Analysis of Cybersecurity Standard and Framework Components
Satisfactory cybersecurity protection, encompassing all data security solutions, can only be achieved by adopting a cybersecurity framework that provides a structure and methodology for protecting critical digital assets. In addition, security experts recommend using cybersecurity standards which co...
Gespeichert in:
Veröffentlicht in: | International journal of communication networks and information security 2020-12, Vol.12 (3), p.417-432 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 432 |
---|---|
container_issue | 3 |
container_start_page | 417 |
container_title | International journal of communication networks and information security |
container_volume | 12 |
creator | Syafrizal, Melwin Selamat, Siti Rahayu Zakaria, Nurul Azma |
description | Satisfactory cybersecurity protection, encompassing all data security solutions, can only be achieved by adopting a cybersecurity framework that provides a structure and methodology for protecting critical digital assets. In addition, security experts recommend using cybersecurity standards which consist of a collection of best practices to protect organizations from cyber threats. However, many organizations, companies and governments lack experienced personnel in the cybersecurity domain, so they have difficulty adopting a standard approach or cybersecurity framework. Protecting organizations from cyber threats while demonstrating compliance with laws and standards is seen as extremely complex due to the difficulty on choosing the appropriate standard to be used. Moreover, lack of knowledge on the elements needed that offered by the standard is lead to the problem on identifying the started point where the protection will be began. Therefore, in this paper, a literature and the analysis is presented in identifying the elements of cybersecurity standard and framework that can be facilitate the organization or government on choosing the appropriate standard and framework to be used and utilized. The literature review was carried out to understand the various types of cybersecurity standards and frameworks and the analysis is conducted to identify the elements in each of them. In this paper, eight steps are presented and include the types of international standards, which are general, local regulation, as well as specific standards used in the industrial sector, to conclude the findings of the analysis. Furthermore, a relation map is presented using Writing a Literature Review release 2.0 approach to show the relationship between the literature review and future research. |
format | Article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_2483980790</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2483980790</sourcerecordid><originalsourceid>FETCH-LOGICAL-p98t-631908d9435bf8ee96dff534b1ba7c556aca7860f1fb1dcea51bd2afba51214d3</originalsourceid><addsrcrecordid>eNotjk9LwzAcQIM4cG5-h4Dnwi9N8w9PozgVBju4g7fxS5PA5tbUJEX67S3q6b3T492QZQ1KVmA43P46rySojztyn_MZQEoAsyRPmx4vUz5lGgNtJ-tT9t2YTmWi7wV7h8nRGXSb8Oq_Y_qkbbwOsfd9yWuyCHjJ_uGfK3LYPh_a12q3f3lrN7tqMLpUkjMD2pmGCxu090a6EARvLLOoOiEkdqi0hMCCZa7zKJh1NQY7S80ax1fk8S87pPg1-lyO5zimeTsf60Zzo0EZ4D-LfkWG</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2483980790</pqid></control><display><type>article</type><title>Analysis of Cybersecurity Standard and Framework Components</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Syafrizal, Melwin ; Selamat, Siti Rahayu ; Zakaria, Nurul Azma</creator><creatorcontrib>Syafrizal, Melwin ; Selamat, Siti Rahayu ; Zakaria, Nurul Azma</creatorcontrib><description>Satisfactory cybersecurity protection, encompassing all data security solutions, can only be achieved by adopting a cybersecurity framework that provides a structure and methodology for protecting critical digital assets. In addition, security experts recommend using cybersecurity standards which consist of a collection of best practices to protect organizations from cyber threats. However, many organizations, companies and governments lack experienced personnel in the cybersecurity domain, so they have difficulty adopting a standard approach or cybersecurity framework. Protecting organizations from cyber threats while demonstrating compliance with laws and standards is seen as extremely complex due to the difficulty on choosing the appropriate standard to be used. Moreover, lack of knowledge on the elements needed that offered by the standard is lead to the problem on identifying the started point where the protection will be began. Therefore, in this paper, a literature and the analysis is presented in identifying the elements of cybersecurity standard and framework that can be facilitate the organization or government on choosing the appropriate standard and framework to be used and utilized. The literature review was carried out to understand the various types of cybersecurity standards and frameworks and the analysis is conducted to identify the elements in each of them. In this paper, eight steps are presented and include the types of international standards, which are general, local regulation, as well as specific standards used in the industrial sector, to conclude the findings of the analysis. Furthermore, a relation map is presented using Writing a Literature Review release 2.0 approach to show the relationship between the literature review and future research.</description><identifier>ISSN: 2073-607X</identifier><identifier>EISSN: 2076-0930</identifier><language>eng</language><publisher>Kohat: Kohat University of Science and Technology (KUST)</publisher><subject>Best practice ; COVID-19 ; Cybersecurity ; Diabetes ; Electricity distribution ; Information technology ; Infrastructure ; Internet access ; Literature reviews ; Organizations ; Privacy ; Regulation ; Security management ; Social research ; Threats</subject><ispartof>International journal of communication networks and information security, 2020-12, Vol.12 (3), p.417-432</ispartof><rights>Copyright Kohat University of Science and Technology (KUST) Dec 2020</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784</link.rule.ids></links><search><creatorcontrib>Syafrizal, Melwin</creatorcontrib><creatorcontrib>Selamat, Siti Rahayu</creatorcontrib><creatorcontrib>Zakaria, Nurul Azma</creatorcontrib><title>Analysis of Cybersecurity Standard and Framework Components</title><title>International journal of communication networks and information security</title><description>Satisfactory cybersecurity protection, encompassing all data security solutions, can only be achieved by adopting a cybersecurity framework that provides a structure and methodology for protecting critical digital assets. In addition, security experts recommend using cybersecurity standards which consist of a collection of best practices to protect organizations from cyber threats. However, many organizations, companies and governments lack experienced personnel in the cybersecurity domain, so they have difficulty adopting a standard approach or cybersecurity framework. Protecting organizations from cyber threats while demonstrating compliance with laws and standards is seen as extremely complex due to the difficulty on choosing the appropriate standard to be used. Moreover, lack of knowledge on the elements needed that offered by the standard is lead to the problem on identifying the started point where the protection will be began. Therefore, in this paper, a literature and the analysis is presented in identifying the elements of cybersecurity standard and framework that can be facilitate the organization or government on choosing the appropriate standard and framework to be used and utilized. The literature review was carried out to understand the various types of cybersecurity standards and frameworks and the analysis is conducted to identify the elements in each of them. In this paper, eight steps are presented and include the types of international standards, which are general, local regulation, as well as specific standards used in the industrial sector, to conclude the findings of the analysis. Furthermore, a relation map is presented using Writing a Literature Review release 2.0 approach to show the relationship between the literature review and future research.</description><subject>Best practice</subject><subject>COVID-19</subject><subject>Cybersecurity</subject><subject>Diabetes</subject><subject>Electricity distribution</subject><subject>Information technology</subject><subject>Infrastructure</subject><subject>Internet access</subject><subject>Literature reviews</subject><subject>Organizations</subject><subject>Privacy</subject><subject>Regulation</subject><subject>Security management</subject><subject>Social research</subject><subject>Threats</subject><issn>2073-607X</issn><issn>2076-0930</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNotjk9LwzAcQIM4cG5-h4Dnwi9N8w9PozgVBju4g7fxS5PA5tbUJEX67S3q6b3T492QZQ1KVmA43P46rySojztyn_MZQEoAsyRPmx4vUz5lGgNtJ-tT9t2YTmWi7wV7h8nRGXSb8Oq_Y_qkbbwOsfd9yWuyCHjJ_uGfK3LYPh_a12q3f3lrN7tqMLpUkjMD2pmGCxu090a6EARvLLOoOiEkdqi0hMCCZa7zKJh1NQY7S80ax1fk8S87pPg1-lyO5zimeTsf60Zzo0EZ4D-LfkWG</recordid><startdate>20201201</startdate><enddate>20201201</enddate><creator>Syafrizal, Melwin</creator><creator>Selamat, Siti Rahayu</creator><creator>Zakaria, Nurul Azma</creator><general>Kohat University of Science and Technology (KUST)</general><scope>3V.</scope><scope>4T-</scope><scope>4U-</scope><scope>7RQ</scope><scope>7XB</scope><scope>88F</scope><scope>88I</scope><scope>88K</scope><scope>8AL</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>M0N</scope><scope>M1Q</scope><scope>M2P</scope><scope>M2T</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><scope>U9A</scope></search><sort><creationdate>20201201</creationdate><title>Analysis of Cybersecurity Standard and Framework Components</title><author>Syafrizal, Melwin ; Selamat, Siti Rahayu ; Zakaria, Nurul Azma</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p98t-631908d9435bf8ee96dff534b1ba7c556aca7860f1fb1dcea51bd2afba51214d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Best practice</topic><topic>COVID-19</topic><topic>Cybersecurity</topic><topic>Diabetes</topic><topic>Electricity distribution</topic><topic>Information technology</topic><topic>Infrastructure</topic><topic>Internet access</topic><topic>Literature reviews</topic><topic>Organizations</topic><topic>Privacy</topic><topic>Regulation</topic><topic>Security management</topic><topic>Social research</topic><topic>Threats</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Syafrizal, Melwin</creatorcontrib><creatorcontrib>Selamat, Siti Rahayu</creatorcontrib><creatorcontrib>Zakaria, Nurul Azma</creatorcontrib><collection>ProQuest Central (Corporate)</collection><collection>Docstoc</collection><collection>University Readers</collection><collection>Career & Technical Education Database</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Military Database (Alumni Edition)</collection><collection>Science Database (Alumni Edition)</collection><collection>Telecommunications (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Computing Database</collection><collection>Military Database</collection><collection>Science Database</collection><collection>Telecommunications Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>International journal of communication networks and information security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Syafrizal, Melwin</au><au>Selamat, Siti Rahayu</au><au>Zakaria, Nurul Azma</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Analysis of Cybersecurity Standard and Framework Components</atitle><jtitle>International journal of communication networks and information security</jtitle><date>2020-12-01</date><risdate>2020</risdate><volume>12</volume><issue>3</issue><spage>417</spage><epage>432</epage><pages>417-432</pages><issn>2073-607X</issn><eissn>2076-0930</eissn><abstract>Satisfactory cybersecurity protection, encompassing all data security solutions, can only be achieved by adopting a cybersecurity framework that provides a structure and methodology for protecting critical digital assets. In addition, security experts recommend using cybersecurity standards which consist of a collection of best practices to protect organizations from cyber threats. However, many organizations, companies and governments lack experienced personnel in the cybersecurity domain, so they have difficulty adopting a standard approach or cybersecurity framework. Protecting organizations from cyber threats while demonstrating compliance with laws and standards is seen as extremely complex due to the difficulty on choosing the appropriate standard to be used. Moreover, lack of knowledge on the elements needed that offered by the standard is lead to the problem on identifying the started point where the protection will be began. Therefore, in this paper, a literature and the analysis is presented in identifying the elements of cybersecurity standard and framework that can be facilitate the organization or government on choosing the appropriate standard and framework to be used and utilized. The literature review was carried out to understand the various types of cybersecurity standards and frameworks and the analysis is conducted to identify the elements in each of them. In this paper, eight steps are presented and include the types of international standards, which are general, local regulation, as well as specific standards used in the industrial sector, to conclude the findings of the analysis. Furthermore, a relation map is presented using Writing a Literature Review release 2.0 approach to show the relationship between the literature review and future research.</abstract><cop>Kohat</cop><pub>Kohat University of Science and Technology (KUST)</pub><tpages>16</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2073-607X |
ispartof | International journal of communication networks and information security, 2020-12, Vol.12 (3), p.417-432 |
issn | 2073-607X 2076-0930 |
language | eng |
recordid | cdi_proquest_journals_2483980790 |
source | Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals |
subjects | Best practice COVID-19 Cybersecurity Diabetes Electricity distribution Information technology Infrastructure Internet access Literature reviews Organizations Privacy Regulation Security management Social research Threats |
title | Analysis of Cybersecurity Standard and Framework Components |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-11T09%3A27%3A23IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Analysis%20of%20Cybersecurity%20Standard%20and%20Framework%20Components&rft.jtitle=International%20journal%20of%20communication%20networks%20and%20information%20security&rft.au=Syafrizal,%20Melwin&rft.date=2020-12-01&rft.volume=12&rft.issue=3&rft.spage=417&rft.epage=432&rft.pages=417-432&rft.issn=2073-607X&rft.eissn=2076-0930&rft_id=info:doi/&rft_dat=%3Cproquest%3E2483980790%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2483980790&rft_id=info:pmid/&rfr_iscdi=true |