2022
DOI: 10.3390/s22020538
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity Enterprises Policies: A Comparative Study

Abstract: Cybersecurity is a critical issue that must be prioritized not just by enterprises of all kinds, but also by national security. To safeguard an organization’s cyberenvironments, information, and communication technologies, many enterprises are investing substantially in cybersecurity these days. One part of the cyberdefense mechanism is building an enterprises’ security policies library, for consistent implementation of security controls. Significant and common cybersecurity policies of various enterprises are… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 26 publications
(20 citation statements)
references
References 118 publications
0
20
0
Order By: Relevance
“…Secondly, cyber security policy regarding SECA needs to be designed, implemented, and communicated to entire organizations. There are ten aspects involved in the policies taxonomy, including access control policy and privacy policy [41]. The current study is not without limitations.…”
Section: Discussionmentioning
confidence: 99%
“…Secondly, cyber security policy regarding SECA needs to be designed, implemented, and communicated to entire organizations. There are ten aspects involved in the policies taxonomy, including access control policy and privacy policy [41]. The current study is not without limitations.…”
Section: Discussionmentioning
confidence: 99%
“…35 Moreover, the creation of a system of rules and laws that manage various actions in the CC system to combat possible hazards is also considered a crucial characteristic. 4…”
Section: Related Workmentioning
confidence: 99%
“…The primary purpose is to make service delivery impossible by thwarting online firm or store access. It can be of many forms and depends upon the purpose of the attackers and the nature of the e-commerce firm or store ( Mishra et al, 2022 ). There are three main types of DDoS attacks ( Fruhlinger, 2022 ):…”
Section: Literature Reviewmentioning
confidence: 99%
“…But these developments have also brought some challenges to the industry ( Jennifer, 2022 ). One of the challenges is “the cyber security concern” in e-commerce ( Mishra et al, 2022 ) which is one of the most critical and common concerns it faces.…”
Section: Introductionmentioning
confidence: 99%