A holistic cyber security implementation framework

Author:

Atoum Issa,Otoom Ahmed,Abu Ali Amer

Abstract

Purpose – The purpose of this paper is to propose a holistic cyber security implementation framework (HCS-IF) that lays out the ground for a conceptual, coherent, systematic, overarching and consolidated approach to implement cyber security strategies (CSSs). Design/methodology/approach – The HCS-IF is conceptually proposed to address the actual needs that are extracted from literature review. The HCS-IF uses and integrates a set of high-level conceptual security controls, solutions, processes, entities, tools, techniques or mechanisms that are already known in the domains of information security management, software engineering and project management to address the identified needs. Findings – The HCS-IF components and controls collectively interact and cooperate to implement CSSs. The proposed framework is compared with other related frameworks, and the results show that the HCS-IF outperforms other frameworks on most of the suggested comparison criteria. Originality/value – From a practical standpoint, governments and practitioners alike stand to gain from the findings of this research. Governments who want to implement CSSs on a national level will find the proposed framework useful in overseeing cyber security implementation. Practitioners will be prepared to address the anticipated cyber security implementation challenges and the required controls needed to facilitate cyber-security implementation in a holistic overarching manner.

Publisher

Emerald

Subject

Library and Information Sciences,Management Science and Operations Research,Business and International Management,Management Information Systems

Reference45 articles.

1. Barnat, R. (2005), “Strategic management: the nature of strategy implementation”, available at: www.strategy-implementation.24xls.com/en100 (accessed 3 February 2012).

2. Broom, A. (2009), “Security consolidation and optimisation: gaining the most from your IT assets”, Computer Fraud and Security, Vol. 2009 No. 5, pp. 15-17, available at: http://linkinghub.elsevier.com/retrieve/pii/S1361372309700612 (accessed 25 February 2012).

3. Buecker, A. , Borrett, M. , Lorenz, C. and Powers, C. (2010), “Introducing the IBM security framework and IBM security blueprint to realize business-driven security”, IBM Redpaper, Vol. 4528 No. 1, pp. 1-96.

4. Dasgupta, D. and Rahman, M. (2011), “A framework for estimating security coverage for cloud service insurance”. In Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, ACM Press, New York, New York, USA, p. -, available at: http://dl.acm.org/citation.cfm?doid=2179298.2179342 (accessed 20 April 2012).

5. David, F. (2011), Strategic Management: Concepts and Cases, 13th ed, Prentice Hall, available at: www.malone.edu/media/1/39/480/MMP405_Online_Corporate_Strategy.pdf (accessed 12 February 2012).

Cited by 26 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. A collaborative cybersecurity framework for higher education;Information & Computer Security;2024-09-12

2. Entrepreneurship Opportunities in Cybersecurity;Advances in Business Strategy and Competitive Advantage;2024-06-30

3. La maturité cyber au prisme de la communication extra-financière : une analyse des entreprises du CAC 40;Revue Française de Gestion Industrielle;2024-04-30

4. Introduction to Zero Trust;SpringerBriefs in Applied Sciences and Technology;2024

5. Boosting Holistic Cybersecurity Awareness with Outsourced Wide-Scope CyberSOC: A Generalization from a Spanish Public Organization Study;Information;2023-10-25

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3