全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Cybersecurity Requirements for Management Information Systems

DOI: 10.4236/jis.2023.143013, PP. 212-226

Keywords: Cybersecurity, Security, Information Systems

Full-Text   Cite this paper   Add to My Lib

Abstract:

Cybersecurity is therefore one of the most important elements of security in developed countries. Especially since there is an overall trend towards cybersecurity in all aspects of life, I have found that the idea of cybersecurity is based on protecting critical facilities: The nation’s information infrastructure. Information systems, including e-government management systems, are managed by key state agencies. As with economic, scientific, commercial, and other systems, threats are threats to a nation’s national security. We have therefore found that many countries are preparing institutions capable of integrating cybersecurity into protection, development, and information security. This concept has become the most important concern of developed countries, which have secured all scientific possibilities and systems to achieve it. The electronic information network has become an integral part of today’s daily lives in all places. In addition to personal uses, digital information is used, processed, stored, and shared. As this information increases and spreads, we have found that its protection has become more vital and has an effective impact on national security and technical progress.

References

[1]  El Hissi, Y. and Arezki, S. (2018) Conceptualization of an Information System Governance Model Dedicated to the Governance of Scientific Research in Moroccan University. 2018 4th International Conference on Computer and Technology Applications (ICCTA), Istanbul, 3-5 May 2018, 54-58.
https://doi.org/10.1109/CATA.2018.8398655
[2]  Rehman, H., Masood, A. and Cheema, A. (2013) Information Security Management in Academic Institutes of Pakistan. 2nd National Conference of Information Assurance (NCIA), Rawalpindi, 11-12 December 2013, 47-51.
https://doi.org/10.1109/NCIA.2013.6725323
[3]  Anton, I. and Mamedov, O. (2017) The Return of Mamba Ransomware Secure List-Information about Viruses, Hackers and Spam.
[4]  Brotby, K. (2009) Information Security Governance: A Practical Development and Implementation Approach (Vol. 53).
[5]  Security for Industrial Automation and Control Systems: Establishing an Industrial 900 Automation and Control Systems Security Program.
[6]  Force, J.T. and Initiative, T. (2013) Security and Privacy Controls for Federal Information Systems and Organizations. NIST Special Publication, 800, 8-13.
[7]  Center for Internet Security (CIS) Critical Security Controls for Effective Cyber Defense (CSC).
https://www.cisecurity.org 899.
[8]  National Institute of Standards and Technology (NIST) Framework for Improving Critical Infrastructure Cybersecurity V1.1.
[9]  Draft NIST Special Publication 800-181 NICE Cybersecurity Workforce Framework (NCWF) National Initiative for Cybersecurity Education (NICE).
[10]  Control Objectives for Information and Related Technology (COBIT).
https://www.isaca.org/resources/cobit

Full-Text

comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133

WeChat 1538708413