISO, and other styles
40

Fleming, Courtney, Mark Reith, and Wayne Henry. "Securing Commercial Satellites for Military Operations: A Cybersecurity Supply Chain Framework." International Conference on Cyber Warfare and Security 18, no. 1 (2023): 85–92. http://dx.doi.org/10.34190/iccws.18.1.1062.

Full text
Abstract:
The increased reliance on commercial satellites for military operations has made it essential for the Department of Defense (DoD) to adopt a supply chain framework to address cybersecurity threats in space. This paper presents a satellite supply chain framework, the Cybersecurity Supply Chain (CSSC) Framework, for the DoD in the evaluation and selection of commercial satellite contracts. The proposed strategy is informed by research on cybersecurity threats to commercial satellites, national security concerns, current DoD policy, and previous cybersecurity frameworks. This paper aims to provid
APA, Harvard, Vancouver, ISO, and other styles
41

Mmango, Nangamso, and Tapiwa Gundu. "Cultivating Collective Armor: Towards a Collaborative Cybersecurity Resilience Framework for SMEs." European Conference on Innovation and Entrepreneurship 19, no. 1 (2024): 523–31. http://dx.doi.org/10.34190/ecie.19.1.2799.

Full text
Abstract:
As Small and Medium-sized Enterprises (SMEs) increasingly integrate digital technologies into their operations, they face escalating cybersecurity threats that challenge their limited financial and human resources. Historically, cybersecurity was not a primary concern for many SMEs due to their minimal reliance on cyberinfrastructure. However, the growing dependency on digital systems has exposed them to significant risks, necessitating robust cybersecurity measures. This research introduces a cybersecurity resilience framework specifically designed to enhance the cybersecurity posture of SMEs
APA, Harvard, Vancouver, ISO, and other styles
42

Turk, Žiga, Muammer Semih Sonkor, and Robert Klinc. "CYBERSECURITY ASSESSMENT OF BIM/CDE DESIGN ENVIRONMENT USING CYBER ASSESSMENT FRAMEWORK." JOURNAL OF CIVIL ENGINEERING AND MANAGEMENT 28, no. 5 (2022): 349–64. http://dx.doi.org/10.3846/jcem.2022.16682.

Full text
Abstract:
Digitalisation of the construction industry is exposing it to cybersecurity risks. All phases of construction can be affected. Particularly vulnerable are information-intensive phases such as building design and building operation. Construction is among the last industries that are discovering its cybersecurity risks and can rely on frameworks developed for other contexts. In this paper, we evaluate the cybersecurity risks of the design phase of construction using the Cyber Assessment Framework from the National Cybersecurity Centre (NCSC) of the UK. The goal of this study is twofold. First, t
APA, Harvard, Vancouver, ISO, and other styles
43

GRAMMATOPOULOS, Athanasios Vasileios, and Fabio DI FRANCO. "Building a Career Path Through Training Programmes Using ECSF." International Journal of Information Security and Cybercrime 12, no. 1 (2023): 11–17. http://dx.doi.org/10.19107/ijisc.2023.01.01.

Full text
Abstract:
Although more and more services are moving into the digital space, there are not enough professionals to cover all the cybersecurity-related positions needed to ensure the security and resilience of organisations. The problem, known as the “cybersecurity skills gap and workforce shortage”, was highlighted even more during the COVID-19 pandemic and is affecting organisations worldwide. The European Union Agency for Cybersecurity (ENISA) recently released the European Cybersecurity Skills Framework (ECSF), a cybersecurity framework defining 12 cybersecurity role profiles, along with the main tas
APA, Harvard, Vancouver, ISO, and other styles
44

Gajewski, Tomasz. "TOWARDS RESILIENCE. EUROPEAN CYBERSECURITY STRATEGIC FRAMEWORK." Ante Portas - Studia nad bezpieczeństwem 1(14)/2020, no. 1(14)/2020 (2020): 103–22. http://dx.doi.org/10.33674/3201911.

Full text
Abstract:
Cyberspace has become critical domain of contemporary societies and states. Growing presence and dense network of various activities have resulted in transformation of strictly technical dimension into nervous system of the world. Naturally, with humans’ immersion in cyberspace, the catalogue of threats is growing exponentially - from risks to individuals’ security through hazards to corporate, government entities to threats to complex social systems. Resilience of the latter depends on cyberspace. The aim of the paper is to analyse EU’s approach to growing dangers, with European Cybersecurity
APA, Harvard, Vancouver, ISO, and other styles
45

Chen, Jim Q. "A Framework for Cybersecurity Strategy Formation." International Journal of Cyber Warfare and Terrorism 4, no. 3 (2014): 1–10. http://dx.doi.org/10.4018/ijcwt.2014070101.

Full text
Abstract:
A good cybersecurity strategy consists of the most effective and the most optimal course of actions available at the moment of operation in order to ensure the success of a cyber operation. How to form such a strategy is always a challenge. The current literature does not have much discussion about this topic. This paper intends to explore this process, which supports decision-makers in the cyber domain. It applies the Cybersecurity Formation Framework proposed in Chen and Duvall (2014), and shows how it can integrate varied actions into a systematic and consolidated course of actions to guara
APA, Harvard, Vancouver, ISO, and other styles
46

Formosa, Paul, Michael Wilson, and Deborah Richards. "A principlist framework for cybersecurity ethics." Computers & Security 109 (October 2021): 102382. http://dx.doi.org/10.1016/j.cose.2021.102382.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Ekstedt, Mathias, Zeeshan Afzal, Preetam Mukherjee, Simon Hacks, and Robert Lagerström. "Yet Another Cybersecurity Risk Assessment Framework." International Journal of Comparative Studies in International Relations and Development 10, no. 1 (2024): 84–93. http://dx.doi.org/10.48028/iiprds/ijcsird.v10.i1.07.

Full text
Abstract:
IT systems pervade our society more and more, and we become heavily dependent on them. At the same time, these systems are increasingly targeted in cyberattacks, making us vulnerable. Enterprise and cybersecurity responsible face the problem of defining techniques that raise the level of security. They need to decide which mechanism provides the most efficient defense with limited resources. Basically, the risks need to be assessed to determine the best cost-to-benefit ratio. One way to achieve this is through threat modeling; however, threat modeling is not commonly used in the enterprise IT
APA, Harvard, Vancouver, ISO, and other styles
48

Kumar, Keshav. "Artificial Intelligence for Improving Cybersecurity Framework." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem48949.

Full text
Abstract:
Abstract As the attack types become more sophisticated, the ones in use today are losing their touch due to various reasons. Chief among these include zero-day exploits, AI-driven phishing, and polymorphic malware. This study explores incorporating artificial intelligence (AI) in cyber security frameworks to counter such threats, thereby proposing to shift the focus from reactive to proactive and adaptive mechanisms. It employs machine learning (ML) algorithms, neural networks, and natural language processing (NLP) to show how AI can better threat detection, automate incident response, and pre
APA, Harvard, Vancouver, ISO, and other styles
49

Komane, Kagiso, Lucas Khoza, and Fani Radebe. "A Conceptual Framework for Cybersecurity Awareness." Journal of Cyber Security 7, no. 1 (2025): 79–108. https://doi.org/10.32604/jcs.2025.059712.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Matheu-García, Sara Nieves, José Luis Hernández-Ramos, Antonio Skarmeta, and Gianmarco Baldini. "A Survey of Cybersecurity Certification for the Internet of Things." ACM Computing Surveys 53, no. 5 (2020): 1–36. https://doi.org/10.1145/3410160.

Full text
Abstract:
In recent years, cybersecurity certification is gaining momentum as the baseline to build a structured approach to mitigate cybersecurity risks in the Internet of Things (IoT). This initiative is driven by industry, governmental institutions, and research communities, which have the goal to make IoT more secure for the end-users. In this survey, we analyze the current cybersecurity certification schemes, as well as the potential challenges to make them applicable for the IoT ecosystem. We also examine current efforts related to risk assessment and testing processes, which are widely recognized
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!