首页    期刊浏览 2025年02月24日 星期一
登录注册

文章基本信息

  • 标题:APPLICATIONS OF AN IoT BASED CYBERSECURITY SYSTEMS
  • 本地全文:下载
  • 作者:Gutha Manasa ; J. Hari Krishna ; Bolem Seetha Maha Lakshmi
  • 期刊名称:International Journal of Early Childhood Special Education
  • 电子版ISSN:1308-5581
  • 出版年度:2022
  • 卷号:14
  • 期号:2
  • 页码:6065-6073
  • DOI:10.9756/INT-JECSE/V14I2.690
  • 语种:English
  • 出版社:International Journal of Early Childhood Special Education
  • 摘要:Currently, commercial companies and public organizations face steady, advanced cyber threats and cyber attacks. In order to defend against cyber-criminals, organizations must construct and develop a culture and sensitivity for cyber-security. IT (IT) and InfoSec audits (InfoSec) were previously effective and are aimed at combining cyber security audits to address cyber risk, cyber risk, and cyber attacks that are evolving in a hostile cyber landscape. However, increasing cyber attacks and the cyber threat landscape challenges existing models for cybersecurity auditing and demonstrates the crucial need for a new paradigm for cybersecurity auditing. This article covers worldwide cyber security and auditing leaders' best practices and approaches. By analyzing the existing methodologies and more effective and cohesive synthesis is emphasized on theoretical foundation, their real scope, strengths and shortcomings.In this article, the initial and complete cybersecurity audit model was introduced as a proposal to be used in enterprises and Nation States to conduct cybersecurity audits. Audit, prevention, forensic and detective controls for all sections of the enterprise are evaluated and validated using the Cyber Security Audit Model (CAM). In a Canadian university, CSAM, together with the Training Cybersecurity Awareness Model was tested, implemented and verified (CATRAM). Both models will be validated through a study of real-world research cases, with the results being made public once the study is complete.
  • 关键词:cybersecurity;cybersecurity audit;cybersecurity audit model;cybersecurity assurance;cybersecurity controls;cybersecurity domains
国家哲学社会科学文献中心版权所有