security framework
Recently Published Documents





2022 ◽  
pp. 277-298
Laura Gooding ◽  
Lynsie Clott

2022 ◽  
pp. 39-55
Gregory B. White ◽  
Natalie Sjelin

With the increase in cybercrimes over the last few years, a growing realization for the need for cybersecurity has begun to be recognized by the nation. Unfortunately, being aware that cybersecurity is something you need to worry about and knowing what steps to take are two different things entirely. In the United States, the National Institute of Standards and Technology (NIST) developed the Cyber Security Framework (CSF) to assist critical infrastructures in determining what they need in order to secure their computer systems and networks. While aimed at organizations, much of the guidance provided by the CSF, especially the basic functions it identifies, are also valuable for communities attempting to put together a community cybersecurity program.

2022 ◽  
pp. 587-610
Kathick Raj Elangovan

In recent times, cyber-attacks have been a significant problem in any organization. It can damage the brand name if confidential data is compromised. A robust cybersecurity framework should be an essential aspect of any organization. This chapter talks about the security framework for cyber threats in supply chain management and discusses in detail the implementation of a secure environment through various controls. Today, a systematic method is used for handling sensitive information in an organization. It includes processes, people, and IT systems by implementing a risk management method. Distinct controls dedicated to different levels of domains, namely human resources, access control, asset management, cryptography, physical security, operations security, supplier relations, acquisition, incident management, and security governance are provided. Companies, contractors, and any others who are part of the supply chain organization must follow this security framework to defend from any cyber-attacks.

2021 ◽  
Vol 9 (12) ◽  
pp. 669-710
Dr.Yusuf Perwej ◽  
Syed Qamar Abbas ◽  
Jai Pratap Dixit ◽  
Dr. Nikhat Akhtar ◽  
Anurag Kumar Jaiswal

In recent years, the Internet has become an integral element of people's everyday lifestyles all across the world. Online criminality, on the other hand, has risen in tandem with the growth of Internet activity. Cyber security has advanced greatly in recent years in order to keep up with the rapid changes that occur in cyberspace. Cyber security refers to the methods that a country or organization can use to safeguard its products and information in cyberspace.  Two decades ago, the term "cyber security" was barely recognized by the general public. Cyber security isn't just a problem that affects individuals but it also applies to an organization or a government. Everything has recently been digitized, with cybernetics employing a variety of technologies such as cloud computing, smart phones, and Internet of Things techniques, among others. Cyber-attacks are raising concerns about privacy, security, and financial compensation. Cyber security is a set of technologies, processes, and practices aimed at preventing attacks, damage, and illegal access to networks, computers, programmes, and data.  The primary goal of this article is to conduct a thorough examination of cyber security kinds, why cyber security is important, cyber security framework, cyber security tools, and cyber security difficulties. Cyber security safeguards the data and integrity of computing assets that are part of or connected to an organization's network, with the goal of defending such assets from all threat actors throughout the life cycle of a cyber-attack.

2021 ◽  
pp. 154231662110683
Kelly E. Atkinson

Development policies advancing the Women, Peace and Security agenda enjoy an established trajectory across international organizations. This is evident within United Nations programs that engage displaced populations where children are particularly vulnerable to conflict dynamics. This article argues that existing gender-based development policies mitigate the impact of conflict on children through empowering displaced women as peacebuilding agents. Using United Nations data, fieldwork, and elite interviews, this article employs a case study of Iraq to show that the implementation of gender-based development policies correlates with reduced rates of grave violations against children in conflict settings. These findings point to the peacebuilding potential of displaced women through their ability to mitigate the economic and social impacts of conflict dynamics on children. Policy programs within the United Nations Women, Peace and Security framework should engage this connection between displaced women and the protection of children to strengthen and improve peacebuilding outcomes in conflict environments.

2021 ◽  
Vol 2021 ◽  
pp. 1-26
Jing Yang ◽  
Lianwei Qu ◽  
Yong Wang

With the collaborative collection of the Internet of Things (IoT) in multidomain, the collected data contains richer background knowledge. However, this puts forward new requirements for the security of data publishing. Furthermore, traditional statistical methods ignore the attributes sensitivity and the relationship between attributes, which makes multimodal statistics among attributes in multidomain fusion data set based on sensitivity difficult. To solve the above problems, this paper proposes a multidomain fusion data privacy security framework. First, based on attributes recognition, classification, and grading model, determine the attributes sensitivity and relationship between attributes to realize the multimode data statistics. Second, combine them with the different modal histograms to build multimodal histograms. Finally, we propose a privacy protection model to ensure the security of data publishing. The experimental analysis shows that the framework can not only build multimodal histograms of different microdomain attribute sets but also effectively reduce frequency query error.

2021 ◽  
Vol 25 (2) ◽  
pp. 485-516
Zoltán Szabó ◽  
Vilmos Bilicki

Since the advent of smartphones, IoT and cloud computing, we have seen an industry-wide requirement to integrate different healthcare applications with each other and with the cloud, connecting multiple institutions or even countries. But despite these trends, the domain of access control and security of sensitive healthcare data still raises a serious challenge for multiple developers and lacks the necessary definitions to create a general security framework addressing these issues. Taking into account newer, more special cases, such as the popular heterogeneous infrastructures with a combination of public and private clouds, fog computing, Internet of Things, the area becomes more and more complicated. In this paper we will introduce a categorization of these required policies, describe an infrastructure as a possible solution to these security challenges, and finally evaluate it with a set of policies based on real-world requirements.

Sign in / Sign up

Export Citation Format

Share Document