[HTML][HTML] Review of Smart-Home Security Using the Internet of Things
G Vardakis, G Hatzivasilis, E Koutsaki, N Papadakis - Electronics, 2024 - mdpi.com
As the Internet of Things (IoT) continues to revolutionize the way we interact with our living
spaces, the concept of smart homes has become increasingly prevalent. However, along …
spaces, the concept of smart homes has become increasingly prevalent. However, along …
[HTML][HTML] Risk Assessment for Cyber Resilience of Critical Infrastructures: Methods, Governance, and Standards
As future infrastructures increasingly rely on digital systems, their exposure to cyber threats
has grown significantly. The complex and hyper-connected nature of these systems presents …
has grown significantly. The complex and hyper-connected nature of these systems presents …
Integrated Methodology for Information Security Risk Management using ISO 27005: 2018 and NIST SP 800-30 for Insurance Sector
AP Putra, B Soewito - International Journal of Advanced …, 2023 - search.proquest.com
The development of Information and Communication Technology (ICT) in the Industrial
Revolution 4.0 era shows very fast and disruptive developments that encourage increased …
Revolution 4.0 era shows very fast and disruptive developments that encourage increased …
Designing information security risk management on bali regional police command center based on ISO 27005
IMM Putra, K Mutijarsa - 2021 3rd East Indonesia Conference …, 2021 - ieeexplore.ieee.org
The application of information technology in government agencies is in line with Indonesian
Presidential Regulation 95/2018 concerning Electronic-Based Government Systems …
Presidential Regulation 95/2018 concerning Electronic-Based Government Systems …
Impact of Implementation of Information Security Risk Management and Security Controls on Cyber Security Maturity (A Case Study at Data Management Applications …
EJW Endro Joko Wibowo… - … Informasi (Journal of …, 2022 - eprints.triatmamulya.ac.id
Information security is an important concern for governments and industry due to the
increase in cyber attacks during Covid-19. The government is obliged to maintain …
increase in cyber attacks during Covid-19. The government is obliged to maintain …
Strategic Approaches in Network Communication and Information Security Risk Assessment
N Alsafwani, Y Fazea, F Alnajjar - Information, 2024 - mdpi.com
Risk assessment is a critical sub-process in information security risk management (ISRM)
that is used to identify an organization's vulnerabilities and threats as well as evaluate …
that is used to identify an organization's vulnerabilities and threats as well as evaluate …
Cyber-Risk Management Planning Using NIST CSF V1. 1, ISO/IEC 27005: 2018, and NIST SP 800-53 Revision 5 (A Study Case to ABC Organization)
EHN Safitri, H Kabetta - 2023 IEEE International Conference on …, 2023 - ieeexplore.ieee.org
Digital transformation continues to be carried out throughout the government and private
sectors which has led to an increase in the quality of service to the community. The rapid …
sectors which has led to an increase in the quality of service to the community. The rapid …
The design of information security risk management: a case study human resources information system at XYZ University
Human Resource Information System (HRIS) as one of the vital information systems at XYZ
University, is expected to provide support in accelerating the achievement of XYZ …
University, is expected to provide support in accelerating the achievement of XYZ …
Implementation of a KPI Focused e-QMS: A Case Study in the Aerospace & Defense Industry
JY Shin, WS Shin - Journal of Korean Society for Quality …, 2023 - koreascience.kr
Purpose: The purpose of this paper is to design an integrated informatization system that
can manage quality & KPI by integrating management systems in the aerospace and …
can manage quality & KPI by integrating management systems in the aerospace and …
Information security risk management framework for a governmental educational institute
F Al-Mudaires, A Al-Samawi, A Aljughaiman… - Journal of Information …, 2023 - ir.uitm.edu.my
As the high increase usage of technology, the higher the risks that are associated with it.
Therefore, it has become a necessity for organizations to rely on an information security risk …
Therefore, it has become a necessity for organizations to rely on an information security risk …