How Do Organizations Seek Cyber Assurance? Investigations on the Adoption of the Common Criteria and Beyond
Cyber assurance, which is the ability to operate under the onslaught of cyber attacks and other unexpected events, is essential for organizations facing inundating security threats on a daily basis. Organizations usually employ multiple strategies to conduct risk management to achieve cyber assuranc...
Main Authors: | Nan Sun, Chang-Tsun Li, Hin Chan, Md Zahidul Islam, Md Rafiqul Islam, Warren Armstrong |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2022-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9810315/ |
Similar Items
-
Defining Security Requirements With the Common Criteria: Applications, Adoptions, and Challenges
by: Nan Sun, et al.
Published: (2022-01-01) -
On the Development of a Protection Profile Module for Encryption Key Management Components
by: Nan Sun, et al.
Published: (2023-01-01) -
Crowdsourcing cyber security: a property rights view of exclusion and theft on the information commons
by: Gary Shiffman, et al.
Published: (2013-02-01) -
ANTIVIRUS SOFTWARE AND INDUSTRIAL CYBER SECURITY SYSTEM CERTIFICATION IN RUSSIA
by: M. A. Nazarenko, et al.
Published: (2019-02-01) -
Enhancing investment through cyber security policies – Case of Albania
by: Vilma TOMCO, et al.
Published: (2020-03-01)