2023
DOI: 10.3390/risks11060101
|View full text |Cite
|
Sign up to set email alerts
|

Context-Based and Adaptive Cybersecurity Risk Management Framework

Abstract: Currently, organizations are faced with a variety of cyber-threats and are possibly challenged by a wide range of cyber-attacks of varying frequency, complexity, and impact. However, they can do something to prevent, or at least mitigate, these cyber-attacks by first understanding and addressing their common problems regarding cybersecurity culture, developing a cyber-risk management plan, and devising a more proactive and collaborative approach that is suitable according to their organization context. To this… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
9
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 36 publications
0
9
0
Order By: Relevance
“…ITIL provides a suitable set of standards, guidance, and best practices that were developed by the United Kingdom's Office of Government Commerce (OGC) [13]. ITIL is composed of five main strategies in the form of services such as:…”
Section: Information Technology Infrastructure Library (Itil)mentioning
confidence: 99%
See 4 more Smart Citations
“…ITIL provides a suitable set of standards, guidance, and best practices that were developed by the United Kingdom's Office of Government Commerce (OGC) [13]. ITIL is composed of five main strategies in the form of services such as:…”
Section: Information Technology Infrastructure Library (Itil)mentioning
confidence: 99%
“…Risk treatment refers to giving priority, implementing, and maintaining a suitable set of risk-minimizing techniques recommended from the risk assessment process. The developed risk management program should be periodically monitored and evaluated [13]. Firstly, the cybersecurity strategic plan should be integrated with the IT strategic plan, which is an integral part of the company's overall strategic plan.…”
Section: Cybersecurity Governance Framework Componentsmentioning
confidence: 99%
See 3 more Smart Citations