Publication:
Human-Technology Centric In Cyber Security Maintenance For Digital Transformation Era

dc.ConferencecodeCtr Excellence Geopolymer & Green Technol
dc.ConferencedateNOV 25-27, 2017
dc.ConferencelocationKuching, MALAYSIA
dc.Conferencename1st International Conference on Big Data and Cloud Computing (ICoBiC)
dc.contributor.authorAli, FABen_US
dc.contributor.authorJali, MZen_US
dc.date.accessioned2024-05-29T03:00:17Z
dc.date.available2024-05-29T03:00:17Z
dc.date.issued2018
dc.description.abstractThe development of the digital transformation in the organizations has become more expanding in these present and future years. This is because of the active demand to use the ICT services among all the organizations whether in the government agencies or private sectors. While digital transformation has led manufacturers to incorporate sensors and software analytics into their offerings, the same innovation has also brought pressure to offer clients more accommodating appliance deployment options. So, their needs a well plan to implement the cyber infrastructures and equipment. The cyber security play important role to ensure that the ICT components or infrastructures execute well along the organization's business successful. This paper will present a study of security management models to guideline the security maintenance on existing cyber infrastructures. In order to perform security model for the currently existing cyber infrastructures, combination of the some security workforces and security process of extracting the security maintenance in cyber infrastructures. In the assessment, the focused on the cyber security maintenance within security models in cyber infrastructures and presented a way for the theoretical and practical analysis based on the selected security management models. Then, the proposed model does evaluation for the analysis which can be used to obtain insights into the configuration and to specify desired and undesired configurations. The implemented cyber security maintenance within security management model in a prototype and evaluated it for practical and theoretical scenarios. Furthermore, a framework model is presented which allows the evaluation of configuration changes in the agile and dynamic cyber infrastructure environments with regard to properties like vulnerabilities or expected availability. In case of a security perspective, this evaluation can be used to monitor the security levels of the configuration over its lifetime and to indicate degradations.
dc.identifier.doi10.1088/1742-6596/1018/1/012012
dc.identifier.isbn1742-6596
dc.identifier.issn1742-6588
dc.identifier.scopusWOS:000436345700011
dc.identifier.urihttps://oarep.usim.edu.my/handle/123456789/11775
dc.identifier.volume1018
dc.languageEnglish
dc.language.isoen_US
dc.publisherIop Publishing Ltden_US
dc.relation.ispartof1st International Conference On Big Data And Cloud Computing (Icobic) 2017
dc.sourceWeb Of Science (ISI)
dc.subjectcyber securityen_US
dc.subjectsecurity maintenanceen_US
dc.subjectdigital transformationen_US
dc.subjectsecurity management modelen_US
dc.titleHuman-Technology Centric In Cyber Security Maintenance For Digital Transformation Era
dc.typeProceedings Paperen_US
dspace.entity.typePublication

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Human-Technology Centric In Cyber Security Maintenance For Digital Transformation Era.pdf
Size:
549.15 KB
Format:
Adobe Portable Document Format
Description:
Human-Technology Centric In Cyber Security Maintenance For Digital Transformation Era