A Systematic Review of Risk Management Methodologies for Complex Organizations in Industry 4.0 and 5.0

被引:11
作者
Barraza de la Paz, Juan Vicente [1 ]
Rodriguez-Picon, Luis Alberto [1 ]
Morales-Rocha, Victor [2 ]
Torres-Arguelles, Soledad Vianey [1 ]
机构
[1] Autonomous Univ Ciudad Juarez, Dept Ind Engn & Mfg, Ciudad Juarez 32310, Chihuahua, Mexico
[2] Autonomous Univ Ciudad Juarez, Dept Elect Engn & Comp, Ciudad Juarez 32310, Chihuahua, Mexico
来源
SYSTEMS | 2023年 / 11卷 / 05期
关键词
RMF; risk management; cybersecurity; ISO; IEC; 27001; NIST CSF; MAGERIT; ISO/IEC; 27001; SECURITY;
D O I
10.3390/systems11050218
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
The large amount of information handled by organizations has increased their dependance on information technologies, which has made information security management a complex task. This is mainly because they cover areas such as physical and environmental security, organization structure, human resources and the technologies used. Information security frameworks can minimize the complexity through the different documents that contain guidelines, standards, and requirements to establish the procedures, policies, and processes for every organization. However, the selection of an appropriate framework is by itself a critical and important task, as the framework must adapt to the characteristics of an organization. In this paper, a general vision of the newest versions of the NIST CSF, ISO/IEC 27001:2022, and MAGERIT frameworks is provided by comparing their characteristics in terms of their approaches to the identification, assessment, and treatment of risks. Furthermore, their key characteristics are analyzed and discussed, which should facilitate the consideration of any of these frameworks for the risk management of complex manufacturing organizations.
引用
收藏
页数:19
相关论文
共 64 条
  • [1] Agrawal Vivek, 2017, 2017 IEEE 4th International Conference on Cyber-Security and Cloud Computing (CSCloud), P264, DOI 10.1109/CSCloud.2017.13
  • [2] Machine learning approaches to IoT security: A systematic literature review
    Ahmad, Rasheed
    Alsmadi, Izzat
    [J]. INTERNET OF THINGS, 2021, 14
  • [3] ALDhanhani MJ., 2021, TURKISH J COMPUTER M, V12, P714
  • [4] Information Security Behavior and Information Security Policy Compliance: A Systematic Literature Review for Identifying the Transformation Process from Noncompliance to Compliance
    Ali, Rao Faizan
    Dominic, P. D. D.
    Ali, Syed Emad Azhar
    Rehman, Mobashar
    Sohail, Abid
    [J]. APPLIED SCIENCES-BASEL, 2021, 11 (08):
  • [5] Amiruddin A., 2021, P 3 INT C INF MULT C
  • [6] [Anonymous], 2011, Managing Information Security Risk
  • [7] Azmi Riza, 2018, Journal of Cyber Policy, V3, P258, DOI 10.1080/23738871.2018.1520271
  • [8] Scheduling Under Uncertainty for Industry 4.0 and 5.0
    Bakon, Krisztian
    Holczinger, Tibor
    Sule, Zoltan
    Jasko, Szilard
    Abonyi, Janos
    [J]. IEEE ACCESS, 2022, 10 : 74977 - 75017
  • [9] Bawono M.W.A., 2021, ACMIT P, V7, P31, DOI [10.33555/acmit.v7i1.105, DOI 10.33555/ACMIT.V7I1.105]
  • [10] Burritt R., 2016, Asian J. Sustain. Social Respon., V1, P23, DOI [10.1186/s41180-016-0007-y, DOI 10.1186/S41180-016-0007-Y]