Cybersecurity Management for Incident Response

Alin Zamfiroiu, Ramesh C Sharma
{"title":"Cybersecurity Management for Incident Response","authors":"Alin Zamfiroiu, Ramesh C Sharma","doi":"10.54851/v4i1y202208","DOIUrl":null,"url":null,"abstract":": In information technology, security is the protection of information assets through the use of technology, processes and training. There will always be situations of attack on software systems but the software must continue to work properly under such potential risks. The security process assumes and is required to provide three important elements: integrity, authentication, and availability. Security is a set of processes and techniques implemented to protect private information in electronic or printed format against modification, destruction or unauthorized access. This paper discusses effective management of cybersecurity for incident response.","PeriodicalId":127637,"journal":{"name":"Romanian Cyber Security Journal","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Romanian Cyber Security Journal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.54851/v4i1y202208","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

: In information technology, security is the protection of information assets through the use of technology, processes and training. There will always be situations of attack on software systems but the software must continue to work properly under such potential risks. The security process assumes and is required to provide three important elements: integrity, authentication, and availability. Security is a set of processes and techniques implemented to protect private information in electronic or printed format against modification, destruction or unauthorized access. This paper discusses effective management of cybersecurity for incident response.
事件响应的网络安全管理
在信息技术中,安全是通过使用技术、流程和培训来保护信息资产。软件系统总是会遇到攻击的情况,但软件必须在这种潜在的风险下继续正常工作。安全流程假定并要求提供三个重要元素:完整性、身份验证和可用性。安全是一套程序和技术,用以保护电子或印刷形式的私人信息,防止被修改、破坏或未经授权的访问。本文讨论了事件响应的有效网络安全管理。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信