To see the other types of publications on this topic, follow the link: Cybersecurity resilience.

Journal articles on the topic 'Cybersecurity resilience'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cybersecurity resilience.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Priyandita, Gatra. "Indonesia's Cybersecurity Resilience." Asia Policy 20, no. 2 (2025): 25–34. https://doi.org/10.1353/asp.2025.a960040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tasdighi, Anahita. "Cyber-Resilient Autonomous Spacecraft: A MultiDomain Resilience Framework for Deep Space Missions." American Journal of Science, Engineering and Technology 10, no. 2 (2025): 40–66. https://doi.org/10.11648/j.ajset.20251002.11.

Full text
Abstract:
This article introduces a pioneering Multi-Domain Resilience Framework (MDRF) to address the escalating cybersecurity challenges faced by autonomous spacecraft operating in the demanding and unpredictable environments of deep space. It underscores the necessity of a holistic approach that integrates cybersecurity, operational resilience, physical security, and supply chain integrity to safeguard critical missions against an array of cyber threats, including malware, data interception, and insider vulnerabilities. Leveraging insights from prominent missions like NASA's Artemis program
APA, Harvard, Vancouver, ISO, and other styles
3

Malatji, Masike, Annlizé L. Marnewick, and Suné Von Solms. "Cybersecurity capabilities for critical infrastructure resilience." Information & Computer Security 30, no. 2 (2021): 255–79. http://dx.doi.org/10.1108/ics-06-2021-0091.

Full text
Abstract:
Purpose For many innovative organisations, Industry 4.0 paves the way for significant operational efficiencies, quality of goods and services and cost reductions. One of the ways to realise these benefits is to embark on digital transformation initiatives that may be summed up as the intelligent interconnectivity of people, processes, data and cyber-connected things. Sadly, this interconnectivity between the enterprise information technology (IT) and industrial control systems (ICS) environment introduces new attack surfaces for critical infrastructure (CI) operators. As a result of the ICS cy
APA, Harvard, Vancouver, ISO, and other styles
4

Malatji, Masike, Annlizé L. Marnewick, and Suné Von Solms. "Cybersecurity capabilities for critical infrastructure resilience." Information & Computer Security 30, no. 2 (2021): 255–79. http://dx.doi.org/10.1108/ics-06-2021-0091.

Full text
Abstract:
Purpose For many innovative organisations, Industry 4.0 paves the way for significant operational efficiencies, quality of goods and services and cost reductions. One of the ways to realise these benefits is to embark on digital transformation initiatives that may be summed up as the intelligent interconnectivity of people, processes, data and cyber-connected things. Sadly, this interconnectivity between the enterprise information technology (IT) and industrial control systems (ICS) environment introduces new attack surfaces for critical infrastructure (CI) operators. As a result of the ICS cy
APA, Harvard, Vancouver, ISO, and other styles
5

Tagarev, Todor, and George Sharkov. "Multi-stakeholder Approach to Cybersecurity and Resilience." Information & Security: An International Journal 34 (2016): 59–68. http://dx.doi.org/10.11610/isij.3404.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wallis, Tania, and Paul Dorey. "Implementing Partnerships in Energy Supply Chain Cybersecurity Resilience." Energies 16, no. 4 (2023): 1868. http://dx.doi.org/10.3390/en16041868.

Full text
Abstract:
This study describes the implementation of an energy sector community to examine the practice of cybersecurity for operational technology environments and their supply chains. Evaluating cybersecurity from the perspectives of different actors participating in the energy sector, the progress and challenges of operators and suppliers in delivering cybersecurity for the sector are explored. While regulatory frameworks incentivize individual organizations to improve their cybersecurity, operational services contain contributions from many organizations, and this supply chain of activity needs to b
APA, Harvard, Vancouver, ISO, and other styles
7

Venkadesh, Dr P. "Aegis AI - Intelligent Cyber Resilience." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem42978.

Full text
Abstract:
As cyber threats continue to evolve in complexity and scale, traditional security measures have become insufficient. Aegis AI (AAI): Intelligent Cyber Resilience presents a cutting-edge approach that integrates artificial intelligence (AI) and machine learning (ML) to strengthen cybersecurity defenses. This study explores the role of AI-driven threat intelligence, automated incident response, and adaptive learning in combating cyberattacks. The proposed AAI framework utilizes deep learning, anomaly detection, and reinforcement learning techniques to predict and mitigate threats in real time. B
APA, Harvard, Vancouver, ISO, and other styles
8

SMAJIĆ, Nermin. "Human Element in Cybersecurity. Strategies for Building a Stronger and More Secure Workforce." International Journal of Information Security and Cybercrime 12, no. 1 (2023): 30–36. http://dx.doi.org/10.19107/ijisc.2023.01.04.

Full text
Abstract:
Today, many businesses, organizations, and individuals rely on the internet for operations, communications, and transactions. As such, cybersecurity has become a major concern, as it is the key to protecting sensitive data and protecting against potential cyberattacks. Resilient companies understand the importance of cybersecurity, and leverage key pillars of cybersecurity to ensure their security and resilience. This article will highlight what cybersecurity is and how resilient companies leverage it, highlight the benefits of resilient cybersecurity, and some possible strategies for improvin
APA, Harvard, Vancouver, ISO, and other styles
9

Sharkov, George. "Assessing the Maturity of National Cybersecurity and Resilience." Connections: The Quarterly Journal 19, no. 4 (2020): 5–24. http://dx.doi.org/10.11610/connections.19.4.01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Alnaffar, Ahmed. "Cybersecurity Resilience Awareness in the Era of AI." International Journal of Science and Research (IJSR) 13, no. 3 (2024): 244–45. http://dx.doi.org/10.21275/sr24305145928.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Day, Greg. "Cybersecurity Predictions 2021." ITNOW 63, no. 1 (2021): 10–11. http://dx.doi.org/10.1093/itnow/bwab002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Kulugh, Victor Emmanuel, Ageebee Silas Faki, and Egena Onu. "Theoretical Framework of Cybersecurity Resilience Maturity Assessment Model for Critical Information Infrastructure." Dutse Journal of Pure and Applied Sciences 11, no. 1b (2025): 75–85. https://doi.org/10.4314/dujopas.v11i1b.9.

Full text
Abstract:
Modern Societies depend heavily on Critical infrastructures (CIs) to thrive. The CI in turn is driven by critical information infrastructures (CIIs) which is a combination of information technology (IT) and operations technology (OT). However, the CIs are underpinned by the CIIs, thus, they (CIs) inherit the vulnerabilities of the CIIs and share the same threats as the CIIs. Failure of the CIIs driving the CIs will potentially lead to catastrophic consequences arising from cascaded, escalating and common cause effects against other dependent/ interdependent CIs/CIIs. Consequently, the CIIs sho
APA, Harvard, Vancouver, ISO, and other styles
13

Antipova, Tatiana, and Simona Riurean. "Managing cyber resilience literacy for consumers." International Journal of Informatics and Communication Technology (IJ-ICT) 14, no. 1 (2025): 122. https://doi.org/10.11591/ijict.v14i1.pp122-131.

Full text
Abstract:
It seems inevitable that digitalization will have a profound and irreversible impact on our lives, and it seems reasonable to suppose that our world will never be the same again. Objectives of this study is to gain insight into consumers’ understanding of cyber security threats and their willingness to enhance their cyber resilience. To achieve this, a survey was conducted using AI tools such as Open ChatGPT, Copilot and PI. The survey was distributed selectively among consumers via Google Form. The results of the survey conducted during the study indicated that the majority of respondents (72
APA, Harvard, Vancouver, ISO, and other styles
14

Tatiana, Antipova, and Riurean Simona. "Managing cyber resilience literacy for consumers." International Journal of Informatics and Communication Technology 14, no. 1 (2025): 122–31. https://doi.org/10.11591/ijict.v14i1.pp122-131.

Full text
Abstract:
It seems inevitable that digitalization will have a profound and irreversible impact on our lives, and it seems reasonable to suppose that our world will never be the same again. Objectives of this study is to gain insight into consumers’ understanding of cyber security threats and their willingness to enhance their cyber resilience. To achieve this, a survey was conducted using AI tools such as Open ChatGPT, Copilot and PI. The survey was distributed selectively among consumers via Google Form. The results of the survey conducted during the study indicated that the majority of responden
APA, Harvard, Vancouver, ISO, and other styles
15

Gajewski, Tomasz. "TOWARDS RESILIENCE. EUROPEAN CYBERSECURITY STRATEGIC FRAMEWORK." Ante Portas - Studia nad bezpieczeństwem 1(14)/2020, no. 1(14)/2020 (2020): 103–22. http://dx.doi.org/10.33674/3201911.

Full text
Abstract:
Cyberspace has become critical domain of contemporary societies and states. Growing presence and dense network of various activities have resulted in transformation of strictly technical dimension into nervous system of the world. Naturally, with humans’ immersion in cyberspace, the catalogue of threats is growing exponentially - from risks to individuals’ security through hazards to corporate, government entities to threats to complex social systems. Resilience of the latter depends on cyberspace. The aim of the paper is to analyse EU’s approach to growing dangers, with European Cybersecurity
APA, Harvard, Vancouver, ISO, and other styles
16

Vain, Jüri, and Vyacheslav Kharchenko. "Enhanced Education for Cybersecurity and Resilience." Information & Security: An International Journal 35 (2016): 5–8. http://dx.doi.org/10.11610/isij.3500.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Taylor, Ivan W., and Keith D. Willett. "Modeling Cybersecurity Operations to Improve Resilience." INCOSE International Symposium 34, no. 1 (2024): 53–71. http://dx.doi.org/10.1002/iis2.13132.

Full text
Abstract:
AbstractIn this paper, we explore the concept of operational resilience of a network or system of computer systems, focusing on the processes of a cybersecurity team within the multi‐disciplinary network security operations center. The computer system under examination has faced a cyber‐attack that has reduced its capability. The organization's reputation is damaged temporarily but can be restored if the network security operations center can quickly restore the organization's ability to produce desired results. After a cyber‐attack, we examine the processes for restoring the system's capabili
APA, Harvard, Vancouver, ISO, and other styles
18

Abazi, Blerton. "Establishing the National Cybersecurity (Resilience) Ecosystem." IFAC-PapersOnLine 55, no. 39 (2022): 42–47. http://dx.doi.org/10.1016/j.ifacol.2022.12.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Chisty, Nur Mohammad Ali, Parikshith Reddy Baddam, and Ruhul Amin. "Strategic Approaches to Safeguarding the Digital Future: Insights into Next-Generation Cybersecurity." Engineering International 10, no. 2 (2022): 69–84. http://dx.doi.org/10.18034/ei.v10i2.689.

Full text
Abstract:
This research investigates various strategic approaches to protecting the digital future and offers insights into the practices of the next generation of cybersecurity. The study's primary objectives are to identify key challenges and trends in the current cybersecurity landscape, evaluate the effectiveness of traditional cybersecurity approaches, investigate emerging technologies for enhancing cybersecurity resilience, examine human factors in cybersecurity resilience, and develop recommendations for future cyber defense. All of these objectives will be accomplished through the course of the
APA, Harvard, Vancouver, ISO, and other styles
20

DE SILVA, Banuka. "Exploring the Relationship Between Cybersecurity Culture and Cyber-Crime Prevention: A Systematic Review." International Journal of Information Security and Cybercrime 12, no. 1 (2023): 23–29. http://dx.doi.org/10.19107/ijisc.2023.01.03.

Full text
Abstract:
Cybercrime requires a multidimensional approach addressing technical, organisational, and human factors to prevent cyber-attacks. This systematic review highlights the significance of a strong cybersecurity culture in mitigating the risks of cyberattacks and enhancing an organisation's resilience. Implementing training and awareness programmes, establishing leadership support and accountability mechanisms, and fostering employee engagement are strategies for promoting a strong cybersecurity culture. However, fostering a robust culture of cybersecurity can be challenging and requires the partic
APA, Harvard, Vancouver, ISO, and other styles
21

Hendriawan, Arizal, Idris Gautama, Denny Siahaan, and Kurniawan Kurniawan. "Analysis of The Influence of Factors on Maritime Cyber Resilience on Board With Intervening Maritime Cyber Security Awareness." Syntax Literate ; Jurnal Ilmiah Indonesia 10, no. 3 (2025): 2783–94. https://doi.org/10.36418/syntax-literate.v10i3.56311.

Full text
Abstract:
Indonesia plays a crucial role in sustaining the global maritime industry, with its growing potential to supply a skilled workforce through improved maritime education and international certifications. However, cybersecurity has become a critical challenge, with rising cyberattacks causing financial losses, operational disruptions, and diminished trust among stakeholders. Limited digital literacy, outdated technology, and inadequate cyber threat training exacerbate vulnerabilities, threatening maritime operations, national security, and economic stability. This study evaluates maritime cyberse
APA, Harvard, Vancouver, ISO, and other styles
22

Petrova, Dr Elena, and Dr Hassan Al Mansoori. "EVALUATING AND ENHANCING CYBERSECURITY AND RESILIENCE IN HEALTHCARE: A UNIFIED RISK AND COMPLIANCE FRAMEWORK." International Journal of Cyber Threat Intelligence and Secure Networking 2, no. 05 (2025): 1–7. https://doi.org/10.55640/ijctisn-v02i05-01.

Full text
Abstract:
The growing digitization of healthcare has introduced complex cybersecurity challenges, making the protection of sensitive patient data and critical infrastructure a top priority. This paper presents a unified risk and compliance framework designed to evaluate and enhance cybersecurity resilience in healthcare systems. By integrating risk assessment methodologies with regulatory compliance standards such as HIPAA, GDPR, and NIST, the framework provides a comprehensive approach to identifying vulnerabilities, managing threats, and ensuring continuous protection. The study analyzes key cybersecu
APA, Harvard, Vancouver, ISO, and other styles
23

Ananda, Safrida, Ika Putranti, and Andi Dir. "ANALYSIS OF THE EU CYBERSECURITY ACT UNDER THE THEORY OF NEOLIBERAL INSTITUTIONALISM." Arena Hukum 15, no. 1 (2022): 176–99. http://dx.doi.org/10.21776/ub.arenahukum.2022.01501.9.

Full text
Abstract:
Wannacry Ransomware epidemics have attacked several high-profile companies in European Union creating an EU-wide cybersecurity crisis in the digital economy and social order. In response, European Union established an appropriate regulation in cybercrime namely The Cybersecurity Act. The Act as an international regime does not only gives a permanent mandate that strengthens European Union Agency for Network and Information Security (ENISA) but also establishes The EU Cybersecurity Certification Scheme in order to increase cybersecurity and build cyber resilience in the European Union Digital S
APA, Harvard, Vancouver, ISO, and other styles
24

Salami, Abidemi Ayodotun, Udochukwu ThankGod Ikechukwu Igwenagu, Cassandra Esambe Mesode, Oluwaseun Oladeji Olaniyi, and Oluseun Babatunde Oladoyinbo. "Beyond Conventional Threat Defense: Implementing Advanced Threat Modeling Techniques, Risk Modeling Frameworks and Contingency Planning in the Healthcare Sector for Enhanced Data Security." Journal of Engineering Research and Reports 26, no. 5 (2024): 304–23. http://dx.doi.org/10.9734/jerr/2024/v26i51156.

Full text
Abstract:
This research study explores the integration of advanced threat and risk modeling with scenario and contingency planning to enhance security and resilience within healthcare organizations. Given the escalating complexity and frequency of cyber threats targeting the healthcare sector, the study assesses the efficacy of a synergistic cybersecurity approach. Utilizing a quantitative research methodology, data were collected through a survey administered to 452 healthcare practitioners, focusing on their perceptions and experiences with cybersecurity threats, risk modeling techniques, and the effe
APA, Harvard, Vancouver, ISO, and other styles
25

Schmitz-Berndt, Sandra, and Mark Cole. "Towards an Efficient and Coherent Regulatory Framework on Cybersecurity in the EU: The Proposals for a NIS 2.0 Directive and a Cyber Resilience Act." Applied Cybersecurity & Internet Governance 1, no. 1 (2022): 121–37. http://dx.doi.org/10.5604/01.3001.0016.1323.

Full text
Abstract:
Cybersecurity regulation in the EU has long been implemented in a piecemeal fashion resulting in a fragmented regulatory landscape. Recent developments triggered the EU to review its approach which has not resulted in the envisaged high level of cyber resilience across the Union. The paper addresses the EU’s limited mandate to regulate cybersecurity and outlines how the internal market rationale serves as a basis to harmonise cybersecurity legislation in the EU Member States. In that regard, the recent Proposal for a NIS 2.0 Directive and the Cyber Resilience Act highlight how the EU seeks to
APA, Harvard, Vancouver, ISO, and other styles
26

Isabirye Edward Kezron. "A cybersecurity resilience framework for underserved rural SMEs in critical infrastructure supply chains: Strengthening operational continuity and threat response in digitally vulnerable regions." World Journal of Advanced Research and Reviews 24, no. 3 (2024): 3464–77. https://doi.org/10.30574/wjarr.2024.24.3.3948.

Full text
Abstract:
Small and medium-sized enterprises (SMEs) in underserved rural regions, particularly those integrated into critical infrastructure supply chains, face heightened vulnerability to evolving cyber threats. These SMEs often lack access to specialized cybersecurity resources and expertise, posing significant challenges to their operational continuity and overall resilience. This paper proposes a cybersecurity resilience framework specifically tailored for these underserved rural SMEs. The framework aims to enhance their capacity to resist cyberattacks, ensure business continuity, and improve threat
APA, Harvard, Vancouver, ISO, and other styles
27

Saeed, Saqib, Salha A. Altamimi, Norah A. Alkayyal, Ebtisam Alshehri, and Dina A. Alabbad. "Digital Transformation and Cybersecurity Challenges for Businesses Resilience: Issues and Recommendations." Sensors 23, no. 15 (2023): 6666. http://dx.doi.org/10.3390/s23156666.

Full text
Abstract:
This systematic literature review explores the digital transformation (DT) and cybersecurity implications for achieving business resilience. DT involves transitioning organizational processes to IT solutions, which can result in significant changes across various aspects of an organization. However, emerging technologies such as artificial intelligence, big data and analytics, blockchain, and cloud computing drive digital transformation worldwide while increasing cybersecurity risks for businesses undergoing this process. This literature survey article highlights the importance of comprehensiv
APA, Harvard, Vancouver, ISO, and other styles
28

Al-Somali, Sabah Abdullah, Raneem Rashad Saqr, Arwa Mohammed Asiri, and Najat Abdullah Al-Somali. "Organizational Cybersecurity Systems and Sustainable Business Performance of Small and Medium Enterprises (SMEs) in Saudi Arabia: The Mediating and Moderating Role of Cybersecurity Resilience and Organizational Culture." Sustainability 16, no. 5 (2024): 1880. http://dx.doi.org/10.3390/su16051880.

Full text
Abstract:
Cybersecurity challenges in Saudi Arabia’s service and manufacturing sectors are escalating due to increased digital adoption, highlighting the need for robust security measures and awareness in SMEs. Therefore, this research is significant due to the increasing reliance on digital technologies and the unique cybersecurity challenges faced by SMEs in these vital economic sectors. With rapid technological advancements, IT capabilities and cybersecurity have become paramount, particularly in the post-COVID-19 era. The service and manufacturing sectors in Saudi Arabia have seen significant shifts
APA, Harvard, Vancouver, ISO, and other styles
29

Dr.A.Shaji, George, and George A.S.Hovan. "Anatomy of Cybersecurity." Partners Universal Multidisciplinary Research Journal (PUMRJ) 02, no. 01 (2025): 1–6. https://doi.org/10.5281/zenodo.14738079.

Full text
Abstract:
Cybersecurity is the defense of systems and networks connected to the internet including hardware, software, and data from cyberattacks. The elements of a strong cybersecurity system are compared in this study paper with the similar elements of the human body that help to preserve general health and welfare. The aim is to offer an explanatory analogy for improved knowledge of cybersecurity and how its several components work together in a tiered protection. Analyzing the main features of cybersecurity systems and making analogies to human body anatomical systems constituted part of the approac
APA, Harvard, Vancouver, ISO, and other styles
30

Narsina, Deekshith. "Impact of Cybersecurity Threats on Emerging Markets' Integration into Global Trade Networks." American Journal of Trade and Policy 9, no. 3 (2022): 141–48. https://doi.org/10.18034/ajtp.v9i3.741.

Full text
Abstract:
This paper explores how cybersecurity concerns affect developing market integration into global trade networks, concentrating on digital market vulnerabilities. The research seeks to identify developing economies' biggest cybersecurity dangers, examine their effects on global commerce, and suggest resilience methods. Cybersecurity threats and their consequences on trade systems are examined via secondary data-based reviews of literature, reports, and case studies. Due to obsolete infrastructure, inadequate regulatory frameworks, and a cybersecurity skills gap, developing countries are suscepti
APA, Harvard, Vancouver, ISO, and other styles
31

Martiri, Edlira. "Fostering resilience: analyzing the skill set of women in the cybersecurity sector." CRJ, no. 1 (September 18, 2023): 5–6. http://dx.doi.org/10.59380/crj.v1i1.2751.

Full text
Abstract:
In the rapidly evolving digital landscape, the significance of robust cybersecurity mea-sures cannot be overstated. As technology permeates every aspect of our lives, the threats posed by cybercriminals are escalating. To combat these challenges effectively, it iscrucial to tap into the diverse talent pool and promote the cybersecurity sector. These editorial aims to shed light on the status of women in the field of cybersecurity in Albania, providing insights that underscore the need for enhanced efforts to empower and engage women Min this critical domain. Women remain underrepresented in th
APA, Harvard, Vancouver, ISO, and other styles
32

Mmango, Nangamso, and Tapiwa Gundu. "Cultivating Collective Armor: Towards a Collaborative Cybersecurity Resilience Framework for SMEs." European Conference on Innovation and Entrepreneurship 19, no. 1 (2024): 523–31. http://dx.doi.org/10.34190/ecie.19.1.2799.

Full text
Abstract:
As Small and Medium-sized Enterprises (SMEs) increasingly integrate digital technologies into their operations, they face escalating cybersecurity threats that challenge their limited financial and human resources. Historically, cybersecurity was not a primary concern for many SMEs due to their minimal reliance on cyberinfrastructure. However, the growing dependency on digital systems has exposed them to significant risks, necessitating robust cybersecurity measures. This research introduces a cybersecurity resilience framework specifically designed to enhance the cybersecurity posture of SMEs
APA, Harvard, Vancouver, ISO, and other styles
33

Collier, Zachary A., Daniel DiMase, Steve Walters, Mark Mohammad Tehranipoor, James H. Lambert, and Igor Linkov. "Cybersecurity Standards: Managing Risk and Creating Resilience." Computer 47, no. 9 (2014): 70–76. http://dx.doi.org/10.1109/mc.2013.448.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Lees, Michael J., Melissa Crawford, and Christoph Jansen. "Towards Industrial Cybersecurity Resilience of Multinational Corporations." IFAC-PapersOnLine 51, no. 30 (2018): 756–61. http://dx.doi.org/10.1016/j.ifacol.2018.11.201.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Demediuk, Serhii, and Oleksandr Korystin. "CYBERSECURITY SYSTEM RESILIENCE AND ASSURANCE IN NATO." NAUKA I PRAVOOKHORONA, no. 1 (2023): 77–85. http://dx.doi.org/10.36486/np.2023.1(59).8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Trim, Peter R. J., and Yang-Im Lee. "Managing Cybersecurity Threats and Increasing Organizational Resilience." Big Data and Cognitive Computing 7, no. 4 (2023): 177. http://dx.doi.org/10.3390/bdcc7040177.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Igwenagu, Udochukwu ThankGod Ikechukwu, Abidemi Ayodotun Salami, Abayomi Shamsudeen Arigbabu, Cassandra Esambe Mesode, Tunbosun Oyewale Oladoyinbo, and Oluwaseun Oladeji Olaniyi. "Securing the Digital Frontier: Strategies for Cloud Computing Security, Database Protection, and Comprehensive Penetration Testing." Journal of Engineering Research and Reports 26, no. 6 (2024): 60–75. http://dx.doi.org/10.9734/jerr/2024/v26i61162.

Full text
Abstract:
This research paper explores the effectiveness of integrated cybersecurity strategies, focusing on the amalgamation of cloud computing security, database protection, and penetration testing into a unified risk management framework. The primary aim is to evaluate how such integration impacts the overall cybersecurity posture of organizations, offering insights into mitigating cyber threats, unauthorized access, and data breaches. Employing a survey-based methodology, the study gathered data from 365 professionals across cloud computing, database administration, and cybersecurity fields. Through
APA, Harvard, Vancouver, ISO, and other styles
38

Branley-Bell, Dawn, Lynne Coventry, Matt Dixon, Adam Joinson, and Pam Briggs. "Exploring Age and Gender Differences in ICT Cybersecurity Behaviour." Human Behavior and Emerging Technologies 2022 (October 21, 2022): 1–10. http://dx.doi.org/10.1155/2022/2693080.

Full text
Abstract:
Known age differences exist in relation to information and communication technology (ICT) use, attitudes, access, and literacy. Less is known about age differences in relation to cybersecurity risks and associated cybersecurity behaviours. Using an online survey, this study analyses data from 579 participants to investigate age differences across four key cybersecurity behaviours: device securement, password generation, proactive checking, and software updating. Significant age differences were found; however, this is not a straightforward relationship. Older users appear less likely to secure
APA, Harvard, Vancouver, ISO, and other styles
39

Adebimpe Bolatito Ige, Eseoghene Kupa, and Oluwatosin Ilori. "Best practices in cybersecurity for green building management systems: Protecting sustainable infrastructure from cyber threats." International Journal of Science and Research Archive 12, no. 1 (2024): 2960–77. http://dx.doi.org/10.30574/ijsra.2024.12.1.1185.

Full text
Abstract:
This study explores the critical intersection of cybersecurity and sustainable infrastructure, with a focus on Green Building Management Systems (GBMS). Recognizing the increasing sophistication of cyber threats and the integration of digital technologies in sustainable buildings, this research aims to understand the challenges and prospects of cybersecurity within this context. Employing a systematic literature review and content analysis, the study examines peer-reviewed articles, conference proceedings, and industry reports from 2010 to 2024. The methodology facilitates a comprehensive unde
APA, Harvard, Vancouver, ISO, and other styles
40

Loo, Sin Ming, Elizabeth Khan, Eleanor Taylor, and Char Sample. "Transforming Cyber Education thru Open to All Accessible Pathways." Journal of The Colloquium for Information Systems Security Education 11, no. 1 (2024): 6. http://dx.doi.org/10.53735/cisse.v11i1.188.

Full text
Abstract:
Boise State University’s (BSU) Cyber Operations and Resilience CORe program was intentionally designed so that any student, especially non-traditional and non-technical students, with an interest in cybersecurity could have an education and training pathway to enter the cyber workforce. The CORe curriculum focuses on teaching students how to design, apply, and improve cybersecurity through the interaction of people, processes, and technology. CORe is a stackable curriculum with elective credit hours and options for various academic and industry certificates and certifications that enable stude
APA, Harvard, Vancouver, ISO, and other styles
41

Uday Kiran Yedluri. "Enhancing cyber resilience in financial institutions: A data protection framework." World Journal of Advanced Engineering Technology and Sciences 15, no. 1 (2025): 486–96. https://doi.org/10.30574/wjaets.2025.15.1.0229.

Full text
Abstract:
The rapid digital transformation of financial institutions has created unprecedented cybersecurity challenges, necessitating robust frameworks for data protection and threat response. This article examines the evolving landscape of cybersecurity in financial services, focusing on core components of data protection, advanced threat detection mechanisms, regulatory compliance requirements, and the cultivation of security-first organizational cultures. Through analysis of current industry practices and emerging technologies, the article explores how financial institutions are adapting to increasi
APA, Harvard, Vancouver, ISO, and other styles
42

Shahzad, Syed, Keith Joiner, Li Qiao, Felicity Deane, and Jo Plested. "Cyber Resilience Limitations in Space Systems Design Process: Insights from Space Designers." Systems 12, no. 10 (2024): 434. http://dx.doi.org/10.3390/systems12100434.

Full text
Abstract:
Space technology is integral to modern critical systems, including navigation, communication, weather, financial services, and defence. Despite its significance, space infrastructure faces unique cyber resilience challenges exacerbated by the size, isolation, cost, persistence of legacy systems, and lack of comprehensive cyber resilience engineering standards. This paper examines the engineering challenges associated with incorporating cyber resilience into space design, drawing on insights and experiences from industry experts. Through qualitative interviews with engineers, cybersecurity spec
APA, Harvard, Vancouver, ISO, and other styles
43

Tatrial, Ranit, Harsh Choudhary, Bharti Bharti, and Vikash Yadav. "Integrative Advanced Threat Detection: Leveraging Machine Learning for Cybersecurity Resilience." International Journal of Research Publication and Reviews 6, sp5 (2025): 188–96. https://doi.org/10.55248/gengpi.6.sp525.1925.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Lucky, Bamidele Benjamin, Enoch Adegbola Ayodeji, Amajuoyi Prisca, Daniel Adegbola Mayokun, and Bukola Adeusi Kudirat. "Digital transformation in SMEs: Identifying cybersecurity risks and developing effective mitigation strategies." Global Journal of Engineering and Technology Advances 19, no. 2 (2024): 134–53. https://doi.org/10.5281/zenodo.13691790.

Full text
Abstract:
This study delves into the cybersecurity landscape for small and medium-sized enterprises (SMEs), focusing on identifying prevalent cybersecurity risks, evaluating existing mitigation strategies, and exploring the role of innovation and technology in bolstering cyber resilience. Employing a systematic literature review and content analysis, the research scrutinizes academic journals, industry reports, and government publications from 2015 to 2024, to gather insights into the cybersecurity challenges and strategies pertinent to SMEs. Key findings reveal that SMEs are particularly vulnerable to
APA, Harvard, Vancouver, ISO, and other styles
45

Ramakrishnan, Shanmugavelan, and Dinesh Reddy Chittibala. "Enhancing Cyber Resilience: Convergence of SIEM, SOAR, and AI in 2024." International Journal of Computing and Engineering 5, no. 2 (2024): 36–44. http://dx.doi.org/10.47941/ijce.1754.

Full text
Abstract:
Purpose: The study aims to examine the synergistic effects of integrating Security Information and Event Management (SIEM), Security Orchestration, Automation, and Response (SOAR), and Artificial Intelligence (AI) technologies in enhancing cybersecurity frameworks. It explores how this combination can lead to a transformative era in cybersecurity, focusing on the improved efficacy of threat management and incident response.
 Methodology: An analytical approach was used to investigate the integration trends between SIEM and SOAR technologies, underpinned by advancements in AI. This method
APA, Harvard, Vancouver, ISO, and other styles
46

Singh, Bhagwant, and Dr Sikander Singh Cheema. "Psychology in Cybersecurity: Unveiling the Human Dimensions of Digital Resilience." International Journal of Advanced Networking and Applications 16, no. 01 (2024): 6281–90. http://dx.doi.org/10.35444/ijana.2024.16107.

Full text
Abstract:
In the contemporary digital landscape, cybersecurity transcends mere technological challenges, intertwining intricately with human behavior and cognition. This review delves into the vital intersection of psychology and cybersecurity, aiming to unveil the multifaceted human dimensions of digital resilience. By delving into the nuances of human decision-making, biases, and responses to cyber perils, one can bolster defensive mechanisms and augment resilience against dynamic digital threats. Employing a multidisciplinary approach drawing from psychology, behavioral economics, and cybersecurity e
APA, Harvard, Vancouver, ISO, and other styles
47

Okeke, Kenechi, and Sesan Omojola. "Securing the Energy Sector: Advancing Cyber Resilience through Innovative Technologies and Best Practices." Current Journal of Applied Science and Technology 44, no. 4 (2025): 133–42. https://doi.org/10.9734/cjast/2025/v44i44519.

Full text
Abstract:
Aim: In this study, the improvement of cyber resilience in the energy sector was considered with consideration to a case study of best practices and emerging technologies. Problem Statement: Cyber threats have escalated in relation to digital ecosystem and thus pose remarkable risks in energy sector. Currently, the energy sector is critically vulnerable to cyber threats and thus, immediate action is needed to improve its cyber resilience. Significance of Study: The energy sector is as an essential component of modern human life which also contributes significantly to the economic growth of a n
APA, Harvard, Vancouver, ISO, and other styles
48

Basharat, Arooj, and Zilly Huma. "Enhancing Resilience: Smart Grid Cybersecurity and Fault Diagnosis Strategies." Asian Journal of Research in Computer Science 17, no. 6 (2024): 1–12. http://dx.doi.org/10.9734/ajrcos/2024/v17i6453.

Full text
Abstract:
The increasing integration of advanced technologies within the power grid infrastructure has led to significant advancements in efficiency, reliability, and sustainability. However, this integration also introduces new vulnerabilities, particularly in the realm of cybersecurity. This paper presents an overview of smart grid cybersecurity challenges and proposes strategies for enhancing resilience through fault diagnosis techniques. Firstly, the paper examines the evolving threat landscape facing smart grids, encompassing cyber-attacks, insider threats, and natural disasters. It highlights the
APA, Harvard, Vancouver, ISO, and other styles
49

Panalangin, Mansur L., Ariel Roy L. Reyes, Haron A. Mohamad, Shahara A. Abo, and Arnold S. Cararag. "Building a Resilient Computer Emergency Response Team (CERT): A Strategic Approach Using SWOT Analysis and the CERT Resilience Maturity Model for Cybersecurity Preparedness in the Bangsamoro Government, Philippines." American Journal of Innovation in Science and Engineering 4, no. 2 (2025): 41–48. https://doi.org/10.54536/ajise.v4i2.4289.

Full text
Abstract:
exposed clients to risks during online transactions and service access. These incidents underscore the urgent need to enhance the region’s cybersecurity preparedness and establish a resilient Computer Emergency Response Team (CERT). This study evaluates the current state of cybersecurity readiness across selected Bangsamoro Government ministries, offices, and agencies by integrating SWOT analysis with the CERT Resilience Management Model (CERT-RMM). Through this structured approach, the study identifies key strengths, weaknesses, opportunities, and threats while determining the current maturit
APA, Harvard, Vancouver, ISO, and other styles
50

Esther Chinwe Eze, Shakirat O. Raji, Grace A. Durotolu, and Fen Danjuma John. "The role of AI in national cybersecurity policy and resilience planning: A comprehensive analysis of the United States' strategic approach." World Journal of Advanced Research and Reviews 27, no. 1 (2025): 1381–93. https://doi.org/10.30574/wjarr.2025.27.1.2656.

Full text
Abstract:
The integration of artificial intelligence (AI) into national cybersecurity frameworks represents a paradigmatic shift in how democratic nations approach digital defense and resilience planning. This article examines the multifaceted role of AI in shaping United States cybersecurity policy, analyzing current implementations, strategic frameworks, and emerging challenges. Through comprehensive analysis of policy documents, threat assessments, and technological capabilities, this study demonstrates that AI serves both as a critical enabler of cybersecurity resilience and a potential vector for s
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!