scholarly journals Information Security Maturity Model for Nist Cyber Security Framework

Author(s):  
Sultan Almuhammadi ◽  
Majeed Alsaleh

From the first community cybersecurity exercise the CIAS at UTSA conducted in San Antonio in 2002, information sharing has been a key element of the community cybersecurity program. Information sharing is essential in the protection and detection aspects of programs such as the NIST cyber security framework. Information sharing helps to alert other organizations to ongoing reconnaissance and attack efforts by attackers. When it comes to cybersecurity, organizations are not in competition with each other but instead are partners in a mutual defense against attackers. This has not been an easy lesson to learn, and it has taken time, but today, there are many robust information sharing programs that help various sectors and geographic regions to band together to help each other in efforts to thwart attacks against any member of the group. Information sharing is an integral part of the community cyber security maturity model and can in fact help provide a catalyst to launch an overall cybersecurity program for a community.


Communities and states are targets of cyber-attacks. Cities are popular because of generally lax cybersecurity postures and the fact that they have money. States and communities also have personal information on citizens, which can be used for identity theft. With the realization they are becoming frequent targets, communities are looking to enhance their cybersecurity programs, but many do not know where or how to start. The community cyber security maturity model is designed for this purpose – to help states and communities to develop their own viable and sustainable cybersecurity programs. There has also been considerable media attention on the NIST Cyber Security Framework. This is a program designed for organizations, and it contains a lot of good information organizations can use to enhance their cybersecurity posture. From a whole community perspective, however, it is not as useful though there are parts of it that are applicable to a community.


2018 ◽  
Vol 8 (1) ◽  
Author(s):  
Maheyzah Md Siraj

Information Assurance and Security (IAS) is a field of research that focus on the management and protection of knowledge, information and data. It combines two fields:Information assurance, which focuses on ensuring the availability, integrity, authentication, confidentiality, and non-repudiation of information and systems. These measures may include providing for restoration of information systems by incorporating protection, detection, and reaction capabilities.Information security, which emphasizes on the protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability.Information systems play an important role in the infrastructure that supports commerce, banking, telecommunications, health care, and national security, driving the need for qualified IAS specialists.This special issue is a platform for Master of Science (Information Security) students to publish their final year project/research findings. The papers published in this issue have been reviewed by at least 3 reviewers or lecturers in the area of IAS. The scopes of research area conducted by the students are:- Information Security Awareness, Evaluation, Maturity Model/Metamodel- Security Issues in Cloud- Spam Email/Review/Web Detection- Biometrics Recognition- Privacy Preserving Data Mining- Cyber Security Analytics and Visualization- Digital Forensics and Investigation- Others


2021 ◽  
Vol 46 ◽  
pp. 101232
Author(s):  
Mohammed Saeed Alkatheiri ◽  
Mohammed A. Alqarni ◽  
Sajjad Hussain Chauhdary

2021 ◽  
Vol 2 (2) ◽  
Author(s):  
Amutha Arunachalam ◽  
K. Seetharaman ◽  
Ashish Agarwal

Symmetry ◽  
2020 ◽  
Vol 12 (4) ◽  
pp. 664 ◽  
Author(s):  
Rajeev Kumar ◽  
Abhishek Kumar Pandey ◽  
Abdullah Baz ◽  
Hosam Alhakami ◽  
Wajdi Alhakami ◽  
...  

Growing concern about healthcare information security in the wake of alarmingly rising cyber-attacks is being given symmetrical priority by current researchers and cyber security experts. Intruders are penetrating symmetrical mechanisms of healthcare information security continuously. In the same league, the paper presents an overview on the current situation of healthcare information and presents a layered model of healthcare information management in organizations. The paper also evaluates the various factors that have a key contribution in healthcare information security breaches through a hybrid fuzzy-based symmetrical methodology of AHP-TOPSIS. Furthermore, for assessing the effect of the calculated results, the authors have tested the results on local hospital software of Varanasi. Tested results of the factors are validated through the comparison and sensitivity analysis in this study. Tabulated results of the proposed study propose a symmetrical mechanism as the most conversant technique which can be employed by the experts and researchers for preparing security guidelines and strategies.


Author(s):  
Tamar Makasarashvili ◽  
Tea Khorguashvili ◽  
Giuli Giguashvili ◽  
Aleksandre Sadagashvili

With the development of Internet technologies, cybercrime has also evolved and diversified. Much of the world's economic and business information comes from electronic information, and the need for remote work caused by the coronavirus (COVID-19) pandemic has further increased demand for e-services, which in turn has contributed to increased technology risks, threats, and incidents. The main task of the states is to actively fight against the negative socio-economic, financial, and political consequences caused by the growth of cybercrime. The main purpose of the study is to assess the negative consequences of cybercrime in Georgia, the main threats to information security, to develop recommendations for the prevention of cybercrime, to improve its legal regulation mechanisms. The fight against cybercrime in Georgia is carried out using criminal norms. The law "On Information Security" is in force in the country, Georgia's cyber security strategy has been developed, but this process needs constant development. The main task of the state is to gradually improve the legislation and bring it in line with modern technologies, to ensure close cooperation between the state and society, to raise the awareness of civil society. It is essential to constantly inform the public and companies about cyber threats, as effective prevention is the best form of crime prevention policy.


Sign in / Sign up

Export Citation Format

Share Document