The Cybersecurity Body of Knowledge 2020
DOI: 10.1201/9781003022596-2
|View full text |Cite
|
Sign up to set email alerts
|

The Cybersecurity Body of Knowledge

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…Several studies in scholarly literature find that cybersecurity is multidisciplinary and containing concepts from several fields (Craigen, Diakun-Thibault and Purse, 2014) e.g., business management, behavioural studies, and technical and software engineering (Shoemaker and Conklin, 2011). The first part cyber is used as a prefix refering to the digital world of bytes (Limnéll, Majewski and Salminen, 2014).…”
Section: Cybersecuritymentioning
confidence: 99%
See 2 more Smart Citations
“…Several studies in scholarly literature find that cybersecurity is multidisciplinary and containing concepts from several fields (Craigen, Diakun-Thibault and Purse, 2014) e.g., business management, behavioural studies, and technical and software engineering (Shoemaker and Conklin, 2011). The first part cyber is used as a prefix refering to the digital world of bytes (Limnéll, Majewski and Salminen, 2014).…”
Section: Cybersecuritymentioning
confidence: 99%
“…Thera are similarities between information security and cybersecurity as both of their measures have three goals: to protect the confidentiality, integrity, and availability of information (Cavelty, 2010). It is not possible to separate between the physical and the virtual or digital elements of cybersecurity, as cyber events can have physical consequences and tangible effects even though cyberspace in itself is intangible (Shoemaker and Conklin, 2011;Limnéll, Majewski and Salminen, 2014). Cybersecurity and security in general should be embedded as a solid part of all organizational processes so that security dimensions are considered in all actions and operations from the very beginning, not only when a new digital service is otherwise ready to be implemented (Limnéll, Majewski and Salminen, 2014).…”
Section: Cybersecuritymentioning
confidence: 99%
See 1 more Smart Citation
“…The cybersecurity threat landscape has evolved significantly in tandem with developments in computing; from Charles Babbage's Difference Engine -the first computing device, Electronic Numerical Integrator and Computer (ENIAC) -the first general purpose computer, Advanced Research Project Agency Network (ARPANET) -the predecessor to the Internet, to the modern day computing that is deeply integrated into cyber-physical-social systems that are supporting critical functions for individuals, organizations, and society at large (Pasandideh et al, 2022). This evolution has heightened the importance of systems perspectives and also concerns regarding not only technocentric threats but also human, organizational and societal threats (Shoemaker et al, 2020;Von Solms & Van Niekerk, 2013;Zoto et al, 2019). As such, systems thinking has increasingly been adopted in cybersecurity to understand computing systems, cyber threats, and cybersecurity solutions holistically as part of a complex ecosystem and as comprising interrelated and interdependent elements that shape the overall cybersecurity posture (Susan M. Tisdale, 2015).…”
Section: Introductionmentioning
confidence: 99%