Journal articles on the topic 'NIST SP 800-53'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 29 journal articles for your research on the topic 'NIST SP 800-53.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Asari, Cindy, and Yulhendri -. "Manajemen Risiko Sistem Informasi Mengacu pada NIST SP 800-30 dan NIST SP 800-53 rev.5." Jurnal Teknologi Dan Sistem Informasi Bisnis 5, no. 4 (2023): 420–30. http://dx.doi.org/10.47233/jteksis.v5i4.898.
Full textAfiansyah, Hafizh Ghozie, and Amiruddin Amiruddin. "Perancangan Rencana Tata Kelola dan Manajemen Teknologi Informasi Menggunakan COBIT 2019 dan NIST SP 800-53 Rev 5 (Studi Kasus: Instansi Pemerintah ABC)." Info Kripto 16, no. 1 (2022): 33–39. http://dx.doi.org/10.56706/ik.v16i1.38.
Full textKioskli, Kitty, Eleni Seralidou, and Nineta Polemi. "A Practical Human-Centric Risk Management (HRM) Methodology." Electronics 14, no. 3 (2025): 486. https://doi.org/10.3390/electronics14030486.
Full textAfiansyah, Hafizh Ghozie, Septia Ulfa Sunaringtyas, and Amiruddin Amiruddin. "Perancangan Rencana Pemulihan Bencana Menggunakan NIST SP 800-34 Rev 1, NIST SP 800-53 Rev 5 dan SNI 8799 (Studi Kasus: Unit TI XYZ)." Jurnal Teknologi Informasi dan Ilmu Komputer 10, no. 2 (2023): 329–38. https://doi.org/10.25126/jtiik.20236507.
Full textAfiansyah, Hafizh Ghozie, Septia Ulfa Sunaringtyas, and Amiruddin Amiruddin. "Perancangan Rencana Pemulihan Bencana Menggunakan NIST SP 800-34 Rev 1, NIST SP 800-53 Rev 5 dan SNI 8799 (Studi Kasus: Unit TI XYZ)." Jurnal Teknologi Informasi dan Ilmu Komputer 10, no. 2 (2023): 329. http://dx.doi.org/10.25126/jtiik.20231026507.
Full textMaksymov, Anton. "Analysis of risk management standards and their application in IT projects." Management of Development of Complex Systems, no. 61 (March 28, 2025): 66–75. https://doi.org/10.32347/2412-9933.2025.61.66-75.
Full textAhmadi, Sina. "Cloud Security Metrics and Measurement." Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online) 2, no. 1 (2023): 93–108. http://dx.doi.org/10.60087/jklst.vol2.n1.p108.
Full textAhmadi, Sina. "Cloud Security Metrics and Measurement." Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online) 2, no. 1 (2023): 93–107. http://dx.doi.org/10.60087/jklst.vol2.n1.p107.
Full textSantosa, Iqbal, and Rahmat Mulyana. "Information Technology Risk Control of University in a Work from Home Situations." Journal of Information Systems and Informatics 4, no. 4 (2022): 1008–18. http://dx.doi.org/10.51519/journalisi.v4i4.393.
Full textManuja, Prashant, Rajveer Singh Shekhawat, and Umashankar Rawat. "Design & analysis of novel IT security framework for overcoming data security & privacy challenges." Journal of Discrete Mathematical Sciences & Cryptography 26, no. 3 (2023): 885–98. http://dx.doi.org/10.47974/jdmsc-1776.
Full textOkunlola, Folasade. "A Cyber-Physical Framework for Data Assurance and Emergency Response Readiness in Critical Energy Infrastructure." Journal of Engineering and Applied Sciences 4, no. 1 (2025): 1–10. https://doi.org/10.70560/6ag3wg21.
Full textIlori, Oluwatosin, Comfort Iyabode Lawal, Solomon Christopher Friday, Ngozi Joan Isibor, and Ezinne C. Chukwuma Eke. "Cybersecurity Auditing in the Digital Age: A Review of Methodologies and Regulatory Implications." Journal of Frontiers in Multidisciplinary Research 3, no. 1 (2022): 174–87. https://doi.org/10.54660/.ijfmr.2022.3.1.174-187.
Full textUvidia Armijo, Luis Alberto, María Cristina Montero Mora, Luis Enrique Guerrero Naranjo, and Jhoeel Hernán Uvidia Armijo. "Evaluación crítica de los riesgos de ciberseguridad en infraestructuras de transporte terrestre en Ecuador." Reincisol. 4, no. 7 (2025): 4148–65. https://doi.org/10.59282/reincisol.v4(7)4148-4165.
Full textLuh, Robert, Marlies Temper, Simon Tjoa, Sebastian Schrittwieser, and Helge Janicke. "PenQuest: a gamified attacker/defender meta model for cyber security assessment and education." Journal of Computer Virology and Hacking Techniques 16, no. 1 (2019): 19–61. http://dx.doi.org/10.1007/s11416-019-00342-x.
Full textRios, Erkuden, Angel Rego, Eider Iturbe, Marivi Higuero, and Xabier Larrucea. "Continuous Quantitative Risk Management in Smart Grids Using Attack Defense Trees." Sensors 20, no. 16 (2020): 4404. http://dx.doi.org/10.3390/s20164404.
Full textPotii, O. V., D. Yu Golubnychiy, Yu K. Vasiliev, and M. V. Yesina. "The process of declaring information security profiles." Radiotekhnika, no. 217 (June 14, 2024): 7–22. http://dx.doi.org/10.30837/rt.2024.2.217.01.
Full textBasheer, Nihala, Shareeful Islam, Mohammed K. S. Alwaheidi, and Spyridon Papastergiou. "Adoption of Deep-Learning Models for Managing Threat in API Calls with Transparency Obligation Practice for Overall Resilience." Sensors 24, no. 15 (2024): 4859. http://dx.doi.org/10.3390/s24154859.
Full textPrasanna Kumar Kandregula. "Building secure projects: Cybersecurity principles for every stage." International Journal of Science and Research Archive 15, no. 2 (2025): 723–32. https://doi.org/10.30574/ijsra.2025.15.2.1460.
Full textLubell, Joshua. "Baseline Tailor." Journal of Research of the National Institute of Standards and Technology 123 (June 26, 2018). http://dx.doi.org/10.6028/jres.123.007.
Full textFeng, Yongkang, Liang Yao, Hongli Zhou, et al. "High-throughput TRNG design with novelty adjustable TDC based on STR." ACM Transactions on Reconfigurable Technology and Systems, March 7, 2025. https://doi.org/10.1145/3722118.
Full textRuhur, Winayaka. "Perancangan dan Evaluasi Keamanan Modul IAM pada Arsitektur Microservice Menggunakan Keycloak." Indonesian Journal of Computer Science 14, no. 2 (2025). https://doi.org/10.33022/ijcs.v14i2.4854.
Full textGranata, Daniele, Michele Mastroianni, Massimiliano Rak, Pasquale Cantiello, and Giovanni Salzillo. "GDPR compliance through standard security controls: An automated approach." Journal of High Speed Networks, February 14, 2024, 1–28. http://dx.doi.org/10.3233/jhs-230080.
Full textLe, Minh. "AN ASSESTMENT MODEL FOR CYBER SECURITY OF VIETNAMESE ORGANIZATION." VNU Journal of Science: Policy and Management Studies 33, no. 2 (2017). http://dx.doi.org/10.25073/2588-1116/vnupam.4102.
Full textИхсанова, Б., Б. Бөрібаев та М. Сериккажина. "ЦИФРЛАНДЫРУ ЖАҒДАЙЫНДА ҰЙЫМДАРДЫҢ АҚПАРАТТЫҚ ҚАУІПСІЗДІК САЯСАТЫНЫҢ ТИІМДІЛІГІН БАҒАЛАУДЫҢ ӘДІСТЕМЕЛІК ТӘСІЛДЕРІН ТАЛДАУ". Вестник КазУТБ 2, № 27 (2025). https://doi.org/10.58805/kazutb.v.2.27-840.
Full textGnatyuk, Sergiy, Viktoriia Sydorenko, and Anatolii Skurativskyi. "CYBERSECURITY MANAGEMENT MODEL FOR SOFTWARE IMPLEMENTATION." Cybersecurity Education Science Technique, June 26, 2025, 715. https://doi.org/10.28925/2663-4023.2025.28.841.
Full text-, Suhas Hanumanthaiah. "SOX Considerations for Cloud Data Architecture: A Comprehensive Literature Review." International Journal on Science and Technology 16, no. 2 (2025). https://doi.org/10.71097/ijsat.v16.i2.6482.
Full textRios, Erkuden, Angel Rego, Eider Iturbe, Marivi Higuero, and Xabier Larrucea. "Continuous Quantitative Risk Management in Smart Grids Using Attack Defense Trees." August 7, 2020. https://doi.org/10.3390/s20164404.
Full text"Cybersecurity Risk Assessment Frameworks For Engineering Databases: A Systematic Literature Review." Strategic Data Management and Innovation 2, no. 01 (2025). https://doi.org/10.71292/sdmi.v2i01.22.
Full textShanmugavelan, Ramakrishnan. "Systematic Evaluation of Security Controls and Cybersecurity Program Enhancement: Bridging the Gap Between Theory and Practice." February 29, 2020. https://doi.org/10.5281/zenodo.11078473.
Full text