2022
DOI: 10.1016/j.cose.2022.102805
|View full text |Cite
|
Sign up to set email alerts
|

The nature of security: A conceptual framework for integral-comprehensive modeling of IT security and cybersecurity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0
1

Year Published

2022
2022
2025
2025

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 5 publications
0
1
0
1
Order By: Relevance
“…Interaction systems improve company productivity through IT infrastructure mediation. A resilient IT infrastructure guarantees an interaction system's stability and scalability, enabling worker collaboration and communication (Villalón-Fonseca, 2022). This capability helps organizations maximize the benefits of online collaboration platforms and virtual teams, enhancing resource allocation and operations.…”
Section: It Infrastructure As a Mediatormentioning
confidence: 99%
“…Interaction systems improve company productivity through IT infrastructure mediation. A resilient IT infrastructure guarantees an interaction system's stability and scalability, enabling worker collaboration and communication (Villalón-Fonseca, 2022). This capability helps organizations maximize the benefits of online collaboration platforms and virtual teams, enhancing resource allocation and operations.…”
Section: It Infrastructure As a Mediatormentioning
confidence: 99%
“…Ši žemėlapio sritis padengia bet koki ˛priemoniu ˛taikym ą ir sprendimu ˛integravim ą, laikom ą i ˛gyvendinimu infrastruktūroje arba programinėje i ˛rangoje, pradedant architektūros projektavimu ir baigiant veiklos palaikymu. Ši sritis remiasi IT sistemu ˛saugumu ir apima visus, su šiomis sistemomis s ąveikaujančius objektus [66] atsižvelgiant i ˛kibernetinio saugumo kontekst ą. Svarbu pabrėžti, kad projektavimas ir kūrimas neapsiriboja tik IT sistemomis, bet apima ir industrines valdymo sistemas. Be abejo, pavyzdžiui, inžinerijos procesuose [64] reikėtu ˛atsižvelgti i ˛SCADA saugumo ir IT saugumo skirtumus, pavyzdžiui, ryšiu ˛protokolus ir atsparumo grėsmėms tolerancijos lygius.…”
Section: Pav Ks Dimensijos Pagal Veiklasunclassified
“…A framework helps in providing knowledge in a structural manner enabling any organization or an individual to leverage it and apply it for their use case [28]. Successfully detecting a cyber threat usually requires knowledge on standard and common adversary practices, method to detect and mitigate the attacks.…”
Section: Attack Frameworkmentioning
confidence: 99%