An Attempt to Understand Cyber Security Management Process

Authors

  • Srinivas Nowduri US Coast Guard Academy

DOI:

https://doi.org/10.14738/abr.65.4657

Keywords:

Cyber security management process (CMP), Cyber security management (CM), Risk management, Business intelligence (BI)

Abstract

Modern businesses are still thriving to achieve to a security level opting for cybersecurity, in the form of a cybersecurity management process (CMP), is detail at three levels. The first level focuses on the architectural and components of this CMP. The second level details the comprehensive view, and finally presents systems and complexity view. This work also proposes a cybersecurity management model, along with some challenging issues.

Author Biography

Srinivas Nowduri, US Coast Guard Academy

Associate Professor

Department of Management 

References

References

Salim M. Hamid and Madnick E Stuart (2016), Cyber Safety: A Systems Thinking and System Theory Approach to Managing Cyber Security Risks, Working Paper, Cybersecurity Interdisciplinary Systems Laboratory (CISL), MIT, Cambridge MA 2016.

Ramanosky S and Acquisti (2014), Privacy Costs and Personal Data Protection: Economic and Legal Perspectives, Berkely Technology Law Journal, Vol. 24, No. 3. May 2014.

Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0, National Institute of Standards and Technology, February, 2014.

Draft Version of Maritime Cybersecurity Project, Maritime Security Center, American Bureau of Shipping (ABS), August 2017.

Tomasz C, et al, (2014) Enterprise-oriented Cybersecurity Management, Proceedings of Federated Conference on Computer Science & Information Systems, ACSIS Vol. 2. 2014.

Susan M.Tisdale (2015), Cybersecurity: Challenging From a Systems, Complexity, Knowledge Management and Business Intelligence Perspective, Issues in Information Systems, Vol. 16, Issue III, June 2015.

ICC Cyber Security Guide for Business (2015), ICC Publication No. 450/1081-5, 2015

Eric A. Fischer (2016), Cybersecurity Issues and Challenges: In Brief, Congressional Research Service Report 7-5700, August 2016.

J. Barateiro et al (2012)., Manage Risks through the Enterprise Architecture, in Proc. 45th Hawaii International Conference on Systems Sciences HICSS-45, Hawaii, Jan 2012.

Y.Y. Haimes (2008), Models for Risk Management of Systems of Systems, International Journal of Systems of Systems Engineering , Vol., 1, No. 1.2, 2008

J. Araujo Wickboldt et al (2011)., A Framework for Risk Assessment base on Analysis of Historical Information of Workflow Execution in IT Systems, Computer Networks Vol., 55, No. 13, September 2011

DOE’s Cybersecurity Capability Maturity Model (C2M2) Version 1.1, February 2014

Web Source: http://intellidsi.com/the-business-intelligence-cyc

Downloads

Published

2018-06-06

How to Cite

Nowduri, S. (2018). An Attempt to Understand Cyber Security Management Process. Archives of Business Research, 6(5), 309–327. https://doi.org/10.14738/abr.65.4657