Matches in SemOpenAlex for { <https://semopenalex.org/work/W4360982238> ?p ?o ?g. }
Showing items 1 to 63 of
63
with 100 items per page.
- W4360982238 endingPage "348" @default.
- W4360982238 startingPage "313" @default.
- W4360982238 abstract "New legislation in the field of cybersecurity makes public and private institutions legally responsible for keeping the nation's IT infrastructure and data safe under the threat of legal consequences. This sudden shift saw many companies and public institutions scrambling to meet the new legal demands but have often found a lack of professionals, institutions, systems, but mainly information. The laws do oblige most organizations to report incidents and breaches. How to turn this data into information is still up to discussion. It is this that has led us to our research, which consists of defining, comparing, and assessing the methodologies of four major cybersecurity reports, characterizing their interactions with cybersecurity legislation in the Slovak republic to create a base for developing a methodology for Slovakia. The reports we used are Verizon’s Data Breach Investigation Report, IBM’s X-Force Threat Intelligence Report, Ponemon Institute’s Separating Truth from Myth in Cybersecurity, and e-Governance Academy’s National Cybersecurity index. Despite the difference in their approaches, we were able to discover unifying best practices and issues that should not be repeated in the development of a new methodology. Three key best practices are sound statistical methods, timeliness of data, and transparency. Three key issues were lack of transparency in methodology, limitations, bias and reasoning, inconsistency, and loss of relevance due to late publication. Additionally, we have identified that reports of this nature are in line with cybersecurity legislature and national strategies. Such reports may be used as a part of preventative measures by creating broad awareness, increasing interest in the topic, warning organizations of any dangers, and finding ways of creating and improving cybersecurity strategies to build capacities and resilience." @default.
- W4360982238 created "2023-03-30" @default.
- W4360982238 creator A5029734805 @default.
- W4360982238 creator A5041405347 @default.
- W4360982238 creator A5063966896 @default.
- W4360982238 date "2023-01-01" @default.
- W4360982238 modified "2023-09-29" @default.
- W4360982238 title "Comparison of Methodologies Used in Cybersecurity Reports" @default.
- W4360982238 cites W2772199294 @default.
- W4360982238 cites W2913337906 @default.
- W4360982238 cites W4210498693 @default.
- W4360982238 cites W4210947630 @default.
- W4360982238 cites W4213012696 @default.
- W4360982238 doi "https://doi.org/10.1007/978-3-031-25695-0_15" @default.
- W4360982238 hasPublicationYear "2023" @default.
- W4360982238 type Work @default.
- W4360982238 citedByCount "0" @default.
- W4360982238 crossrefType "book-chapter" @default.
- W4360982238 hasAuthorship W4360982238A5029734805 @default.
- W4360982238 hasAuthorship W4360982238A5041405347 @default.
- W4360982238 hasAuthorship W4360982238A5063966896 @default.
- W4360982238 hasConcept C127413603 @default.
- W4360982238 hasConcept C144133560 @default.
- W4360982238 hasConcept C165609540 @default.
- W4360982238 hasConcept C17744445 @default.
- W4360982238 hasConcept C199539241 @default.
- W4360982238 hasConcept C2777351106 @default.
- W4360982238 hasConcept C2780233690 @default.
- W4360982238 hasConcept C38652104 @default.
- W4360982238 hasConcept C39549134 @default.
- W4360982238 hasConcept C41008148 @default.
- W4360982238 hasConcept C69360830 @default.
- W4360982238 hasConcept C83009810 @default.
- W4360982238 hasConceptScore W4360982238C127413603 @default.
- W4360982238 hasConceptScore W4360982238C144133560 @default.
- W4360982238 hasConceptScore W4360982238C165609540 @default.
- W4360982238 hasConceptScore W4360982238C17744445 @default.
- W4360982238 hasConceptScore W4360982238C199539241 @default.
- W4360982238 hasConceptScore W4360982238C2777351106 @default.
- W4360982238 hasConceptScore W4360982238C2780233690 @default.
- W4360982238 hasConceptScore W4360982238C38652104 @default.
- W4360982238 hasConceptScore W4360982238C39549134 @default.
- W4360982238 hasConceptScore W4360982238C41008148 @default.
- W4360982238 hasConceptScore W4360982238C69360830 @default.
- W4360982238 hasConceptScore W4360982238C83009810 @default.
- W4360982238 hasLocation W43609822381 @default.
- W4360982238 hasOpenAccess W4360982238 @default.
- W4360982238 hasPrimaryLocation W43609822381 @default.
- W4360982238 hasRelatedWork W1534853422 @default.
- W4360982238 hasRelatedWork W2344114526 @default.
- W4360982238 hasRelatedWork W2414718913 @default.
- W4360982238 hasRelatedWork W2601969069 @default.
- W4360982238 hasRelatedWork W2748952813 @default.
- W4360982238 hasRelatedWork W2895821261 @default.
- W4360982238 hasRelatedWork W2899084033 @default.
- W4360982238 hasRelatedWork W2911266134 @default.
- W4360982238 hasRelatedWork W3199947322 @default.
- W4360982238 hasRelatedWork W4230378744 @default.
- W4360982238 isParatext "false" @default.
- W4360982238 isRetracted "false" @default.
- W4360982238 workType "book-chapter" @default.