Reengineering Cyber Security Process: A New Perspective on Cyber Security Quality Management

被引:1
|
作者
Sharbaf, Mehrdad S. [1 ]
机构
[1] Loyola Marymount Univ, Dept Comp Informat Syst, Los Angeles, CA 90045 USA
关键词
cyber security; reengineering cyber security; cyber security management; artificial intelligence; INFORMATION SECURITY;
D O I
10.1109/DASC/PiCom/CBDCom/CyberSciTech.2019.00068
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Information systems is greatly identified as the engine that drives and supports the U.S. and global economy, giving industry a strategic competitive advantage in global markets., enabling the federal government and agencies to collaborate among themselves, and building a 21st century digital government platform to provide better services to its citizens. The 21st century is the era age of digital information when information within corporation becomes an imperative important strategically and valuable resource than ever as the development of such field like business economics intelligent underlines it. But information systems are exposed to serious internal and external threats that can have adverse effects on organizational operations. Unfortunately, the complexity of security attacks, and lack of quality cyber security management implementation within organizations, and increased number of vulnerabilities, and lack of effectively protecting against the dynamically evolving attacks within organization networks have greatly increased over the past few years, even the best security mechanisms can be bypassed by professional hackers. This research article proposes, creates and develops a new perspective in cyber security management, and it introduces a new concept which is called Reengineering Cyber Security Process, and applies toward quality of cyber security management.
引用
收藏
页码:332 / 337
页数:6
相关论文
共 50 条
  • [21] Cyber Security - Security strategy for distribution management system and security architecture considerations
    Vittor, Timothy R.
    Sukumara, T.
    Sudarsan, S. D.
    Starck, Janne
    2017 70TH ANNUAL CONFERENCE FOR PROTECTIVE RELAY ENGINEERS (CPRE), 2017,
  • [22] Model-Driven Cyber Range Training: A Cyber Security Assurance Perspective
    Somarakis, Iason
    Smyrlis, Michail
    Fysarakis, Konstantinos
    Spanoudakis, George
    COMPUTER SECURITY: ESORICS 2019 INTERNATIONAL WORKSHOPS, IOSEC, MSTEC, AND FINSEC, 2020, 11981 : 172 - 184
  • [23] Cyber Security Competencies - Cyber Security Education and Research in Finnish Universities
    Lehto, Martti
    PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 2015, : 179 - 188
  • [24] National Cyber Security in South Africa: A Letter to the Minister of Cyber Security
    von Solms, Rossouw
    von Solms, Basie
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 369 - 374
  • [25] What kind of cyber security? Theorising cyber security and mapping approaches
    Fichtner, Laura
    INTERNET POLICY REVIEW, 2018, 7 (02):
  • [26] Cyber Security via Signaling Games: Toward a Science of Cyber Security
    Casey, William
    Morales, Jose A.
    Thomson Nguyen
    Spring, Jonathan
    Weaver, Rhiannon
    Wright, Evan
    Metcalf, Leigh
    Mishra, Bud
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2014, 2014, 8337 : 34 - 42
  • [27] What is 'Cyber Security'?: Differential Language of Cyber Security Across the Lifespan
    Jones, Simon L.
    Collins, Emily I. M.
    Levordashka, Ana
    Muir, Kate
    Joinson, Adam
    CHI EA '19 EXTENDED ABSTRACTS: EXTENDED ABSTRACTS OF THE 2019 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2019,
  • [28] Cyber-Security Incidents and Audit Quality
    Rosati, Pierangelo
    Gogolin, Fabian
    Lynn, Theo
    EUROPEAN ACCOUNTING REVIEW, 2022, 31 (03) : 701 - 728
  • [29] From information security to cyber security
    von Solms, Rossouw
    van Niekerk, Johan
    COMPUTERS & SECURITY, 2013, 38 : 97 - 102
  • [30] Importance of Cyber Security in Software Quality Assurance
    Haider, Ammar
    Bhatti, Wafa
    2022 17TH INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES (ICET'22), 2022, : 6 - 11