Advertisement

Cyber Security Management

  • Izzat Alsmadi
Chapter

Abstract

Cyber security management integrates different processes to achieve the overall goal of corporate systems’ and assets’ protection, Fig. 10.1 (SANS, Dexter 2002).

Bibliography

  1. Dexter JH (2002) The Cyber Security Management System: a conceptual mapping. SANS Institute. www.SANS.org
  2. Kayes I, Iamnitchi A (2015) A survey on privacy and security in online social networks. arXiv preprint arXiv 1504.03342Google Scholar
  3. Krutz R, Vines R (2004) The CISSP prep guide, 2nd edn. Wiley, ChichesterGoogle Scholar
  4. NIST Security self-assessment guide for information technology systems. http://www.itl.nist.gov/lab/bulletns/bltnsep01.htm. Accessed 9 January 2014
  5. Panaousis E, Fielder A, Malacaria P, Hankin C, Smeraldi F (2014) Cybersecurity games and investments: a decision support approach decision and game theory for security. Springer, New York, pp 266–286zbMATHGoogle Scholar
  6. Stair RM, Reynolds G (2016) Principles of information systems, 11 edn. ISBN-10:1133629660/ISBN-13:9781133629665Google Scholar
  7. Statista (2018) The statistics portal, www.statista.com

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Izzat Alsmadi
    • 1
  1. 1.Texas A&M UniversitySan AntonioUSA

Personalised recommendations