To see the other types of publications on this topic, follow the link: NIST SP 800-53.

Journal articles on the topic 'NIST SP 800-53'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 29 journal articles for your research on the topic 'NIST SP 800-53.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Asari, Cindy, and Yulhendri -. "Manajemen Risiko Sistem Informasi Mengacu pada NIST SP 800-30 dan NIST SP 800-53 rev.5." Jurnal Teknologi Dan Sistem Informasi Bisnis 5, no. 4 (2023): 420–30. http://dx.doi.org/10.47233/jteksis.v5i4.898.

Full text
Abstract:
Melalui Balai Penelitian, Kementerian Pertanian memanfaatkan penggunaan website yaitu bsip.pertanian.go.id yang bertujuan untuk keperluan membantu pengguna dengan cara penyebaran informasi. Dalam pengelolaan sistem informasi ini, teknologi informasi merupakan salah satu bagian terpenting, di mana keberhasilan pelayanan tergantung sejauh mana manajemen teknologi informasi telah berkembang. Namun, bahaya yang mengancam kelangsungan sistem informasi sering berkembang. Tujuan dari penelitian ini adalah untuk menentukan risiko dan saran atau rekomendasi untuk penanganan risiko tersebut yang berdasa
APA, Harvard, Vancouver, ISO, and other styles
2

Afiansyah, Hafizh Ghozie, and Amiruddin Amiruddin. "Perancangan Rencana Tata Kelola dan Manajemen Teknologi Informasi Menggunakan COBIT 2019 dan NIST SP 800-53 Rev 5 (Studi Kasus: Instansi Pemerintah ABC)." Info Kripto 16, no. 1 (2022): 33–39. http://dx.doi.org/10.56706/ik.v16i1.38.

Full text
Abstract:
Untuk mendukung fungsinya sebagai instansi pemerintahan, Instansi Pemerintah ABC menggunakan layanan teknologi informasi (TI) untuk membantu proses bisnis dan penyediaan layanan publik. Untuk mendapatkan hasil yang maksimal dari penggunaan TI, diperlukan adanya rencana tata kelola dan manajemen terhadap TI sehingga penggunaanya dapat sejalan dengan tujuan dan capaian yang diinginkan dari instansi. Pada penelitian ini, dilakukan perancangan rencana tata kelola dan manajemen TI untuk Instansi Pemerintah ABC dengan menggunakan kerangka kerja COBIT 2019 dan kendali dari NIST SP 800-53 Rev 5. Hasil
APA, Harvard, Vancouver, ISO, and other styles
3

Kioskli, Kitty, Eleni Seralidou, and Nineta Polemi. "A Practical Human-Centric Risk Management (HRM) Methodology." Electronics 14, no. 3 (2025): 486. https://doi.org/10.3390/electronics14030486.

Full text
Abstract:
Various standards (e.g., ISO 27000x, ISO 31000:2018) and methodologies (e.g., NIST SP 800-53, NIST SP 800-37, NIST SP 800-161, ETSI TS 102 165-1, NISTIR 8286) are available for risk assessment. However, these standards often overlook the human element. Studies have shown that adversary profiles (AP), which detail the maturity of attackers, significantly affect vulnerability assessments and risk calculations. Similarly, the maturity of the users interacting with the Information and Communication Technologies (ICT) system in adopting security practices impacts risk calculations. In this paper, w
APA, Harvard, Vancouver, ISO, and other styles
4

Afiansyah, Hafizh Ghozie, Septia Ulfa Sunaringtyas, and Amiruddin Amiruddin. "Perancangan Rencana Pemulihan Bencana Menggunakan NIST SP 800-34 Rev 1, NIST SP 800-53 Rev 5 dan SNI 8799 (Studi Kasus: Unit TI XYZ)." Jurnal Teknologi Informasi dan Ilmu Komputer 10, no. 2 (2023): 329–38. https://doi.org/10.25126/jtiik.20236507.

Full text
Abstract:
Pada Institut XYZ, unit kerja yang memiliki tanggung jawab untuk mengelola layanan teknologi informasi dan pusat data adalah Unit TI. Berdasarkan Peraturan Pemerintah Nomor 71 Tahun 2019, untuk menanggulangi dampak kehilangan layanan pada pusat data yang disebabkan oleh bencana dan ancaman, diperlukan adanya rencana yang bertujuan untuk mencegah kehilangan dan kerusakan, yaitu rencana pemulihan bencana atau DRP. Hal tersebut didukung dengan kuesioner dan wawancara yang dilakukan kepada jajaran pejabat struktural, kepala unit dan mahasiswa Institut XYZ yang menyatakan bahwa layanan yang dikelol
APA, Harvard, Vancouver, ISO, and other styles
5

Afiansyah, Hafizh Ghozie, Septia Ulfa Sunaringtyas, and Amiruddin Amiruddin. "Perancangan Rencana Pemulihan Bencana Menggunakan NIST SP 800-34 Rev 1, NIST SP 800-53 Rev 5 dan SNI 8799 (Studi Kasus: Unit TI XYZ)." Jurnal Teknologi Informasi dan Ilmu Komputer 10, no. 2 (2023): 329. http://dx.doi.org/10.25126/jtiik.20231026507.

Full text
Abstract:
<p><span>Pada Institut XYZ, unit kerja yang memiliki tanggung jawab untuk mengelola layanan teknologi informasi dan pusat data adalah Unit TI. Berdasarkan Peraturan Pemerintah Nomor 71 Tahun 2019, untuk menanggulangi dampak kehilangan layanan pada pusat data yang disebabkan oleh bencana dan ancaman, diperlukan adanya rencana yang bertujuan untuk mencegah kehilangan dan kerusakan, yaitu rencana pemulihan bencana atau DRP. Hal tersebut didukung dengan kuesioner dan wawancara yang dilakukan kepada jajaran pejabat struktural, kepala unit dan mahasiswa Institut XYZ yang menyatakan bahwa
APA, Harvard, Vancouver, ISO, and other styles
6

Maksymov, Anton. "Analysis of risk management standards and their application in IT projects." Management of Development of Complex Systems, no. 61 (March 28, 2025): 66–75. https://doi.org/10.32347/2412-9933.2025.61.66-75.

Full text
Abstract:
Risk management is a critical aspect of successful project implementation in the field of information technology, as IT projects are often subject to high levels of uncertainty and complexity. Insufficient risk management can lead to significant losses, budget overruns, delays in project timelines, and reduced quality of the final product. Consequently, there is a need for the application of reliable standards to ensure effective identification, analysis, and monitoring of risks throughout the entire lifecycle of an IT project. The objective of this study is to analyze existing risk management
APA, Harvard, Vancouver, ISO, and other styles
7

Ahmadi, Sina. "Cloud Security Metrics and Measurement." Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online) 2, no. 1 (2023): 93–108. http://dx.doi.org/10.60087/jklst.vol2.n1.p108.

Full text
Abstract:
This research aims to investigate the cloud security metrics by exploring the existing frameworks, integrated approaches and quantitative measurements to enhance overall security in cloud environments. This study explains several established frameworks and standards, such as the CSA Cloud Controls Matrix, NIST SP 800-53 and ISO/IEC 27001, which are important in guiding organizations towards strong security practices. Moreover, a qualitative research method has been used in this research study, conducting a literature review of past studies on the same topic. The challenges and limitations rega
APA, Harvard, Vancouver, ISO, and other styles
8

Ahmadi, Sina. "Cloud Security Metrics and Measurement." Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online) 2, no. 1 (2023): 93–107. http://dx.doi.org/10.60087/jklst.vol2.n1.p107.

Full text
Abstract:
This research aims to investigate the cloud security metrics by exploring the existing frameworks, integrated approaches and quantitative measurements to enhance overall security in cloud environments. This study explains several established frameworks and standards, such as the CSA Cloud Controls Matrix, NIST SP 800-53 and ISO/IEC 27001, which are important in guiding organizations towards strong security practices. Moreover, a qualitative research method has been used in this research study, conducting a literature review of past studies on the same topic. The challenges and limitations rega
APA, Harvard, Vancouver, ISO, and other styles
9

Santosa, Iqbal, and Rahmat Mulyana. "Information Technology Risk Control of University in a Work from Home Situations." Journal of Information Systems and Informatics 4, no. 4 (2022): 1008–18. http://dx.doi.org/10.51519/journalisi.v4i4.393.

Full text
Abstract:
The University is one of the educational institutions affected by the COVID-19 pandemic. Most of its activities, which are academic management, human resource management, information technology services, and so on were changed into WFH (Work from Home) supported by information technology. Utilization of information technology in supporting WFH can create various risks and needs to be controlled either preventive, detective, or corrective to minimize the impact. This research will focus on planning for university information technology risk control in working from home conditions by referring t
APA, Harvard, Vancouver, ISO, and other styles
10

Manuja, Prashant, Rajveer Singh Shekhawat, and Umashankar Rawat. "Design & analysis of novel IT security framework for overcoming data security & privacy challenges." Journal of Discrete Mathematical Sciences & Cryptography 26, no. 3 (2023): 885–98. http://dx.doi.org/10.47974/jdmsc-1776.

Full text
Abstract:
IT security has always been a major concern for all organizations, especially after the rise in IT Integration amongst all processes, Post pandemic this has become a bigger issue than earlier. The organizations are growing also with IT Integration the negative impact of information related risk incidents are also increasing worldwide. There are several IT Risk Assessment Frameworks in use to address information security assaults, vulnerabilities, threats, and breaches, including ISO 270001/27005. COBIT, NIST SP- 800/53 etc, though following and implementation of these protocols, still organiza
APA, Harvard, Vancouver, ISO, and other styles
11

Okunlola, Folasade. "A Cyber-Physical Framework for Data Assurance and Emergency Response Readiness in Critical Energy Infrastructure." Journal of Engineering and Applied Sciences 4, no. 1 (2025): 1–10. https://doi.org/10.70560/6ag3wg21.

Full text
Abstract:
The increasing digitization of critical energy infrastructure has amplified the need for integrated frameworks that ensure data reliability and operational readiness during emergencies. This paper proposes a novel Cyber-Physical Data Assurance Framework that unifies data governance, real-time analytics, and emergency coordination across digital and physical systems. The framework is architected into four functional layers—Data, Governance, Analytics, and Interface—each designed to preserve data integrity, enhance situational awareness, and synchronize field operations with control systems. Usi
APA, Harvard, Vancouver, ISO, and other styles
12

Ilori, Oluwatosin, Comfort Iyabode Lawal, Solomon Christopher Friday, Ngozi Joan Isibor, and Ezinne C. Chukwuma Eke. "Cybersecurity Auditing in the Digital Age: A Review of Methodologies and Regulatory Implications." Journal of Frontiers in Multidisciplinary Research 3, no. 1 (2022): 174–87. https://doi.org/10.54660/.ijfmr.2022.3.1.174-187.

Full text
Abstract:
In an increasingly digitized and interconnected global environment, cybersecurity auditing has become a critical pillar in safeguarding organizational assets and ensuring regulatory compliance. This review critically analyzes emerging methodologies for cybersecurity auditing, focusing on their alignment with key regulatory frameworks such as the Sarbanes-Oxley Act (SOX), the National Institute of Standards and Technology (NIST) Cybersecurity Framework, and the General Data Protection Regulation (GDPR). The study identifies a significant shift from traditional, reactive auditing approaches towa
APA, Harvard, Vancouver, ISO, and other styles
13

Uvidia Armijo, Luis Alberto, María Cristina Montero Mora, Luis Enrique Guerrero Naranjo, and Jhoeel Hernán Uvidia Armijo. "Evaluación crítica de los riesgos de ciberseguridad en infraestructuras de transporte terrestre en Ecuador." Reincisol. 4, no. 7 (2025): 4148–65. https://doi.org/10.59282/reincisol.v4(7)4148-4165.

Full text
Abstract:
: La digitalización progresiva de las terminales de transporte terrestre en Ecuador ha permitido mejorar la gestión operativa mediante sistemas tecnológicos como boletaje electrónico, videovigilancia (CCTV), conectividad inalámbrica, control de accesos y plataformas de información al usuario. No obstante, esta transformación también ha incrementado las amenazas en el ámbito de la ciberseguridad, exponiendo a estas infraestructuras críticas a riesgos como accesos no autorizados, robo de datos, secuestro de sistemas (ransomware) y sabotaje digital. Este artículo presenta una revisión bibliográfi
APA, Harvard, Vancouver, ISO, and other styles
14

Luh, Robert, Marlies Temper, Simon Tjoa, Sebastian Schrittwieser, and Helge Janicke. "PenQuest: a gamified attacker/defender meta model for cyber security assessment and education." Journal of Computer Virology and Hacking Techniques 16, no. 1 (2019): 19–61. http://dx.doi.org/10.1007/s11416-019-00342-x.

Full text
Abstract:
AbstractAttacks on IT systems are a rising threat against the confidentiality, integrity, and availability of critical information and infrastructures. At the same time, the complex interplay of attack techniques and possible countermeasures makes it difficult to appropriately plan, implement, and evaluate an organization’s defense. More often than not, the worlds of technical threats and organizational controls remain disjunct. In this article, we introduce PenQuest, a meta model designed to present a complete view on information system attacks and their mitigation while providing a tool for
APA, Harvard, Vancouver, ISO, and other styles
15

Rios, Erkuden, Angel Rego, Eider Iturbe, Marivi Higuero, and Xabier Larrucea. "Continuous Quantitative Risk Management in Smart Grids Using Attack Defense Trees." Sensors 20, no. 16 (2020): 4404. http://dx.doi.org/10.3390/s20164404.

Full text
Abstract:
Although the risk assessment discipline has been studied from long ago as a means to support security investment decision-making, no holistic approach exists to continuously and quantitatively analyze cyber risks in scenarios where attacks and defenses may target different parts of Internet of Things (IoT)-based smart grid systems. In this paper, we propose a comprehensive methodology that enables informed decisions on security protection for smart grid systems by the continuous assessment of cyber risks. The solution is based on the use of attack defense trees modelled on the system and compu
APA, Harvard, Vancouver, ISO, and other styles
16

Potii, O. V., D. Yu Golubnychiy, Yu K. Vasiliev, and M. V. Yesina. "The process of declaring information security profiles." Radiotekhnika, no. 217 (June 14, 2024): 7–22. http://dx.doi.org/10.30837/rt.2024.2.217.01.

Full text
Abstract:
The article discusses the process of declaring information security profiles, which is an important aspect of ensuring information security in modern organizations. The main purpose of the declaration is to establish clear requirements and control measures to ensure an appropriate level of protection of information assets against potential threats and vulnerabilities. The authors of the article analyze the basic and target information security profiles, emphasizing their features, advantages and disadvantages. In particular, the basic security profile is considered as a minimum set of requirem
APA, Harvard, Vancouver, ISO, and other styles
17

Basheer, Nihala, Shareeful Islam, Mohammed K. S. Alwaheidi, and Spyridon Papastergiou. "Adoption of Deep-Learning Models for Managing Threat in API Calls with Transparency Obligation Practice for Overall Resilience." Sensors 24, no. 15 (2024): 4859. http://dx.doi.org/10.3390/s24154859.

Full text
Abstract:
System-to-system communication via Application Programming Interfaces (APIs) plays a pivotal role in the seamless interaction among software applications and systems for efficient and automated service delivery. APIs facilitate the exchange of data and functionalities across diverse platforms, enhancing operational efficiency and user experience. However, this also introduces potential vulnerabilities that attackers can exploit to compromise system security, highlighting the importance of identifying and mitigating associated security risks. By examining the weaknesses inherent in these APIs u
APA, Harvard, Vancouver, ISO, and other styles
18

Prasanna Kumar Kandregula. "Building secure projects: Cybersecurity principles for every stage." International Journal of Science and Research Archive 15, no. 2 (2025): 723–32. https://doi.org/10.30574/ijsra.2025.15.2.1460.

Full text
Abstract:
The scale and sophistication of threats in the world of cybersecurity are steadily increasing and they thus become increasingly delimitative toward organizations of whichever industry. Many projects are failing to incorporate maintainable practices of cybersecurity since its earlier concept phase to delivery, due to which the practical linkage culminating in a plethora of data breaches, financial losses resounding in cost, and reputation, and having grievous regulatory penalties. Our assertion also surmises keeping security as a parallel activity or as an afterthought that must systematically
APA, Harvard, Vancouver, ISO, and other styles
19

Lubell, Joshua. "Baseline Tailor." Journal of Research of the National Institute of Standards and Technology 123 (June 26, 2018). http://dx.doi.org/10.6028/jres.123.007.

Full text
Abstract:
Baseline Tailor is an innovative web application for users of the National Institute of Standards and Technology (NIST) Cybersecurity Framework and Special Publication (SP) 800-53. Baseline Tailor makes the information in these widely referenced publications easily accessible to both security professionals and downstream software by addressing the following barriers: Complexity of the rules for tailoring SP 800-53 security controls, Differences in the Framework's and SP 800-53 organizational approach, and Lack of a computer-readable data format for representing tailored security controls. The
APA, Harvard, Vancouver, ISO, and other styles
20

Feng, Yongkang, Liang Yao, Hongli Zhou, et al. "High-throughput TRNG design with novelty adjustable TDC based on STR." ACM Transactions on Reconfigurable Technology and Systems, March 7, 2025. https://doi.org/10.1145/3722118.

Full text
Abstract:
In IoT devices, true random number generators (TRNGs) play an increasingly important role, and advanced TRNGs must possess high throughput, low resource overhead, and high stability. In this paper, we propose a fine-grained entropy extraction circuit based on self-timed ring (STR), which can change the entropy extraction capability by varying the stages of STRs to extract randomness from different entropy sources. Importantly, the throughput of the proposed TRNG can be automatically adjusted according to the frequency of the entropy source, adapting to user requirements. The proposed TRNG is v
APA, Harvard, Vancouver, ISO, and other styles
21

Ruhur, Winayaka. "Perancangan dan Evaluasi Keamanan Modul IAM pada Arsitektur Microservice Menggunakan Keycloak." Indonesian Journal of Computer Science 14, no. 2 (2025). https://doi.org/10.33022/ijcs.v14i2.4854.

Full text
Abstract:
Keamanan dan pengelolaan identitas menjadi tantangan penting dalam sistem berbasis microservice. Penelitian ini bertujuan untuk merancang dan mengevaluasi modul Identity and Access Management (IAM) yang aman dan terintegrasi, dengan memanfaatkan teknologi Keycloak serta pendekatan pengamanan berdasarkan kerangka kerja NIST SP 800-53. Studi kasus dilakukan pada suatu organisasi yang sedang melakukan transformasi digital ke arsitektur microservice. Sistem dirancang untuk mengakomodasi autentikasi dan otorisasi berbasis peran, atribut, serta permission. Federeted identity diterapkan dengan protok
APA, Harvard, Vancouver, ISO, and other styles
22

Granata, Daniele, Michele Mastroianni, Massimiliano Rak, Pasquale Cantiello, and Giovanni Salzillo. "GDPR compliance through standard security controls: An automated approach." Journal of High Speed Networks, February 14, 2024, 1–28. http://dx.doi.org/10.3233/jhs-230080.

Full text
Abstract:
Since 2018, the enactment of the General Data Protection Regulation (GDPR) has bestowed distinct privileges upon each person while imposing protocols to safeguard personal information. The GDPR effectively tackles an evident requirement within our interconnected, social media-driven society. However, its compliance poses a considerable challenge, particularly for small and medium-sized businesses. This work aims to identify and select the proper countermeasures in order to comply with GDPR, by using standard security controls. Thus, we designed a tool to handle some phases of the compliance pr
APA, Harvard, Vancouver, ISO, and other styles
23

Le, Minh. "AN ASSESTMENT MODEL FOR CYBER SECURITY OF VIETNAMESE ORGANIZATION." VNU Journal of Science: Policy and Management Studies 33, no. 2 (2017). http://dx.doi.org/10.25073/2588-1116/vnupam.4102.

Full text
Abstract:
This article aims to introduce the cyber security assess model (CSAM), an important component in cyber security architecture framework, especially for the developing country as Vietnam. This architecture framework is built up with the Enterprise Architecture approach and based on the ISO 2700x and NIST SP 800-53 Rev.4. From the holistic perspective based on EGIF developed previously by UNDP group and the main TOGAF features, ITI-GAF is simplified to suit the awareness, capability and improvement readiness of the developing countries. The result of survey and applying in countries as Vietnam, L
APA, Harvard, Vancouver, ISO, and other styles
24

Ихсанова, Б., Б. Бөрібаев та М. Сериккажина. "ЦИФРЛАНДЫРУ ЖАҒДАЙЫНДА ҰЙЫМДАРДЫҢ АҚПАРАТТЫҚ ҚАУІПСІЗДІК САЯСАТЫНЫҢ ТИІМДІЛІГІН БАҒАЛАУДЫҢ ӘДІСТЕМЕЛІК ТӘСІЛДЕРІН ТАЛДАУ". Вестник КазУТБ 2, № 27 (2025). https://doi.org/10.58805/kazutb.v.2.27-840.

Full text
Abstract:
Экономика мен қоғамның қарқынды цифрлық дамуы жағдайында ұйымдардың ақпараттық қауіпсіздігін қамтамасыз ету тұрақтылық пен бәсекеге қабілеттіліктің негізгі факторы болып табылады. Ұйымдар деректердің сыртқа шығуы, кибершабуылдар және рұқсатсыз қол жеткізу сияқты қауіптердің күшеюімен бетпе-бет келеді. Мақала техникалық, ұйымдастырушылық және әлеуметтік аспектілерді ескере отырып, ұйымдардағы ақпараттық қауіпсіздік саясатының тиімділігін бағалаудың әдіснамалық тәсілдерін талдауға арналған. Зерттеу барысында техникалық және ұйымдастырушылық факторлар, сондай-ақ әлеуметтік-техникалық контекст еск
APA, Harvard, Vancouver, ISO, and other styles
25

Gnatyuk, Sergiy, Viktoriia Sydorenko, and Anatolii Skurativskyi. "CYBERSECURITY MANAGEMENT MODEL FOR SOFTWARE IMPLEMENTATION." Cybersecurity Education Science Technique, June 26, 2025, 715. https://doi.org/10.28925/2663-4023.2025.28.841.

Full text
Abstract:
In today’s digital world, cybersecurity has become a critical factor in software implementation across various domains. The increasing complexity of systems, the dynamic threat landscape, and limited resources require software developers and stakeholders to adopt effective mechanisms for managing cybersecurity requirements. This article presents an integrated mathematical model for managing cybersecurity requirements during software implementation. The relevance of this problem is driven by the growing complexity of modern information systems, the need for compliance with international securit
APA, Harvard, Vancouver, ISO, and other styles
26

-, Suhas Hanumanthaiah. "SOX Considerations for Cloud Data Architecture: A Comprehensive Literature Review." International Journal on Science and Technology 16, no. 2 (2025). https://doi.org/10.71097/ijsat.v16.i2.6482.

Full text
Abstract:
In an increasingly digitized and interconnected global environment, cybersecurity auditing has become a critical pillar in safeguarding organizational assets and ensuring regulatory compliance. This comprehensive review critically analyzes emerging methodologies for cybersecurity auditing, focusing on their alignment with key regulatory frameworks such as the Sarbanes-Oxley Act (SOX), the National Institute of Standards and Technology (NIST) Cybersecurity Framework, and the General Data Protection Regulation (GDPR). The study identifies a significant shift from traditional, reactive auditing a
APA, Harvard, Vancouver, ISO, and other styles
27

Rios, Erkuden, Angel Rego, Eider Iturbe, Marivi Higuero, and Xabier Larrucea. "Continuous Quantitative Risk Management in Smart Grids Using Attack Defense Trees." August 7, 2020. https://doi.org/10.3390/s20164404.

Full text
Abstract:
Although the risk assessment discipline has been studied from long ago as a means to support security investment decision-making, no holistic approach exists to continuously and quantitatively analyze cyber risks in scenarios where attacks and defenses may target different parts of Internet of Things (IoT)-based smart grid systems. In this paper, we propose a comprehensive methodology that enables informed decisions on security protection for smart grid systems by the continuous assessment of cyber risks. The solution is based on the use of attack defense trees modelled on the system and compu
APA, Harvard, Vancouver, ISO, and other styles
28

"Cybersecurity Risk Assessment Frameworks For Engineering Databases: A Systematic Literature Review." Strategic Data Management and Innovation 2, no. 01 (2025). https://doi.org/10.71292/sdmi.v2i01.22.

Full text
Abstract:
The increasing reliance on engineering databases for storing, managing, and processing sensitive industrial and operational data has heightened their susceptibility to evolving cybersecurity threats. To ensure data confidentiality, integrity, and availability, structured cybersecurity risk assessment frameworks are essential for identifying vulnerabilities, mitigating cyber risks, and enhancing database security. This study presents a systematic review of 125 high-quality articles following the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines, offering a c
APA, Harvard, Vancouver, ISO, and other styles
29

Shanmugavelan, Ramakrishnan. "Systematic Evaluation of Security Controls and Cybersecurity Program Enhancement: Bridging the Gap Between Theory and Practice." February 29, 2020. https://doi.org/10.5281/zenodo.11078473.

Full text
Abstract:
In the realm of cybersecurity, the dynamic nature of threats necessitates equally agile and robust security controls and frameworks. Despite the abundance of theoretical models and frameworks aimed at enhancing cybersecurity postures, a significant gap often exists between these theoretical constructs and their practical, effective implementation. This paper endeavors to bridge this gap through a methodical assessment of existing security controls and the subsequent development of an advanced framework tailored for the continuous improvement of cybersecurity programs. Utilizing a mixed-methods
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!