A survey of cybersecurity certification for the internet of things

SN Matheu, JL Hernandez-Ramos… - ACM Computing …, 2020 - dl.acm.org
In recent years, cybersecurity certification is gaining momentum as the baseline to build a
structured approach to mitigate cybersecurity risks in the Internet of Things (IoT). This …

Exiting the risk assessment maze: A meta-survey

D Gritzalis, G Iseppi, A Mylonas, V Stavrou - ACM Computing Surveys …, 2018 - dl.acm.org
Organizations are exposed to threats that increase the risk factor of their ICT systems. The
assurance of their protection is crucial, as their reliance on information technology is a …

Defining organisational information security culture—Perspectives from academia and industry

A Da Veiga, LV Astakhova, A Botha, M Herselman - Computers & Security, 2020 - Elsevier
The ideal or strong information security culture can aid in minimising the threat of humans to
information protection and thereby aid in reducing data breaches or incidents in …

A cyber-security culture framework for assessing organization readiness

A Georgiadou, S Mouzakitis, K Bounas… - Journal of Computer …, 2022 - Taylor & Francis
This paper presents a cyber-security culture framework for assessing and evaluating the
current security readiness of an organization's workforce. Having conducted a thorough …

A unified architectural approach for cyberattack-resilient industrial control systems

C Zhou, B Hu, Y Shi, YC Tian, X Li… - Proceedings of the …, 2020 - ieeexplore.ieee.org
With the rapid development of functional requirements in the emerging Industry 4.0 era,
modern industrial control systems (ICSs) are no longer isolated islands, making them more …

Security risk assessment in internet of things systems

JRC Nurse, S Creese, D De Roure - IT professional, 2017 - ieeexplore.ieee.org
Information security risk assessment methods have served us well over the past two
decades. They have provided a tool for organizations and governments to use in protecting …

Cyber risk management: History and future research directions

M Eling, M McShane, T Nguyen - Risk Management and …, 2021 - Wiley Online Library
Cybersecurity research started in the late 1960s and has continuously evolved under
different names such as computer security and information security. This article briefly …

Designing a GDPR compliant blockchain-based IoV distributed information tracking system

L Campanile, M Iacono, F Marulli… - Information Processing & …, 2021 - Elsevier
Blockchain technologies and distributed ledgers enable the design and implementation of
trustable data logging systems that can be used by multiple parties to produce a non …

Securing IoT devices using zero trust and blockchain

S Dhar, I Bose - Journal of Organizational Computing and …, 2021 - Taylor & Francis
The benefits ushered through the use of IoT come with its share of security concerns. IoT
networks are heterogeneous and existing network security tools and controls are …

Data breach management: An integrated risk model

F Khan, JH Kim, L Mathiassen, R Moore - Information & Management, 2021 - Elsevier
In response to organizations' increasing vulnerability to data breaches, we present an
integrated risk model for data breach management based on a systematic review of the …