2013
DOI: 10.1007/s10669-013-9484-z
|View full text |Cite
|
Sign up to set email alerts
|

Four domains of cybersecurity: a risk-based systems approach to cyber decisions

Abstract: With pervasive reliance on information technology, the robustness and security of these systems are critical to diverse infrastructure systems and particularly to resilience of industry, military, society, community, etc. As safeguards evolve and are implemented, adversaries develop novel ways to breach information technology systems, access sensitive data, and disrupt critical infrastructure. While significant advances in the field of cybersecurity have been achieved, solutions have focused more on the techni… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(10 citation statements)
references
References 10 publications
0
10
0
Order By: Relevance
“…The perception of the data, the analysis, and the way data is used in decision-making explain the Cognitive domain. Social domain deals with the norms, ethics, and policies of the organization and the broad social landscape (Collier et al, 2013). The technical implementation of different forms of security involves application security, information security, vulnerability management, network security, cloud security, cryptography, critical infrastructure security, etc.…”
Section: Domains In Cybersecuritymentioning
confidence: 99%
“…The perception of the data, the analysis, and the way data is used in decision-making explain the Cognitive domain. Social domain deals with the norms, ethics, and policies of the organization and the broad social landscape (Collier et al, 2013). The technical implementation of different forms of security involves application security, information security, vulnerability management, network security, cloud security, cryptography, critical infrastructure security, etc.…”
Section: Domains In Cybersecuritymentioning
confidence: 99%
“…• It allows incorporating the risk-based approach (of cybersecurity) [60], [61], [62] to cybersecurity activities.…”
Section: Cybersecurity Mastermentioning
confidence: 99%
“…• It allows the incorporation of the risk-based approach (related to cybersecurity) [75]- [78], so that cybersecurity risks requirements can be introduced in the tactical and operational cybersecurity management cycle.…”
Section: ) Bia Requirements For Asset Focus and Business Continuitymentioning
confidence: 99%