2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC) 2012
DOI: 10.1109/icsmc.2012.6377977
|View full text |Cite
|
Sign up to set email alerts
|

IT risk management framework for business continuity by change analysis of information system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 1 publication
0
3
0
Order By: Relevance
“…Existing literature has examined the potential benefits of cyber defense exercises. One another benefit of cyber defense exercise that can be instrumented to generate scientifically valuable modern labeled datasets for future security research [23,24] and help uncover gaps in IT Security policies, plans and procedures [25]. It was claimed that [26] cyber exercises can be developed with a focus on measuring performance against specific standards.…”
Section: Patriciu and Furtunamentioning
confidence: 99%
“…Existing literature has examined the potential benefits of cyber defense exercises. One another benefit of cyber defense exercise that can be instrumented to generate scientifically valuable modern labeled datasets for future security research [23,24] and help uncover gaps in IT Security policies, plans and procedures [25]. It was claimed that [26] cyber exercises can be developed with a focus on measuring performance against specific standards.…”
Section: Patriciu and Furtunamentioning
confidence: 99%
“…CSE has been identified as an effective technique to stimulate cyber security awareness [16], which provides opportunities and an ultimate learning experience [3] for the students or cyber professionals to improve their skills in protecting and defending information systems in the context of a realistic, true-to-life situation [6]. It helps uncover gaps in organizational security policies, procedures, and resources [12], [21], from which employees of an organization can be provided necessary training and/or tools and policies can be rectified too [34]. The growing demand for cyber security professionals with practical knowledge [38] is boosting the development and conduct of different types of CSE around the world.…”
Section: Introductionmentioning
confidence: 99%
“…[5], [6] (2) A study on methods for collecting business continuity information in order to implement a BCM framework [7] (3) A study on effective measures in business continuity [8] (4) A study on standards for prioritizing risks [9] However, very few detailed studies have examined methods of determining appropriate incident response measures based on risk analysis. [5] In addition, no studies could be identified that examined the different response sequences which could result from initial incidents.…”
Section: Related Workmentioning
confidence: 99%