CYBERSECURITY AUDIT/ASSURANCE

被引:0
|
作者
Svata, Vlasta [1 ]
机构
[1] Univ Econ, Dept Syst Anal, Prague, Czech Republic
来源
STRATEGIC MODELING IN MANAGEMENT, ECONOMY AND SOCIETY (IDIMT-2018) | 2018年 / 47卷
关键词
Information security; cybersecurity; cybersecurity controls; assurance core components; assurance layers;
D O I
暂无
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
Massive cybersecurity breaches have become almost commonplace and many of us are not just the readers of the news about these attacks, but we have experienced them on our own. The natural reaction of the society and professional organizations is to develop tools helping organizations to face this problem. The consequence of this situation is that there exist the whole set of different regulations, guidelines, programs, norms, etc. and organizations being aware of the cyber risks are not sure where to start, what regulation to be compliant with, what money invest. The article deals with the different types of cyber security audit/assurance in relation to the different layers of the complex cybersecurity control environment.
引用
收藏
页码:351 / 358
页数:8
相关论文
共 50 条
  • [31] Humanitarian Perspective of Cybersecurity and Cybersecurity Governance
    De Bruin, Rossouw
    von Solms, S. H.
    2017 IST-AFRICA WEEK CONFERENCE (IST-AFRICA), 2017,
  • [32] TIM Lecture Series The Business of Cybersecurity
    Grau, David
    Kennedy, Charles
    TECHNOLOGY INNOVATION MANAGEMENT REVIEW, 2014, : 53 - 57
  • [33] Cybersecurity in higher education: a bibliometric review
    Orosco-Fabian, Jhon Richard
    REVISTA DIGITAL DE INVESTIGACION EN DOCENCIA UNIVERSITARIA-RIDU, 2024, 18 (02):
  • [34] Cybersecurity Culture as an Element of IT Professional Training
    Malyuk, Anatoly
    Miloslavskaya, Natalia
    2016 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION PROCESSING, DATA MINING, AND WIRELESS COMMUNICATIONS (DIPDMWC), 2016, : 205 - 210
  • [35] Characteristics of cybersecurity and IT involvement by the IA activity
    Calvin, Christopher
    Eulerich, Marc
    Holt, Matthew
    INTERNATIONAL JOURNAL OF ACCOUNTING INFORMATION SYSTEMS, 2025, 56
  • [36] Should firms invest more in cybersecurity?
    Dinkova, Milena
    El-Dardiry, Ramy
    Overvest, Bastiaan
    SMALL BUSINESS ECONOMICS, 2024, 63 (01) : 21 - 50
  • [37] APPLICATIONS OF AN IoT BASED CYBERSECURITY SYSTEMS
    Bhuvaneswari, A.
    Sitaramanjaneyulu, A. Sai
    Bhargavi, G.
    Reddy, K. Anji
    INTERNATIONAL JOURNAL OF EARLY CHILDHOOD SPECIAL EDUCATION, 2022, 14 (03) : 2428 - 2436
  • [38] Cybersecurity in Supply Chains: Quantifying Risk
    Deane, Jason
    Baker, Wade
    Rees, Loren
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2023, 63 (03) : 507 - 521
  • [39] Phantom or Menace: User Behaviors in Cybersecurity
    Acton, Thomas
    Datta, Pratim Milton
    Hughes, Martin
    2022 CYBER RESEARCH CONFERENCE - IRELAND (CYBER-RCI), 2022, : 103 - 106
  • [40] Procedural Information Security Countermeasure Awareness and Cybersecurity Protection Motivation in Enhancing Employee's Cybersecurity Protective Behaviour
    Humaidi, Norshima
    Alghazo, Saif Hussein Abdallah
    2022 10TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS), 2022,