Näytä suppeat kuvailutiedot

dc.contributor.authorSalmenpää, Tomi
dc.contributor.editorLehto, Martti
dc.contributor.editorNeittaanmäki, Pekka
dc.date.accessioned2023-02-02T12:37:48Z
dc.date.available2023-02-02T12:37:48Z
dc.date.issued2022
dc.identifier.citationSalmenpää, T. (2022). Information Security Governance in Civil Aviation. In M. Lehto, & P. Neittaanmäki (Eds.), <i>Cyber Security : Critical Infrastructure Protection</i> (pp. 315-336). Springer. Computational Methods in Applied Sciences, 56. <a href="https://doi.org/ 10.1007/978-3-030-91293-2_13" target="_blank">https://doi.org/ 10.1007/978-3-030-91293-2_13</a>
dc.identifier.otherCONVID_117622734
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/85320
dc.description.abstractThis chapter focuses mainly to proactive means in information security and more specifically governance of information security in civil aviation. The reason is that, to find sustainable, coherent and holistic way to implement information security through the complete civil aviation ecosystem, the governance plays a key role when creating sufficient framework enabling information security by design environment. The study will help aviation and other critical infrastructure sectors to consider, understand and coordinate the information security governance. The study will test how to apply information security governance with ISO27014 through such a safety critical, interconnected infrastructure sector like civil aviation.en
dc.format.extent484
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherSpringer
dc.relation.ispartofCyber Security : Critical Infrastructure Protection
dc.relation.ispartofseriesComputational Methods in Applied Sciences
dc.rightsIn Copyright
dc.subject.othercybersecurity governance
dc.subject.otherinformation security governance
dc.subject.otheraviation cybersecurity
dc.subject.otheraviation information security
dc.titleInformation Security Governance in Civil Aviation
dc.typebookPart
dc.identifier.urnURN:NBN:fi:jyu-202302021602
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineTietojärjestelmätiedefi
dc.contributor.oppiaineInformation Systems Scienceen
dc.type.urihttp://purl.org/eprint/type/BookItem
dc.relation.isbn978-3-030-91292-5
dc.type.coarhttp://purl.org/coar/resource_type/c_3248
dc.description.reviewstatuspeerReviewed
dc.format.pagerange315-336
dc.relation.issn1871-3033
dc.type.versionacceptedVersion
dc.rights.copyright© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
dc.rights.accesslevelopenAccessfi
dc.subject.ysokyberturvallisuus
dc.subject.ysotietoturva
dc.subject.ysoinfrastruktuurit
dc.subject.ysotietoturvapolitiikka
dc.subject.ysoilmailuala
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p26189
jyx.subject.urihttp://www.yso.fi/onto/yso/p5479
jyx.subject.urihttp://www.yso.fi/onto/yso/p17539
jyx.subject.urihttp://www.yso.fi/onto/yso/p25795
jyx.subject.urihttp://www.yso.fi/onto/yso/p25714
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en
dc.relation.doi10.1007/978-3-030-91293-2_13
dc.type.okmA3


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

In Copyright
Ellei muuten mainita, aineiston lisenssi on In Copyright