Reengineering Cyber Security Process: A New Perspective on Cyber Security Quality Management

被引:1
|
作者
Sharbaf, Mehrdad S. [1 ]
机构
[1] Loyola Marymount Univ, Dept Comp Informat Syst, Los Angeles, CA 90045 USA
关键词
cyber security; reengineering cyber security; cyber security management; artificial intelligence; INFORMATION SECURITY;
D O I
10.1109/DASC/PiCom/CBDCom/CyberSciTech.2019.00068
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Information systems is greatly identified as the engine that drives and supports the U.S. and global economy, giving industry a strategic competitive advantage in global markets., enabling the federal government and agencies to collaborate among themselves, and building a 21st century digital government platform to provide better services to its citizens. The 21st century is the era age of digital information when information within corporation becomes an imperative important strategically and valuable resource than ever as the development of such field like business economics intelligent underlines it. But information systems are exposed to serious internal and external threats that can have adverse effects on organizational operations. Unfortunately, the complexity of security attacks, and lack of quality cyber security management implementation within organizations, and increased number of vulnerabilities, and lack of effectively protecting against the dynamically evolving attacks within organization networks have greatly increased over the past few years, even the best security mechanisms can be bypassed by professional hackers. This research article proposes, creates and develops a new perspective in cyber security management, and it introduces a new concept which is called Reengineering Cyber Security Process, and applies toward quality of cyber security management.
引用
收藏
页码:332 / 337
页数:6
相关论文
共 50 条
  • [31] A new enhanced cyber security framework for medical cyber physical systems
    Priyadarshini, Ishaani
    Kumar, Raghvendra
    Tuan, Le Minh
    Son, Le Hoang
    Long, Hoang Viet
    Sharma, Rohit
    Rai, Sakshi
    SICS SOFTWARE-INTENSIVE CYBER-PHYSICAL SYSTEMS, 2021, 35 (3-4): : 159 - 183
  • [32] Introduction to the special issue on cyber security and management
    Sheldon, Frederick T.
    McDonald, J. Todd
    INFORMATION SYSTEMS AND E-BUSINESS MANAGEMENT, 2012, 10 (04) : 429 - 431
  • [33] Cyber Security Incident Management in the Aviation Domain
    Jaatun, Martin Gilje
    Koelle, Rainer
    PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, : 510 - 516
  • [34] Introduction to the special issue on cyber security and management
    Frederick T. Sheldon
    J. Todd McDonald
    Information Systems and e-Business Management, 2012, 10 : 429 - 431
  • [35] Standards for Cyber Security
    Purser, Steve
    BEST PRACTICES IN COMPUTER NETWORK DEFENSE: INCIDENT DETECTION AND RESPONSE, 2014, 35 : 97 - 106
  • [36] THREATS TO CYBER SECURITY
    Tudor, Ana-Maria
    LAW BETWEEN MODERNIZATION AND TRADITION - IMPLICATIONS FOR THE LEGAL, POLITICAL, ADMINISTRATIVE AND PUBLIC ORDER ORGANIZATION, 2015, : 659 - 664
  • [37] Is there a cyber security dilemma?
    Beckerman, Carly E.
    JOURNAL OF CYBERSECURITY, 2022, 8 (01):
  • [38] EU AND CYBER SECURITY
    Onescu, Dragos Ionut
    ELEARNING VISION 2020!, VOL I, 2016, : 436 - 441
  • [39] The Economics Of Cyber Security
    Mills, Peter
    FORBES, 2013, 192 (09): : 137 - +
  • [40] NATO AND CYBER SECURITY
    Kazakovtsev, A. V.
    VOLGOGRADSKII GOSUDARSTVENNYI UNIVERSITET-VESTNIK-SERIYA 4-ISTORIYA REGIONOVEDENIE MEZHDUNARODNYE OTNOSHENIYA, 2012, 17 (02): : 109 - 114