Cybersecurity and Research are not a Dichotomy: How to form a productive operational relationship between research computing and data support teams and information security teams
Abstract
References
Recommendations
Cybersecurity vs. Information Security
AbstractProtection of data assets is a hot trend topic that is attracting considerable interest worldwide. There are different concepts revolving security of data including cybersecurity and information security. Cybersecurity and information security ...
Countermeasures and their taxonomies for risk treatment in cybersecurity: A systematic mapping review
Highlights- 26 catalogues/taxonomies of cybersecurity countermeasures were identified.
- Catalogues/taxonomies mainly focus on general cybersecurity risks or cyberattacks.
- Specific countermeasure taxonomies focus mostly on critical ...
AbstractCybersecurity continues to be one of the principal issues in the computing environment. Organizations and researchers have made various efforts to mitigate the risks of cyberspace. The treatment of cyber risk is a fundamental stage in risk ...
Graphical abstractDisplay Omitted
Taxonomy of information security risk assessment (ISRA)
Information is a perennially significant business asset in all organizations. Therefore, it must be protected as any other valuable asset. This is the objective of information security, and an information security program provides this kind of ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 145Total Downloads
- Downloads (Last 12 months)21
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format