Show simple item record

dc.contributor.authorPöyhönen, Jouni
dc.contributor.authorLehto, Martti
dc.contributor.editorLehto, Martti
dc.contributor.editorKarjalainen, Mika
dc.date.accessioned2024-06-27T12:24:36Z
dc.date.available2024-06-27T12:24:36Z
dc.date.issued2024
dc.identifier.citationPöyhönen, J., & Lehto, M. (2024). Architecture Framework for Cyber Security Management. In M. Lehto, & M. Karjalainen (Eds.), <i>Proceedings of the 23rd European Conference on Cyber Warfare and Security</i> (23, pp. 388-397). Academic Conferences International Ltd. Proceedings of the European Conference on Cyber Warfare and Security. <a href="https://doi.org/10.34190/eccws.23.1.2340" target="_blank">https://doi.org/10.34190/eccws.23.1.2340</a>
dc.identifier.otherCONVID_220849465
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/96210
dc.description.abstractThe smooth operation of contemporary society relies on the collaborative functioning of multiple essential infrastructures, with their collective effectiveness increasingly hinging on a dependable national system of systems construction. The central focus within the realm of cyberspace revolves around safeguarding this critical infrastructure (CI), which includes both physical and electronic components essential for societal operations. The recent surge in cyber-attacks targeting CI, critical information infrastructures, and the Internet, characterized by heightened frequency and increased sophistication, presents substantial threats. As perpetrators become more adept, they can digitally infiltrate and disrupt physical infrastructure, causing harm to equipment and services without the need for a physical assault. The operational uncertainty of CI in these cases is obvious. The linchpin of cyber security lies in a well-executed architecture, a fundamental requirement for effective measures. The framework of this paper emphasizes organizational guidance in cyber security management by integrating the cyber security risks assessment and the cyber resilience process into overall continuity management of organizations business processes.en
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherAcademic Conferences International Ltd
dc.relation.ispartofProceedings of the 23rd European Conference on Cyber Warfare and Security
dc.relation.ispartofseriesProceedings of the European Conference on Cyber Warfare and Security
dc.rightsCC BY-NC-ND 4.0
dc.subject.othercritical infrastructure
dc.subject.otherarchitecture framework
dc.subject.otherrisks assessment
dc.subject.otherresilience
dc.titleArchitecture Framework for Cyber Security Management
dc.typeconference paper
dc.identifier.urnURN:NBN:fi:jyu-202406275052
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.type.coarhttp://purl.org/coar/resource_type/c_5794
dc.description.reviewstatuspeerReviewed
dc.format.pagerange388-397
dc.relation.issn2048-8602
dc.relation.numberinseries1
dc.relation.volume23
dc.type.versionpublishedVersion
dc.rights.copyright© 2024 European Conference on Cyber Warfare and Security
dc.rights.accesslevelopenAccessfi
dc.type.publicationconferenceObject
dc.relation.conferenceEuropean Conference on Cyber Warfare and Security
dc.subject.ysoinfrastruktuurit
dc.subject.ysoresilienssi
dc.subject.ysokriittinen infrastruktuuri
dc.subject.ysotietojärjestelmät
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p17539
jyx.subject.urihttp://www.yso.fi/onto/yso/p25253
jyx.subject.urihttp://www.yso.fi/onto/yso/p40246
jyx.subject.urihttp://www.yso.fi/onto/yso/p3927
dc.rights.urlhttps://creativecommons.org/licenses/by-nc-nd/4.0/
dc.relation.doi10.34190/eccws.23.1.2340
dc.type.okmA4


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

CC BY-NC-ND 4.0
Except where otherwise noted, this item's license is described as CC BY-NC-ND 4.0