2022
DOI: 10.1109/access.2022.3187211
|View full text |Cite
|
Sign up to set email alerts
|

How Do Organizations Seek Cyber Assurance? Investigations on the Adoption of the Common Criteria and Beyond

Abstract: Cyber assurance, which is the ability to operate under the onslaught of cyber attacks and other unexpected events, is essential for organizations facing inundating security threats on a daily basis. Organizations usually employ multiple strategies to conduct risk management to achieve cyber assurance. Utilizing cybersecurity standards and certifications can provide guidance for vendors to design and manufacture secure Information and Communication Technology (ICT) products as well as provide a level of assuran… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 8 publications
(13 citation statements)
references
References 42 publications
0
2
0
Order By: Relevance
“…The layered defense approach starts with a thorough assessment of an organization's security posture, including its resources and potential vulnerabilities, which guides future risk management practices and contributes to minimizing the threat exposure [113], [114].…”
Section: ) Assessingmentioning
confidence: 99%
“…The layered defense approach starts with a thorough assessment of an organization's security posture, including its resources and potential vulnerabilities, which guides future risk management practices and contributes to minimizing the threat exposure [113], [114].…”
Section: ) Assessingmentioning
confidence: 99%
“…[10], [11], [12], [16], [17]. In this regard one research identifies barriers to adopting cybersecurity [19], using a survey of 258 organizations.…”
Section: 2-factors That May Determine the Adoption Of Cybersecurity P...mentioning
confidence: 99%
“…On the other hand, there are works oriented to explore a set of techniques or tools through simulation or cases [13], [14], [14], [14], [18]. In this sense, the works that use sustainability reports [10], surveys of organizations [19], and literature review plus cases to generate a diagnosis [17] stand out.…”
Section: 2-factors That May Determine the Adoption Of Cybersecurity P...mentioning
confidence: 99%
See 1 more Smart Citation
“…Trust is the crucial factor for the successful introduction of new products, including Information and Communications Technology (ICT) [2]. With a trusted and secure computing environment, ICT systems and products will consistently behave in expected ways and protect the users against different security threats [3]. Those behaviors are usually enforced by hardware, software, and the security function of the products.…”
Section: Introductionmentioning
confidence: 99%