Reengineering Cyber Security Process: A New Perspective on Cyber Security Quality Management

被引:1
作者
Sharbaf, Mehrdad S. [1 ]
机构
[1] Loyola Marymount Univ, Dept Comp Informat Syst, Los Angeles, CA 90045 USA
来源
IEEE 17TH INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP / IEEE 17TH INT CONF ON PERVAS INTELLIGENCE AND COMP / IEEE 5TH INT CONF ON CLOUD AND BIG DATA COMP / IEEE 4TH CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH) | 2019年
关键词
cyber security; reengineering cyber security; cyber security management; artificial intelligence; INFORMATION SECURITY;
D O I
10.1109/DASC/PiCom/CBDCom/CyberSciTech.2019.00068
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Information systems is greatly identified as the engine that drives and supports the U.S. and global economy, giving industry a strategic competitive advantage in global markets., enabling the federal government and agencies to collaborate among themselves, and building a 21st century digital government platform to provide better services to its citizens. The 21st century is the era age of digital information when information within corporation becomes an imperative important strategically and valuable resource than ever as the development of such field like business economics intelligent underlines it. But information systems are exposed to serious internal and external threats that can have adverse effects on organizational operations. Unfortunately, the complexity of security attacks, and lack of quality cyber security management implementation within organizations, and increased number of vulnerabilities, and lack of effectively protecting against the dynamically evolving attacks within organization networks have greatly increased over the past few years, even the best security mechanisms can be bypassed by professional hackers. This research article proposes, creates and develops a new perspective in cyber security management, and it introduces a new concept which is called Reengineering Cyber Security Process, and applies toward quality of cyber security management.
引用
收藏
页码:332 / 337
页数:6
相关论文
共 25 条
[1]  
[Anonymous], 2017, Artificial Intelligence and National Security'
[2]  
[Anonymous], 2009, ISO IEC 27000 SER
[3]  
[Anonymous], 2003, SPECIAL PUBLICATION
[4]  
Anwar A., 2017, International Journal of Computational Intelligence Research, V13, P883
[5]   Is information security under control? Investigating quality in information security management [J].
Baker, Wade H. ;
Wallace, Linda .
IEEE SECURITY & PRIVACY, 2007, 5 (01) :36-44
[6]  
Chen HC, 2005, IEEE INTELL SYST, V20, P12
[7]   Security Analytics and Measurements [J].
Cybenko, George ;
Landwehr, Carl E. .
IEEE SECURITY & PRIVACY, 2012, 10 (03) :5-8
[8]  
Dilek Selma, 2015, INT J ARTITICIAL INT, V6, P20
[9]  
Garvey P.R., 2008, Analytical Methods for Risk Management: A Systems Engineering Perspective
[10]  
*ISACA, 2009, INTR BUS MOD INF SEC