Cybersecurity Enterprises Policies: A Comparative Study.

Autor: Mishra A; Informatics and Digitalization, Molde University College-Specialized University in Logistics, 6410 Molde, Norway.; Department of Software Engineering, Atilim University, Ankara 06830, Turkey., Alzoubi YI; Management Information Systems Department, College of Business, American University of the Middle East, Egaila 15453, Kuwait., Gill AQ; School of Computer Science, The University of Technology Sydney, 15 Broadway, Ultimo, NSW 2007, Australia., Anwar MJ; School of Computer Science, The University of Technology Sydney, 15 Broadway, Ultimo, NSW 2007, Australia.
Jazyk: angličtina
Zdroj: Sensors (Basel, Switzerland) [Sensors (Basel)] 2022 Jan 11; Vol. 22 (2). Date of Electronic Publication: 2022 Jan 11.
DOI: 10.3390/s22020538
Abstrakt: Cybersecurity is a critical issue that must be prioritized not just by enterprises of all kinds, but also by national security. To safeguard an organization's cyberenvironments, information, and communication technologies, many enterprises are investing substantially in cybersecurity these days. One part of the cyberdefense mechanism is building an enterprises' security policies library, for consistent implementation of security controls. Significant and common cybersecurity policies of various enterprises are compared and explored in this study to provide robust and comprehensive cybersecurity knowledge that can be used in various enterprises. Several significant common security policies were identified and discussed in this comprehensive study. This study identified 10 common cybersecurity policy aspects in five enterprises: healthcare, finance, education, aviation, and e-commerce. We aimed to build a strong infrastructure in each business, and investigate the security laws and policies that apply to all businesses in each sector. Furthermore, the findings of this study reveal that the importance of cybersecurity requirements differ across multiple organizations. The choice and applicability of cybersecurity policies are determined by the type of information under control and the security requirements of organizations in relation to these policies.
Databáze: MEDLINE
Nepřihlášeným uživatelům se plný text nezobrazuje