Analysis of Cybersecurity Standard and Framework Components

Satisfactory cybersecurity protection, encompassing all data security solutions, can only be achieved by adopting a cybersecurity framework that provides a structure and methodology for protecting critical digital assets. In addition, security experts recommend using cybersecurity standards which co...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of communication networks and information security 2020-12, Vol.12 (3), p.417-432
Hauptverfasser: Syafrizal, Melwin, Selamat, Siti Rahayu, Zakaria, Nurul Azma
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 432
container_issue 3
container_start_page 417
container_title International journal of communication networks and information security
container_volume 12
creator Syafrizal, Melwin
Selamat, Siti Rahayu
Zakaria, Nurul Azma
description Satisfactory cybersecurity protection, encompassing all data security solutions, can only be achieved by adopting a cybersecurity framework that provides a structure and methodology for protecting critical digital assets. In addition, security experts recommend using cybersecurity standards which consist of a collection of best practices to protect organizations from cyber threats. However, many organizations, companies and governments lack experienced personnel in the cybersecurity domain, so they have difficulty adopting a standard approach or cybersecurity framework. Protecting organizations from cyber threats while demonstrating compliance with laws and standards is seen as extremely complex due to the difficulty on choosing the appropriate standard to be used. Moreover, lack of knowledge on the elements needed that offered by the standard is lead to the problem on identifying the started point where the protection will be began. Therefore, in this paper, a literature and the analysis is presented in identifying the elements of cybersecurity standard and framework that can be facilitate the organization or government on choosing the appropriate standard and framework to be used and utilized. The literature review was carried out to understand the various types of cybersecurity standards and frameworks and the analysis is conducted to identify the elements in each of them. In this paper, eight steps are presented and include the types of international standards, which are general, local regulation, as well as specific standards used in the industrial sector, to conclude the findings of the analysis. Furthermore, a relation map is presented using Writing a Literature Review release 2.0 approach to show the relationship between the literature review and future research.
format Article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_2483980790</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2483980790</sourcerecordid><originalsourceid>FETCH-LOGICAL-p98t-631908d9435bf8ee96dff534b1ba7c556aca7860f1fb1dcea51bd2afba51214d3</originalsourceid><addsrcrecordid>eNotjk9LwzAcQIM4cG5-h4Dnwi9N8w9PozgVBju4g7fxS5PA5tbUJEX67S3q6b3T492QZQ1KVmA43P46rySojztyn_MZQEoAsyRPmx4vUz5lGgNtJ-tT9t2YTmWi7wV7h8nRGXSb8Oq_Y_qkbbwOsfd9yWuyCHjJ_uGfK3LYPh_a12q3f3lrN7tqMLpUkjMD2pmGCxu090a6EARvLLOoOiEkdqi0hMCCZa7zKJh1NQY7S80ax1fk8S87pPg1-lyO5zimeTsf60Zzo0EZ4D-LfkWG</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2483980790</pqid></control><display><type>article</type><title>Analysis of Cybersecurity Standard and Framework Components</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Syafrizal, Melwin ; Selamat, Siti Rahayu ; Zakaria, Nurul Azma</creator><creatorcontrib>Syafrizal, Melwin ; Selamat, Siti Rahayu ; Zakaria, Nurul Azma</creatorcontrib><description>Satisfactory cybersecurity protection, encompassing all data security solutions, can only be achieved by adopting a cybersecurity framework that provides a structure and methodology for protecting critical digital assets. In addition, security experts recommend using cybersecurity standards which consist of a collection of best practices to protect organizations from cyber threats. However, many organizations, companies and governments lack experienced personnel in the cybersecurity domain, so they have difficulty adopting a standard approach or cybersecurity framework. Protecting organizations from cyber threats while demonstrating compliance with laws and standards is seen as extremely complex due to the difficulty on choosing the appropriate standard to be used. Moreover, lack of knowledge on the elements needed that offered by the standard is lead to the problem on identifying the started point where the protection will be began. Therefore, in this paper, a literature and the analysis is presented in identifying the elements of cybersecurity standard and framework that can be facilitate the organization or government on choosing the appropriate standard and framework to be used and utilized. The literature review was carried out to understand the various types of cybersecurity standards and frameworks and the analysis is conducted to identify the elements in each of them. In this paper, eight steps are presented and include the types of international standards, which are general, local regulation, as well as specific standards used in the industrial sector, to conclude the findings of the analysis. Furthermore, a relation map is presented using Writing a Literature Review release 2.0 approach to show the relationship between the literature review and future research.</description><identifier>ISSN: 2073-607X</identifier><identifier>EISSN: 2076-0930</identifier><language>eng</language><publisher>Kohat: Kohat University of Science and Technology (KUST)</publisher><subject>Best practice ; COVID-19 ; Cybersecurity ; Diabetes ; Electricity distribution ; Information technology ; Infrastructure ; Internet access ; Literature reviews ; Organizations ; Privacy ; Regulation ; Security management ; Social research ; Threats</subject><ispartof>International journal of communication networks and information security, 2020-12, Vol.12 (3), p.417-432</ispartof><rights>Copyright Kohat University of Science and Technology (KUST) Dec 2020</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784</link.rule.ids></links><search><creatorcontrib>Syafrizal, Melwin</creatorcontrib><creatorcontrib>Selamat, Siti Rahayu</creatorcontrib><creatorcontrib>Zakaria, Nurul Azma</creatorcontrib><title>Analysis of Cybersecurity Standard and Framework Components</title><title>International journal of communication networks and information security</title><description>Satisfactory cybersecurity protection, encompassing all data security solutions, can only be achieved by adopting a cybersecurity framework that provides a structure and methodology for protecting critical digital assets. In addition, security experts recommend using cybersecurity standards which consist of a collection of best practices to protect organizations from cyber threats. However, many organizations, companies and governments lack experienced personnel in the cybersecurity domain, so they have difficulty adopting a standard approach or cybersecurity framework. Protecting organizations from cyber threats while demonstrating compliance with laws and standards is seen as extremely complex due to the difficulty on choosing the appropriate standard to be used. Moreover, lack of knowledge on the elements needed that offered by the standard is lead to the problem on identifying the started point where the protection will be began. Therefore, in this paper, a literature and the analysis is presented in identifying the elements of cybersecurity standard and framework that can be facilitate the organization or government on choosing the appropriate standard and framework to be used and utilized. The literature review was carried out to understand the various types of cybersecurity standards and frameworks and the analysis is conducted to identify the elements in each of them. In this paper, eight steps are presented and include the types of international standards, which are general, local regulation, as well as specific standards used in the industrial sector, to conclude the findings of the analysis. Furthermore, a relation map is presented using Writing a Literature Review release 2.0 approach to show the relationship between the literature review and future research.</description><subject>Best practice</subject><subject>COVID-19</subject><subject>Cybersecurity</subject><subject>Diabetes</subject><subject>Electricity distribution</subject><subject>Information technology</subject><subject>Infrastructure</subject><subject>Internet access</subject><subject>Literature reviews</subject><subject>Organizations</subject><subject>Privacy</subject><subject>Regulation</subject><subject>Security management</subject><subject>Social research</subject><subject>Threats</subject><issn>2073-607X</issn><issn>2076-0930</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNotjk9LwzAcQIM4cG5-h4Dnwi9N8w9PozgVBju4g7fxS5PA5tbUJEX67S3q6b3T492QZQ1KVmA43P46rySojztyn_MZQEoAsyRPmx4vUz5lGgNtJ-tT9t2YTmWi7wV7h8nRGXSb8Oq_Y_qkbbwOsfd9yWuyCHjJ_uGfK3LYPh_a12q3f3lrN7tqMLpUkjMD2pmGCxu090a6EARvLLOoOiEkdqi0hMCCZa7zKJh1NQY7S80ax1fk8S87pPg1-lyO5zimeTsf60Zzo0EZ4D-LfkWG</recordid><startdate>20201201</startdate><enddate>20201201</enddate><creator>Syafrizal, Melwin</creator><creator>Selamat, Siti Rahayu</creator><creator>Zakaria, Nurul Azma</creator><general>Kohat University of Science and Technology (KUST)</general><scope>3V.</scope><scope>4T-</scope><scope>4U-</scope><scope>7RQ</scope><scope>7XB</scope><scope>88F</scope><scope>88I</scope><scope>88K</scope><scope>8AL</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>M0N</scope><scope>M1Q</scope><scope>M2P</scope><scope>M2T</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><scope>U9A</scope></search><sort><creationdate>20201201</creationdate><title>Analysis of Cybersecurity Standard and Framework Components</title><author>Syafrizal, Melwin ; Selamat, Siti Rahayu ; Zakaria, Nurul Azma</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p98t-631908d9435bf8ee96dff534b1ba7c556aca7860f1fb1dcea51bd2afba51214d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Best practice</topic><topic>COVID-19</topic><topic>Cybersecurity</topic><topic>Diabetes</topic><topic>Electricity distribution</topic><topic>Information technology</topic><topic>Infrastructure</topic><topic>Internet access</topic><topic>Literature reviews</topic><topic>Organizations</topic><topic>Privacy</topic><topic>Regulation</topic><topic>Security management</topic><topic>Social research</topic><topic>Threats</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Syafrizal, Melwin</creatorcontrib><creatorcontrib>Selamat, Siti Rahayu</creatorcontrib><creatorcontrib>Zakaria, Nurul Azma</creatorcontrib><collection>ProQuest Central (Corporate)</collection><collection>Docstoc</collection><collection>University Readers</collection><collection>Career &amp; Technical Education Database</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Military Database (Alumni Edition)</collection><collection>Science Database (Alumni Edition)</collection><collection>Telecommunications (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Computing Database</collection><collection>Military Database</collection><collection>Science Database</collection><collection>Telecommunications Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>International journal of communication networks and information security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Syafrizal, Melwin</au><au>Selamat, Siti Rahayu</au><au>Zakaria, Nurul Azma</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Analysis of Cybersecurity Standard and Framework Components</atitle><jtitle>International journal of communication networks and information security</jtitle><date>2020-12-01</date><risdate>2020</risdate><volume>12</volume><issue>3</issue><spage>417</spage><epage>432</epage><pages>417-432</pages><issn>2073-607X</issn><eissn>2076-0930</eissn><abstract>Satisfactory cybersecurity protection, encompassing all data security solutions, can only be achieved by adopting a cybersecurity framework that provides a structure and methodology for protecting critical digital assets. In addition, security experts recommend using cybersecurity standards which consist of a collection of best practices to protect organizations from cyber threats. However, many organizations, companies and governments lack experienced personnel in the cybersecurity domain, so they have difficulty adopting a standard approach or cybersecurity framework. Protecting organizations from cyber threats while demonstrating compliance with laws and standards is seen as extremely complex due to the difficulty on choosing the appropriate standard to be used. Moreover, lack of knowledge on the elements needed that offered by the standard is lead to the problem on identifying the started point where the protection will be began. Therefore, in this paper, a literature and the analysis is presented in identifying the elements of cybersecurity standard and framework that can be facilitate the organization or government on choosing the appropriate standard and framework to be used and utilized. The literature review was carried out to understand the various types of cybersecurity standards and frameworks and the analysis is conducted to identify the elements in each of them. In this paper, eight steps are presented and include the types of international standards, which are general, local regulation, as well as specific standards used in the industrial sector, to conclude the findings of the analysis. Furthermore, a relation map is presented using Writing a Literature Review release 2.0 approach to show the relationship between the literature review and future research.</abstract><cop>Kohat</cop><pub>Kohat University of Science and Technology (KUST)</pub><tpages>16</tpages></addata></record>
fulltext fulltext
identifier ISSN: 2073-607X
ispartof International journal of communication networks and information security, 2020-12, Vol.12 (3), p.417-432
issn 2073-607X
2076-0930
language eng
recordid cdi_proquest_journals_2483980790
source Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals
subjects Best practice
COVID-19
Cybersecurity
Diabetes
Electricity distribution
Information technology
Infrastructure
Internet access
Literature reviews
Organizations
Privacy
Regulation
Security management
Social research
Threats
title Analysis of Cybersecurity Standard and Framework Components
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-11T09%3A27%3A23IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Analysis%20of%20Cybersecurity%20Standard%20and%20Framework%20Components&rft.jtitle=International%20journal%20of%20communication%20networks%20and%20information%20security&rft.au=Syafrizal,%20Melwin&rft.date=2020-12-01&rft.volume=12&rft.issue=3&rft.spage=417&rft.epage=432&rft.pages=417-432&rft.issn=2073-607X&rft.eissn=2076-0930&rft_id=info:doi/&rft_dat=%3Cproquest%3E2483980790%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2483980790&rft_id=info:pmid/&rfr_iscdi=true