Abstract
Modern businesses are still thriving to achieve to a security level opting for cybersecurity, in the form of a cybersecurity management process (CMP), is detail at three levels. The first level focuses on the architectural and components of this CMP. The second level details the comprehensive view, and finally presents systems and complexity view. This work also proposes a cybersecurity management model, along with some challenging issues.
Highlights
The invention of computers and information system (IS), move the world in to a dynamic path, through an automation process, coupled with advancements in communication and networking
A business progress was initially proportional to the number of products/service it has produced, it is directly proportional to the number of secured IS it has
Threats come in a variety of ways, so it is very difficult to enumerate and categorize the types of threats; here we provide a broad spectrum of threats: Virus: This is a computer program/software, capable of altering the way the computer operates, without the permission or knowledge of the user
Summary
The invention of computers and information system (IS), move the world in to a dynamic path, through an automation process, coupled with advancements in communication and networking. Since it was not throwing enough light on the security aspects, IT departments cannot conduct proper risk management and mitigations on their own In view of their vulnerability modern businesses start focus towards securing their digital asserts like data, ISs, processes and methodologies, leaving a huge scope for cybersecurity. CMP is analyzed from three different perspectives: (A) Business driver guidance towards different cybersecurity activities (as part of risk management and information assurance process) (B) Upgradation of technology and its needed support and (C) Technology awareness and education among the employees across the organization. The cybersecurity is designated to be one among several management sub processes such as: Procurement, Transport, Warehouse management, Human resource, Marketing etc Each of these department involves various ISs to function, in variably tied up with CMP, across the organization. The entire procedures being continuous and cyclic go through a number of iterations, subject to the nature of the cyber theft
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.