A Strategic Framework for Managing Internet Security

被引:0
|
作者
Sitnikova, Elena [1 ]
Asgarkhani, Mehdi [2 ]
机构
[1] Univ S Australia, Sch IT & Math Sci, Adelaide, SA 5001, Australia
[2] CPIT, Dept Comp, Christchurch, New Zealand
关键词
Cyber Security; Internet Security; Risk Management; Strategic Security Management; SCADA Systems; Cloud Computing;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The internet which was originally developed as an open distributed system has since evolved to become a key platform for connectivity of businesses and communities. Today, the internet is used for transferring critical information amongst sophisticated systems. These systems extend beyond one business organization to community of customers and suppliers. Consequently, today, vulnerabilities and risks to the Internet are equally relevant to systems that are integrated within corporate networks. Cloud Computing solutions, Supervisory Control and Data Acquisition (SCADA) systems and the Bring Your Own Device (BYOD) approach adopted by some organizations are examples of complexity of managing Internet security today. These systems are not only vulnerable to own system specific issues but also threatened by other Internet-related vulnerabilities. Whilst numerous previous studies have identified the need for managing Internet security, there remains a need for taking a strategic approach in security management of the Internet and sensitive Industrial Control Systems (ICS) integrated systems. This paper examines research on Internet security using a risk management approach. It presents an overview of key issues and recommends a management framework for secure Internet access.
引用
收藏
页码:947 / 955
页数:9
相关论文
共 50 条
  • [1] Internet of Things Security Framework
    Imam, Amira Hagag
    Azer, Marianne. A.
    [J]. 2017 13TH INTERNATIONAL COMPUTER ENGINEERING CONFERENCE (ICENCO), 2017, : 378 - 382
  • [2] A Security Framework for Internet of Things
    Bouij-Pasquier, Imane
    Abou El Kalam, Anas
    Ouahman, Abdellah Ait
    De Montfort, Mina
    [J]. CRYPTOLOGY AND NETWORK SECURITY, CANS 2015, 2015, 9476 : 19 - 31
  • [3] Managing Security Outsourcing in the Presence of Strategic Hackers
    Wu, Yong
    Duan, Junlin
    Dai, Tao
    Cheng, Dong
    [J]. DECISION ANALYSIS, 2020, 17 (03) : 235 - 259
  • [4] A Strategic Approach to Managing Security in SCADA Systems
    Asgarkhani, Mehdi
    Sitnikova, Elena
    [J]. PROCEEDINGS OF THE 13TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2014), 2014, : 23 - 32
  • [5] Strategic Security Resource Allocation for Internet of Things
    Rullo, Antonino
    Midi, Daniele
    Serra, Edoardo
    Bertino, Elisa
    [J]. PROCEEDINGS 2016 IEEE 36TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS ICDCS 2016, 2016, : 737 - 738
  • [6] Grid security framework for managing the certificate
    Oo, May Phyo
    Thein, Nilar
    Naing, Thinn Thu
    [J]. 2006 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE, (WI 2006 MAIN CONFERENCE PROCEEDINGS), 2006, : 166 - +
  • [7] SecIoT: a security framework for the Internet of Things
    Huang, Xin
    Craig, Paul
    Lin, Hangyu
    Yan, Zheng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3083 - 3094
  • [8] Towards a Framework for Strategic Security Context in Information Security Governance
    Maynard, Sean B.
    Tan, Terrence
    Ahmad, Atif
    Ruighaver, Tobias
    [J]. PACIFIC ASIA JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2018, 10 (04): : 65 - 88
  • [9] Managing dynamic security networks: Towards the strategic managing of cooperation, coordination and collaboration
    Chad Whelan
    [J]. Security Journal, 2017, 30 : 310 - 327
  • [10] Managing dynamic security networks: Towards the strategic managing of cooperation, coordination and collaboration
    Whelan, Chad
    [J]. SECURITY JOURNAL, 2017, 30 (01) : 310 - 327