IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

A Comprehensive Cybersecurity Framework for Present and Future Global Information Technology Organizations

A Comprehensive Cybersecurity Framework for Present and Future Global Information Technology Organizations
View Sample PDF
Author(s): Wasswa Shafik (School of Digital Science, Universiti Brunei Darussalam, Gadong, Brunei & Digital Connectivity Research Laboratory (DCRLab), Kampala, Uganda)
Copyright: 2023
Pages: 24
Source title: Effective Cybersecurity Operations for Enterprise-Wide Systems
Source Author(s)/Editor(s): Festus Fatai Adedoyin (Bournemouth University, UK)and Bryan Christiansen (CYGERA, LLC, USA)
DOI: 10.4018/978-1-6684-9018-1.ch002

Purchase

View A Comprehensive Cybersecurity Framework for Present and Future Global Information Technology Organizations on the publisher's website for pricing and purchasing information.

Abstract

This chapter examines how education, technology, national and international regulations contribute to a comprehensive cybersecurity framework for present and future global IT companies. IT-driven enterprises may utilize the following security recommendations. Businesses who seek to examine their external and internal security with security upload and establish settings for success regardless of location must solve these issues. To produce more effective legislation, education efforts, and technologies that are resistant to cyberattacks, this work explores fundamental research gaps in cybersecurity and demonstrates how cybersecurity may be divided into these three fundamental categories and integrated to tackle problems such as the creation of training environments for authentic cybersecurity situations. It will explain links between technology and certification and discuss legislative standards and instructional frameworks for merging criteria for system accreditation and cybersecurity. The study finishes with wireless network security recommendations.

Related Content

Azeem Khan, Noor Zaman Jhanjhi, Haji Abdul Hafidz B. Haji Omar, Dayang Hajah Tiawa B. Awang Haji Hamid. © 2024. 35 pages.
Brendan Ooi Tze Wen, Najihah Syahriza, Nicholas Chan Wei Xian, Nicki Gan Wei, Tan Zheng Shen, Yap Zhe Hin, Siva Raja Sindiramutty, Teah Yi Fan Nicole. © 2024. 39 pages.
Sidra Tahir, Anam Zaheer. © 2024. 17 pages.
Tayyab Rehman, Noshina Tariq, Muhammad Ashraf, Mamoona Humayun. © 2024. 24 pages.
Noshina Tariq, Tehreem Saboor, Muhammad Ashraf, Rawish Butt, Masooma Anwar, Mamoona Humayun. © 2024. 25 pages.
Sidra Tahir. © 2024. 15 pages.
Siva Raja Sindiramutty, Noor Zaman Jhanjhi, Chong Eng Tan, Navid Ali Khan, Bhavin Shah, Loveleen Gaur. © 2024. 68 pages.
Body Bottom