A framework for an effective cybersecurity strategy implementation

被引:0
作者
Elkhannoubi, Hasna [1 ]
Belaissaoui, Mustapha [1 ]
机构
[1] Univ Hassan I, ENCG, Lab SIAD, Settat, Morocco
来源
JOURNAL OF INFORMATION ASSURANCE AND SECURITY | 2016年 / 11卷 / 04期
关键词
cybersecurity; strategy; information; organizational; legal; technological;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cybersecurity is an ever-changing ecosystem with a vast and highly complicated field of study, involving specific confidential information, which is the most important element for each organization, regardless, its industry segment; accordingly, this matter requires continuous attention. The cybersecurity is crucial due to its strong presence in national security. In this respect, States, enterprises and private individuals should be present as stakeholders in a national, regional and international cybersecurity vision. However, an effective national cybersecurity strategy conforms to international standards serves to preserve organization's information assets. The standard is to support a cybersecurity consistent approach including legal, technological and organizational dimensions, as more cybersecurity is mainly based on technology, management procedure, organizational structure, laws and human competence. The promise of this research program is to identify the key areas for an effective cybersecurity strategy addressed to any organization (Administration or enterprise) which will be adapted according to the internal context - taking into account successful experiences in this context - in order to develop a favorable recommended framework for cybersecurity strategy implementation that ensures an acceptable information security level.
引用
收藏
页码:233 / 241
页数:9
相关论文
共 19 条
[1]  
[Anonymous], 2013, DEFENSE SECURITE NAT
[2]  
[Anonymous], 2013, 27002 ISOIEC
[3]  
Arpagian N., 2010, CYBERSECURITY DEFINI, P128
[4]  
Arpagian N., 2013, CYBERSECURITE CHANTI
[5]  
Cabinet Office (HM Government), 2011, UK CYB SEC STRAT PRO
[6]  
Defense et Securite Nationale, 2008, DEFENSE SECURITE NAT
[7]  
Dwi Atmaja T., 2011, NTERN C EL ENG INF 1
[8]  
ELKHANNOUBI H., 2015, ACS IEEE INT C COMP
[9]  
GHERNOUTI-HELIE S., 2010, INT C AV REL SEC
[10]   The impact of information sharing on cybersecurity underinvestment: A real options perspective [J].
Gordon, Lawrence A. ;
Loeb, Martin P. ;
Lucyshyn, William ;
Zhou, Lei .
JOURNAL OF ACCOUNTING AND PUBLIC POLICY, 2015, 34 (05) :509-519