Architecture Framework for Cyber Security Management
Pöyhönen, J., & Lehto, M. (2024). Architecture Framework for Cyber Security Management. In M. Lehto, & M. Karjalainen (Eds.), Proceedings of the 23rd European Conference on Cyber Warfare and Security (23, pp. 388-397). Academic Conferences International Ltd. Proceedings of the European Conference on Cyber Warfare and Security. https://doi.org/10.34190/eccws.23.1.2340
Julkaistu sarjassa
Proceedings of the European Conference on Cyber Warfare and SecurityPäivämäärä
2024Tekijänoikeudet
© 2024 European Conference on Cyber Warfare and Security
The smooth operation of contemporary society relies on the collaborative functioning of multiple essential infrastructures, with their collective effectiveness increasingly hinging on a dependable national system of systems construction. The central focus within the realm of cyberspace revolves around safeguarding this critical infrastructure (CI), which includes both physical and electronic components essential for societal operations. The recent surge in cyber-attacks targeting CI, critical information infrastructures, and the Internet, characterized by heightened frequency and increased sophistication, presents substantial threats. As perpetrators become more adept, they can digitally infiltrate and disrupt physical infrastructure, causing harm to equipment and services without the need for a physical assault. The operational uncertainty of CI in these cases is obvious. The linchpin of cyber security lies in a well-executed architecture, a fundamental requirement for effective measures. The framework of this paper emphasizes organizational guidance in cyber security management by integrating the cyber security risks assessment and the cyber resilience process into overall continuity management of organizations business processes.
...
Julkaisija
Academic Conferences International LtdKonferenssi
European Conference on Cyber Warfare and SecurityKuuluu julkaisuun
Proceedings of the 23rd European Conference on Cyber Warfare and SecurityISSN Hae Julkaisufoorumista
2048-8602Asiasanat
Julkaisu tutkimustietojärjestelmässä
https://converis.jyu.fi/converis/portal/detail/Publication/220849465
Metadata
Näytä kaikki kuvailutiedotKokoelmat
Lisenssi
Samankaltainen aineisto
Näytetään aineistoja, joilla on samankaltainen nimeke tai asiasanat.
-
Kriittisen infrastruktuurin suojaaminen Suomessa
Kuokkanen, Niko (2020)Tämän kirjallisuuskatsauksena toteutetun kandidaatin tutkielman tavoitteena oli ottaa selvää suomalaisen kriittisen infrastruktuurin vastuista, kattavuudesta ja kyberturvallisuuden suojaustoimista. Tutkimuksen taustalla ... -
Command and Control: Monitoring, defending and exploiting critical infrastructure
Puuska, Samir (Jyväskylän yliopisto, 2021)For securing critical infrastructure, this thesis aims to develop a common operating picture system, establish methods for detecting targeted cyberattacks, and investigate exploits against machine learning -based decision ... -
Health care and cyber threats
Norri-Sederholm, Teija; Laitinen, Tiina; Lehto, Martti; Kari, Martti (Sosiaali- ja terveyshuollon tietojenkäsittely-yhdistys, 2019)Finland’s cyber security strategy states that Finland has to be capable of protecting the vital functions of society, such as health care, against cyber threats. Currently, health care heads the TOP-5 list of cyber attacks ... -
Cultivating a ‘Digital Jungle’ : Toward a Hybrid Governance Perspective on Infrastructure Evolution
Niemimaa, Marko; Zimmer, Markus Philipp (Association for Information Systems, 2020)Digital infrastructures (DIs) evolve rather than following planned development trajectories. We know this phenomenon as drift, that is, infrastructures drift from management control. Infrastructure drift has motivated ... -
Kriittisen infrastruktuurin ohjausjärjestelmien kyberturvallisuus
Virtanen, Alex (2019)Tämä tutkielma käsittelee kriittisen infrastruktuurin tuotanto- ja jakeluprosessien SCADA-järjestelmien toimintavarmuutta sekä resilienssiä kyberturvallisuuden näkökulmasta. Tutkielman tarkoituksena on selvittää, kuinka ...
Ellei toisin mainittu, julkisesti saatavilla olevia JYX-metatietoja (poislukien tiivistelmät) saa vapaasti uudelleenkäyttää CC0-lisenssillä.