A Strategic Framework for Managing Internet Security

被引:0
|
作者
Sitnikova, Elena [1 ]
Asgarkhani, Mehdi [2 ]
机构
[1] Univ S Australia, Sch IT & Math Sci, Adelaide, SA 5001, Australia
[2] CPIT, Dept Comp, Christchurch, New Zealand
来源
2014 11TH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (FSKD) | 2014年
关键词
Cyber Security; Internet Security; Risk Management; Strategic Security Management; SCADA Systems; Cloud Computing;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The internet which was originally developed as an open distributed system has since evolved to become a key platform for connectivity of businesses and communities. Today, the internet is used for transferring critical information amongst sophisticated systems. These systems extend beyond one business organization to community of customers and suppliers. Consequently, today, vulnerabilities and risks to the Internet are equally relevant to systems that are integrated within corporate networks. Cloud Computing solutions, Supervisory Control and Data Acquisition (SCADA) systems and the Bring Your Own Device (BYOD) approach adopted by some organizations are examples of complexity of managing Internet security today. These systems are not only vulnerable to own system specific issues but also threatened by other Internet-related vulnerabilities. Whilst numerous previous studies have identified the need for managing Internet security, there remains a need for taking a strategic approach in security management of the Internet and sensitive Industrial Control Systems (ICS) integrated systems. This paper examines research on Internet security using a risk management approach. It presents an overview of key issues and recommends a management framework for secure Internet access.
引用
收藏
页码:947 / 955
页数:9
相关论文
共 50 条
  • [31] A framework for specifying and managing security requirements in collaborative systems
    Yau, Stephen S.
    Chen, Zhaoji
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2006, 4158 : 500 - 510
  • [32] Managing leadership in a systems acquisition life cycle: A strategic framework
    Mishra, Harekrishna
    2006 IEEE INTERNATIONAL ENGINEERING MANAGEMENT CONFERENCE, 2006, : 84 - +
  • [33] Towards a framework for managing strategic tensions in dyadic interorganizational relationships
    van Fenema, Paul C.
    Loebbecke, Claudia
    SCANDINAVIAN JOURNAL OF MANAGEMENT, 2014, 30 (04) : 516 - 524
  • [34] A strategic framework for managing wastewater: A case study of Harare, Zimbabwe
    Nhapi, I
    Siebel, MA
    Gijzen, HJ
    WATER INTERNATIONAL, 2005, 30 (04) : 456 - 467
  • [35] Autonomy as a Strategic Dial: A Dynamic Framework for Managing Acquired Subsidiaries
    Lawton, Thomas C.
    Angwin, Duncan N.
    Dattee, Brice
    Arregle, Jean-Luc
    Barbieri, Paolo
    CALIFORNIA MANAGEMENT REVIEW, 2024, 66 (03) : 47 - 68
  • [36] Managing diabetes and COVID-19: A national strategic framework
    Mohan, Viswanathan
    Ramesh, Jagannathan
    INTERNATIONAL JOURNAL OF NONCOMMUNICABLE DISEASES, 2020, 5 (02) : 58 - 62
  • [37] LLSFIoT: Lightweight Logical Security Framework for Internet of Things
    Batra, Isha
    Hamatta, Hatem S. A.
    Malik, Arun
    Baz, Mohammed
    Albogamy, Fahad R.
    Goyal, Vishal
    Alshamrani, Sultan S.
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [38] Lightweight branched blockchain security framework for Internet of Vehicles
    Gupta, Manik
    Patel, Ram Bahadur
    Jain, Shaily
    Garg, Hitendra
    Sharma, Bhisham
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2023, 34 (11)
  • [39] Apparatus: A framework for security analysis in internet of things systems
    Mavropoulos, Orestis
    Mouratidis, Haralambos
    Fish, Andrew
    Panaousis, Emmanouil
    AD HOC NETWORKS, 2019, 92
  • [40] The Security for Power Internet of Things: Framework, Policies and Countermeasures
    Zhang, Yiying
    Zou, Weifu
    Chen, Xi
    Yang, Chengyue
    Cao, Jinping
    2014 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2014, : 139 - 142