2017
DOI: 10.15394/jdfsl.2017.1476
|View full text |Cite
|
Sign up to set email alerts
|

Towards a More Representative Definition of Cyber Security

Abstract: In recent years, 'Cyber Security' has emerged as a widely-used term with increased adoption by practitioners and politicians alike. However, as with many fashionable jargon, there seems to be very little understanding of what the term really entails. Although this is may not be an issue when the term is used in an informal context, it can potentially cause considerable problems in context of organizational strategy, business objectives, or international agreements. In this work, we study the existing literatur… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
45
0
2

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 111 publications
(63 citation statements)
references
References 20 publications
0
45
0
2
Order By: Relevance
“…We now provide definitions of the cyber terms. Schatz et al (2017) [p.66] define cyber security as "the approach and actions associated with security risk management processes followed by organizations and states to protect confidentiality, integrity and availability of data and assets used in cyber space. "…”
Section: Information Security and Cyber Security What Goes Where? (Vonmentioning
confidence: 99%
“…We now provide definitions of the cyber terms. Schatz et al (2017) [p.66] define cyber security as "the approach and actions associated with security risk management processes followed by organizations and states to protect confidentiality, integrity and availability of data and assets used in cyber space. "…”
Section: Information Security and Cyber Security What Goes Where? (Vonmentioning
confidence: 99%
“…We use the expression “cyber risk management,” however, various terms have been utilized since the beginning of the computer age, such as computer security (Madnick, 1978), information security (Blakley et al, 2001), cyber risk management (Siegel et al, 2002), information security risk management (Bojanc & Jerman‐Blaič, 2008), and cybersecurity (Von Solms & Van Niekerk, 2013). This array of terminology has resulted in multiple papers attempting to reduce semantic confusion (Alshaikh et al, 2014; Craigen et al, 2014; Finne, 2000; Schatz, Bashroush & Wall, 2017; Stubley, 2013; Von Solms & Van Niekerk, 2013). The evolution and legacy of various terms related to cybersecurity continues to cause confusion and hinders an integrated response both to manage corporate cyber risk and engage in interdisciplinary research.…”
Section: Cyber Risk Management: Origins and Historical Developmentmentioning
confidence: 99%
“…The distinct features of connectivity and autonomy, however, means that CAVs may be exposed to more cyber-attacks and, thus, are more vulnerable while exchanging data with their surrounding environment and other vehicles on the road [9]. In computer science, cyber security refers to the protection of a computer system's functions against cyber-attacks, including the damage to its hardware, software and data [10]. In CAVs, the cyber security concerns the protection of the CAV system against the cyber-attacks which compromise the CAV functions.…”
Section: Level 5 Full Driving Automationmentioning
confidence: 99%