{"title":"Cybersecurity Management for Incident Response","authors":"Alin Zamfiroiu, Ramesh C Sharma","doi":"10.54851/v4i1y202208","DOIUrl":null,"url":null,"abstract":": In information technology, security is the protection of information assets through the use of technology, processes and training. There will always be situations of attack on software systems but the software must continue to work properly under such potential risks. The security process assumes and is required to provide three important elements: integrity, authentication, and availability. Security is a set of processes and techniques implemented to protect private information in electronic or printed format against modification, destruction or unauthorized access. This paper discusses effective management of cybersecurity for incident response.","PeriodicalId":127637,"journal":{"name":"Romanian Cyber Security Journal","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Romanian Cyber Security Journal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.54851/v4i1y202208","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
: In information technology, security is the protection of information assets through the use of technology, processes and training. There will always be situations of attack on software systems but the software must continue to work properly under such potential risks. The security process assumes and is required to provide three important elements: integrity, authentication, and availability. Security is a set of processes and techniques implemented to protect private information in electronic or printed format against modification, destruction or unauthorized access. This paper discusses effective management of cybersecurity for incident response.