Publication:
Human-Technology Centric in Cyber Security Maintenance for Digital Transformation Era

dc.Conferencecode136931
dc.Conferencedate25 November 2017 through 27 November 2017
dc.Conferencename1st International Conference on Big Data and Cloud Computing, ICoBiC 2017
dc.contributor.affiliationsUniversiti Tun Hussein Onn Malaysia (UTHM)
dc.contributor.affiliationsUniversiti Sains Islam Malaysia (USIM)
dc.contributor.affiliationsFaculty of Science and Technology
dc.contributor.authorAli F.A.B.H.en_US
dc.contributor.authorJali M.Z.en_US
dc.date.accessioned2024-05-29T02:01:23Z
dc.date.available2024-05-29T02:01:23Z
dc.date.issued2018
dc.description.abstractThe development of the digital transformation in the organizations has become more expanding in these present and future years. This is because of the active demand to use the ICT services among all the organizations whether in the government agencies or private sectors. While digital transformation has led manufacturers to incorporate sensors and software analytics into their offerings, the same innovation has also brought pressure to offer clients more accommodating appliance deployment options. So, their needs a well plan to implement the cyber infrastructures and equipment. The cyber security play important role to ensure that the ICT components or infrastructures execute well along the organization's business successful. This paper will present a study of security management models to guideline the security maintenance on existing cyber infrastructures. In order to perform security model for the currently existing cyber infrastructures, combination of the some security workforces and security process of extracting the security maintenance in cyber infrastructures. In the assessment, the focused on the cyber security maintenance within security models in cyber infrastructures and presented a way for the theoretical and practical analysis based on the selected security management models. Then, the proposed model does evaluation for the analysis which can be used to obtain insights into the configuration and to specify desired and undesired configurations. The implemented cyber security maintenance within security management model in a prototype and evaluated it for practical and theoretical scenarios. Furthermore, a framework model is presented which allows the evaluation of configuration changes in the agile and dynamic cyber infrastructure environments with regard to properties like vulnerabilities or expected availability. In case of a security perspective, this evaluation can be used to monitor the security levels of the configuration over its lifetime and to indicate degradations.en_US
dc.description.natureFinalen_US
dc.identifier.ArtNo12012
dc.identifier.doi10.1088/1742-6596/1018/1/012012
dc.identifier.issn17426588
dc.identifier.issue1
dc.identifier.scopus2-s2.0-85048358452
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85048358452&doi=10.1088%2f1742-6596%2f1018%2f1%2f012012&partnerID=40&md5=3b7fb29d4dfa9800bfd4b53208228023
dc.identifier.urihttps://oarep.usim.edu.my/handle/123456789/10165
dc.identifier.volume1018
dc.languageEnglish
dc.language.isoen_USen_US
dc.publisherInstitute of Physics Publishingen_US
dc.relation.ispartofOpen Accessen_US
dc.relation.ispartofJournal of Physics: Conference Series
dc.sourceScopus
dc.subjectcyber securityen_US
dc.subjectdigital transformationen_US
dc.subjectsecurity maintenanceen_US
dc.subjectsecurity management modelen_US
dc.titleHuman-Technology Centric in Cyber Security Maintenance for Digital Transformation Eraen_US
dc.title.alternativeJ. Phys. Conf. Ser.en_US
dc.typeConference Paperen_US
dspace.entity.typePublication

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Human-Technology Centric in Cyber Security Maintenance for Digital Transformation Era.pdf
Size:
730.8 KB
Format:
Adobe Portable Document Format

Collections