Defining security requirements with the common criteria: Applications, adoptions, and challenges

N Sun, CT Li, H Chan, BD Le, MZ Islam… - IEEE …, 2022 - ieeexplore.ieee.org
Advances in emerging Information and Communications Technology (ICT) technologies
push the boundaries of what is possible and open up new markets for innovative ICT …

Building an international security standard

K Caplan, JL Sanders - IT professional, 1999 - ieeexplore.ieee.org
The Common Criteria for Information Technology Security Evaluation standard (CC)
promises to replace scattered and often conflicting regional and national security standards …

Review of cybersecurity assessment methods: Applicability perspective

R Leszczyna - Computers & Security, 2021 - Elsevier
Cybersecurity assessments are crucial in building the assurance that vital cyberassets are
effectively protected from threats. Multiple assessment methods have been proposed during …

Understanding cybersecurity frameworks and information security standards—a review and comprehensive overview

H Taherdoost - Electronics, 2022 - mdpi.com
Businesses are reliant on data to survive in the competitive market, and data is constantly in
danger of loss or theft. Loss of valuable data leads to negative consequences for both …

[PDF][PDF] A proposal for a European cybersecurity taxonomy

I Nai-Fovino, R Neisse… - Publications Office of …, 2019 - researchgate.net
The Commission made a commitment in the Communication adopted in September 2018
(COM (2018) 630 final) to launch a pilot phase under Horizon 2020 to help bring national …

[图书][B] CISSP: Certified information systems security professional study guide

JM Stewart, E Tittel, M Chapple - 2011 - books.google.com
Totally updated for 2011, here's the ultimate study guide for the CISSP exam Considered the
most desired certification for IT security professionals, the Certified Information Systems …

Combining security risk assessment and security testing based on standards

J Großmann, F Seehusen - Risk Assessment and Risk-Driven Testing …, 2015 - Springer
Managing cyber security has become increasingly important due to the growing
interconnectivity of computerized systems and their use in society. A comprehensive …

[PDF][PDF] Key concepts in cyber security: Towards a common policy and technology context for cyber security norms

C Vishik, M Matsubara, A Plonk - NATO CCD COE Publications, Tallinn, 2016 - ccdcoe.org
Key Concepts in Cyber Security: Towards a Common Policy and Technology Context for Cyber
Security Norms Page 1 Key Concepts in Cyber Security: Towards a Common Policy and …

A systematic synthesis of critical success factors for cybersecurity

W Yeoh, S Wang, A Popovič, NH Chowdhury - Computers & Security, 2022 - Elsevier
Extant studies suggest that cybersecurity is critical and among the IT spending priorities of
organizations. In response, the literature draws attention to the cybersecurity critical success …

Cybersecurity capabilities for critical infrastructure resilience

M Malatji, AL Marnewick, S Von Solms - Information & Computer …, 2022 - emerald.com
Purpose For many innovative organisations, Industry 4.0 paves the way for significant
operational efficiencies, quality of goods and services and cost reductions. One of the ways …