2017
DOI: 10.9770/jesi.2017.4.4(12)
|View full text |Cite
|
Sign up to set email alerts
|

Cyber security management model for critical infrastructure

Abstract: Cyber security is the most critical aspect nowadays of our technologically based lives. Government institutions, banking sectors, public and private services, nuclear power plants, power grid operators, water suppliers or waste water treatment companies use information technologies in their day-to-day operations. Everything that uses technologies are based on communication and information systems and that means that it depends on cyber security. The public and private sector each year spend millions of dollars… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
47
0
22

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 44 publications
(70 citation statements)
references
References 11 publications
(14 reference statements)
1
47
0
22
Order By: Relevance
“…While not being able to develop a precise degree of accuracy or to classify the framework for "best application", it is, however, possible to highlight the best solutions to the issues in CEI. To develop an effective cybersecurity model, the structure that will be taken into consideration will be the one described by Limba & Pleta (Limba et al 2017 IRD.2020.2.2(3) legal regulation, meaning that there are legal proceedings and requirements about cybersecurity, good governance, which means that the main aims of cybersecurity need to be understood (including the fact that some risks could never be excluded) (Limba et al 2017). However, the most important dimensions taken into the analysis will be risk management, security culture, as the organization is "as vulnerable as the people working there", technology management and incident management (Limba et al 2017).…”
Section: Recommendations For a Possible Framework And Conclusionmentioning
confidence: 99%
See 2 more Smart Citations
“…While not being able to develop a precise degree of accuracy or to classify the framework for "best application", it is, however, possible to highlight the best solutions to the issues in CEI. To develop an effective cybersecurity model, the structure that will be taken into consideration will be the one described by Limba & Pleta (Limba et al 2017 IRD.2020.2.2(3) legal regulation, meaning that there are legal proceedings and requirements about cybersecurity, good governance, which means that the main aims of cybersecurity need to be understood (including the fact that some risks could never be excluded) (Limba et al 2017). However, the most important dimensions taken into the analysis will be risk management, security culture, as the organization is "as vulnerable as the people working there", technology management and incident management (Limba et al 2017).…”
Section: Recommendations For a Possible Framework And Conclusionmentioning
confidence: 99%
“…For what concerns the risk management, it is described as the ability to properly identify risks ad ensuring that they are being taken care of by specialists (Limba et al 2017). The document that provided the most adequate guidelines for a hypothetical CEI framework is the NERC Implementation Guidance for CIP-008-6.…”
Section: Recommendations For a Possible Framework And Conclusionmentioning
confidence: 99%
See 1 more Smart Citation
“…By making your team aware of their responsibilities and the consequences of mistakes and negative behavior you can create a culture of accountability. This also has the more positive effect of highlighting any issues that exist before they develop into full problems which can then be dealt with training or increased monitoring [11].…”
Section: Create a Data Protection Policymentioning
confidence: 99%
“…Cybersecurity is a very important aspect of the digital development that every country around the globe aims to achieve [1]. In order to offer new online applications and remote services to citizens, these must be secured and robust to several attacks.…”
Section: Introductionmentioning
confidence: 99%