2019 Resilience Week (RWS) 2019
DOI: 10.1109/rws47064.2019.8971822
|View full text |Cite
|
Sign up to set email alerts
|

Demonstration of the Cybersecurity Framework through Real-World Cyber Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 1 publication
0
1
0
1
Order By: Relevance
“…Kematangan yang diinginkan dari lima domain keamanan siber ditentukan oleh penilaian inti. webtool CSF memungkinkan fasilitas untuk menilai kepatuhan NIST dengan CSF dan mencatat status keamanan [12].…”
Section: Pendahuluanunclassified
“…Kematangan yang diinginkan dari lima domain keamanan siber ditentukan oleh penilaian inti. webtool CSF memungkinkan fasilitas untuk menilai kepatuhan NIST dengan CSF dan mencatat status keamanan [12].…”
Section: Pendahuluanunclassified
“…The second most used model is C2M2 [109]. The most comprehensive and used cybersecurity maturity models are CSF-NIST and C2M2 [110]; however, they have been criticized due to their subjectivity that can be generated when making self-assessment. Although the models are general and focused on organizations, the maturity model can be adapted to specific sectors [108] (e.g., C2M2 has two variants: one developed for the energy sector and another for the gas and fuel sectors).…”
Section: ) Research Contextmentioning
confidence: 99%