Managing cybersecurity

被引:0
|
作者
Cisco Systems [1 ]
不详 [2 ]
不详 [3 ]
机构
来源
IT Prof | 2007年 / 2卷 / 09期
关键词
D O I
10.1109/MITP.2007.33
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Managing Cybersecurity: Digital Footprint Threats
    Ketipov, Rumen
    Schnalle, Roman
    Doukovska, Lyubka
    Dehez, Dustin
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2024, 24 (03) : 151 - 162
  • [2] Managing Cybersecurity Risk Using Threat Based Methodology for Evaluation of Cybersecurity Architectures
    Bokan, Branko
    Santos, Joost
    2021 SYSTEMS AND INFORMATION ENGINEERING DESIGN SYMPOSIUM (IEEE SIEDS 2021), 2021, : 216 - 221
  • [3] Managing Cybersecurity Threats and Increasing Organizational Resilience
    Trim, Peter R. J.
    Lee, Yang-Im
    BIG DATA AND COGNITIVE COMPUTING, 2023, 7 (04)
  • [4] The Board's Role in Managing Cybersecurity Risks
    Rothrock, Ray A.
    Kaplan, James
    Van der Oord, Friso
    MIT SLOAN MANAGEMENT REVIEW, 2018, 59 (02) : 12 - 15
  • [5] A Framework for Managing Cybersecurity Effectiveness in the Digital Context
    Carcary, Marian
    Doherty, Eileen
    Conway, Gerry
    PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 78 - 86
  • [6] Cybersecurity Standards: Managing Risk and Creating Resilience
    Collier, Zachary A.
    Linkov, Igor
    DiMase, Daniel
    Walters, Steve
    Tehranipoor, Mark
    Lambert, James H.
    COMPUTER, 2014, 47 (09) : 70 - 76
  • [7] Managing cybersecurity at the grassroots: Evidence from the first nationwide survey of local government cybersecurity
    Norris, Donald F.
    Mateczun, Laura
    Joshi, Anupam
    Finin, Tim
    JOURNAL OF URBAN AFFAIRS, 2021, 43 (08) : 1173 - 1195
  • [8] Managing Large-Scale Heterogeneous Deployments for Cybersecurity
    Hurley, J. S.
    PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY ICCWS, 2023, : 145 - 151
  • [9] Managing Cybersecurity Research and Experimental Development: The REVO Approach
    Craigen, Dan
    Vandeth, Drew
    Walsh, D'Arcy
    TECHNOLOGY INNOVATION MANAGEMENT REVIEW, 2013, : 34 - 41
  • [10] Architecture for Managing Knowledge on Cybersecurity in Sub-Saharan Africa
    Andoh-Baidoo, Francis
    Osatuyi, Babajide
    Kunene, K. Niki
    INFORMATION TECHNOLOGY FOR DEVELOPMENT, 2014, 20 (02) : 140 - 164