![](/client/images/blank.gif)
Eylem Seç
![Architecting a Cybersecurity Management Framework: Navigating and Traversing Complexity, Ambiguity, and Agility için kapak resmi Architecting a Cybersecurity Management Framework: Navigating and Traversing Complexity, Ambiguity, and Agility için kapak resmi](/client/assets/d79c3e4af2b6d196/ctx/images/no_image.png)
Architecting a Cybersecurity Management Framework: Navigating and Traversing Complexity, Ambiguity, and Agility
Başlık:
Architecting a Cybersecurity Management Framework: Navigating and Traversing Complexity, Ambiguity, and Agility
Yazar:
Tisdale, Susan M., author.
ISBN:
9780438001930
Yazar Ek Girişi:
Fiziksel Tanımlama:
1 electronic resource (283 pages)
Genel Not:
Source: Dissertation Abstracts International, Volume: 79-10(E), Section: B.
Advisors: Fredrick G. Kohun Committee members: Anthony R. Petroy; Daniel R. Rota.
Özet:
Despite advancements in technology, countermeasure, and situational awareness, cybersecurity (CS) breaches continue to increase in number, complexity, and severity. This qualitative study is one of a few to comprehensively explore CS management. The study used a systems' approach to identify business, socioeconomic, and information technology (IT) factors, and their interrelationships. The study examined IT management frameworks and CS standards and literature. Interviews and a focus group of subject matter experts followed. The research found CS is a leadership, not a technical issue. CS is an ecosystem; its components are interrelated and inseparable, requiring qualitative, subjective, risk and knowledge management interventions. CS, IT, and threats are too complex and volatile for organizations to manage all risks and vulnerabilities in a timely, agile manner. CS lexicons lack uniformity and consistency. An IT management framework is better suited for CS. Companies must segregate and encrypt the most sensitive information and curb their appetites for new, unsecured technology. CS and IT is multilayered, requiring subspecialists, who often serve conflicting business needs and security objectives. Organizations need to minimize mid-level CS management, raise CS to a business level function (not subordinate to IT), and involve cyber specialists at all levels in the business lifecycle. Cross-pollinating people from all business areas, especially from finance, CS, and IT, increases awareness of the others' responsibilities and obligations and facilitates more rapid portfolio, lifecycle CS activities, from investments to detection and response activities. Future studies should focus on these issues as critical success factors. Finally, the study of CS requires agile, qualitative, multidisciplinary methodology to produce thick, quick, actionable information.
Notlar:
School code: 1447
Tüzel Kişi Ek Girişi:
Mevcut:*
Yer Numarası | Demirbaş Numarası | Shelf Location | Lokasyon / Statüsü / İade Tarihi |
---|---|---|---|
XX(682376.1) | 682376-1001 | Proquest E-Tez Koleksiyonu | Arıyor... |
On Order
Liste seç
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
:
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.