A survey of cybersecurity certification for the internet of things
In recent years, cybersecurity certification is gaining momentum as the baseline to build a
structured approach to mitigate cybersecurity risks in the Internet of Things (IoT). This …
structured approach to mitigate cybersecurity risks in the Internet of Things (IoT). This …
Exiting the risk assessment maze: A meta-survey
Organizations are exposed to threats that increase the risk factor of their ICT systems. The
assurance of their protection is crucial, as their reliance on information technology is a …
assurance of their protection is crucial, as their reliance on information technology is a …
Defining organisational information security culture—Perspectives from academia and industry
The ideal or strong information security culture can aid in minimising the threat of humans to
information protection and thereby aid in reducing data breaches or incidents in …
information protection and thereby aid in reducing data breaches or incidents in …
A cyber-security culture framework for assessing organization readiness
A Georgiadou, S Mouzakitis, K Bounas… - Journal of Computer …, 2022 - Taylor & Francis
This paper presents a cyber-security culture framework for assessing and evaluating the
current security readiness of an organization's workforce. Having conducted a thorough …
current security readiness of an organization's workforce. Having conducted a thorough …
A unified architectural approach for cyberattack-resilient industrial control systems
With the rapid development of functional requirements in the emerging Industry 4.0 era,
modern industrial control systems (ICSs) are no longer isolated islands, making them more …
modern industrial control systems (ICSs) are no longer isolated islands, making them more …
Security risk assessment in internet of things systems
Information security risk assessment methods have served us well over the past two
decades. They have provided a tool for organizations and governments to use in protecting …
decades. They have provided a tool for organizations and governments to use in protecting …
Cyber risk management: History and future research directions
Cybersecurity research started in the late 1960s and has continuously evolved under
different names such as computer security and information security. This article briefly …
different names such as computer security and information security. This article briefly …
Designing a GDPR compliant blockchain-based IoV distributed information tracking system
Blockchain technologies and distributed ledgers enable the design and implementation of
trustable data logging systems that can be used by multiple parties to produce a non …
trustable data logging systems that can be used by multiple parties to produce a non …
Securing IoT devices using zero trust and blockchain
S Dhar, I Bose - Journal of Organizational Computing and …, 2021 - Taylor & Francis
The benefits ushered through the use of IoT come with its share of security concerns. IoT
networks are heterogeneous and existing network security tools and controls are …
networks are heterogeneous and existing network security tools and controls are …
Data breach management: An integrated risk model
In response to organizations' increasing vulnerability to data breaches, we present an
integrated risk model for data breach management based on a systematic review of the …
integrated risk model for data breach management based on a systematic review of the …