Reengineering Cyber Security Process: A New Perspective on Cyber Security Quality Management

被引:1
作者
Sharbaf, Mehrdad S. [1 ]
机构
[1] Loyola Marymount Univ, Dept Comp Informat Syst, Los Angeles, CA 90045 USA
来源
IEEE 17TH INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP / IEEE 17TH INT CONF ON PERVAS INTELLIGENCE AND COMP / IEEE 5TH INT CONF ON CLOUD AND BIG DATA COMP / IEEE 4TH CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH) | 2019年
关键词
cyber security; reengineering cyber security; cyber security management; artificial intelligence; INFORMATION SECURITY;
D O I
10.1109/DASC/PiCom/CBDCom/CyberSciTech.2019.00068
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Information systems is greatly identified as the engine that drives and supports the U.S. and global economy, giving industry a strategic competitive advantage in global markets., enabling the federal government and agencies to collaborate among themselves, and building a 21st century digital government platform to provide better services to its citizens. The 21st century is the era age of digital information when information within corporation becomes an imperative important strategically and valuable resource than ever as the development of such field like business economics intelligent underlines it. But information systems are exposed to serious internal and external threats that can have adverse effects on organizational operations. Unfortunately, the complexity of security attacks, and lack of quality cyber security management implementation within organizations, and increased number of vulnerabilities, and lack of effectively protecting against the dynamically evolving attacks within organization networks have greatly increased over the past few years, even the best security mechanisms can be bypassed by professional hackers. This research article proposes, creates and develops a new perspective in cyber security management, and it introduces a new concept which is called Reengineering Cyber Security Process, and applies toward quality of cyber security management.
引用
收藏
页码:332 / 337
页数:6
相关论文
共 25 条
[11]  
Kajava J., 2006, IEEE. ss, P2091
[12]   A prototype for assessing information security awareness [J].
Kruger, H. A. ;
Kearney, W. D. .
COMPUTERS & SECURITY, 2006, 25 (04) :289-296
[13]  
LANDWEHR CE, 2008, IEEE SECURITY PRIVAC, V6, P3
[14]  
LESK M, 2011, IEEE SECUR PRIV, V9, P76
[15]  
Lewis J.A., 2008, Securing cyberspace for the 44th presidency
[16]  
Merat S, 2015, CAN CON EL COMP EN, P1445, DOI 10.1109/CCECE.2015.7129493
[17]  
Mittu Ranjcev, 2015, AAAI SPRING S SERIES
[18]   DEMING 14 POINTS FOR MANAGEMENT - FRAMEWORK FOR SUCCESS [J].
NEAVE, HR .
STATISTICIAN, 1987, 36 (05) :561-570
[19]  
NIST, 2016, SPECIAL PUBLICATION, V800-160
[20]  
NIST, 2008, SPECIAL PUBLICATION, V800-64