首页> 外文学位 >Architecting a Cybersecurity Management Framework: Navigating and Traversing Complexity, Ambiguity, and Agility
【24h】

Architecting a Cybersecurity Management Framework: Navigating and Traversing Complexity, Ambiguity, and Agility

机译:架构网络安全管理框架:导航和穿越复杂性,歧义性和敏捷性

获取原文
获取原文并翻译 | 示例

摘要

Despite advancements in technology, countermeasure, and situational awareness, cybersecurity (CS) breaches continue to increase in number, complexity, and severity. This qualitative study is one of a few to comprehensively explore CS management. The study used a systems' approach to identify business, socioeconomic, and information technology (IT) factors, and their interrelationships. The study examined IT management frameworks and CS standards and literature. Interviews and a focus group of subject matter experts followed. The research found CS is a leadership, not a technical issue. CS is an ecosystem; its components are interrelated and inseparable, requiring qualitative, subjective, risk and knowledge management interventions. CS, IT, and threats are too complex and volatile for organizations to manage all risks and vulnerabilities in a timely, agile manner. CS lexicons lack uniformity and consistency. An IT management framework is better suited for CS. Companies must segregate and encrypt the most sensitive information and curb their appetites for new, unsecured technology. CS and IT is multilayered, requiring subspecialists, who often serve conflicting business needs and security objectives. Organizations need to minimize mid-level CS management, raise CS to a business level function (not subordinate to IT), and involve cyber specialists at all levels in the business lifecycle. Cross-pollinating people from all business areas, especially from finance, CS, and IT, increases awareness of the others' responsibilities and obligations and facilitates more rapid portfolio, lifecycle CS activities, from investments to detection and response activities. Future studies should focus on these issues as critical success factors. Finally, the study of CS requires agile, qualitative, multidisciplinary methodology to produce thick, quick, actionable information.
机译:尽管技术,对策和态势感知方面取得了进步,但网络安全(CS)漏洞的数量,复杂性和严重性仍在不断增加。该定性研究是全面探索CS管理的少数研究之一。该研究使用系统的方法来识别业务,社会经济和信息技术(IT)因素及其相互关系。该研究检查了IT管理框架以及CS标准和文献。随后进行了采访并成立了主题专家焦点小组。研究发现,CS是领导而不是技术问题。 CS是一个生态系统;其组成部分是相互关联和密不可分的,需要定性,主观,风险和知识管理干预。 CS,IT和威胁过于复杂和易变,以至于组织无法及时,敏捷地管理所有风险和漏洞。 CS词典缺乏统一性和一致性。 IT管​​理框架更适合CS。公司必须隔离和加密最敏感的信息,并遏制他们对新的,不安全的技术的胃口。 CS和IT是多层的,因此需要专科医生,他们通常满足冲突的业务需求和安全目标。组织需要最大程度地减少中级CS的管理,将CS提升到业务级别的功能(不属于IT),并在业务生命周期的各个级别上让网络专家参与其中。跨部门授粉的人员来自所有业务领域,尤其是来自财务,CS和IT领域的人员,可以提高对他人职责和义务的认识,并促进从投资到发现和响应活动的更快速的产品组合,生命周期CS活动。未来的研究应将这些问题作为成功的关键因素。最后,对CS的研究需要敏捷,定性,多学科的方法来产生丰富,快速,可操作的信息。

著录项

  • 作者

    Tisdale, Susan M.;

  • 作者单位

    Robert Morris University.;

  • 授予单位 Robert Morris University.;
  • 学科 Information technology.;Computer science.
  • 学位 D.Sc.
  • 年度 2016
  • 页码 283 p.
  • 总页数 283
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号