Ali F.A.B.H.Jali M.Z.2024-05-292024-05-2920181742658810.1088/1742-6596/1018/1/0120122-s2.0-85048358452https://www.scopus.com/inward/record.uri?eid=2-s2.0-85048358452&doi=10.1088%2f1742-6596%2f1018%2f1%2f012012&partnerID=40&md5=3b7fb29d4dfa9800bfd4b53208228023https://oarep.usim.edu.my/handle/123456789/10165The development of the digital transformation in the organizations has become more expanding in these present and future years. This is because of the active demand to use the ICT services among all the organizations whether in the government agencies or private sectors. While digital transformation has led manufacturers to incorporate sensors and software analytics into their offerings, the same innovation has also brought pressure to offer clients more accommodating appliance deployment options. So, their needs a well plan to implement the cyber infrastructures and equipment. The cyber security play important role to ensure that the ICT components or infrastructures execute well along the organization's business successful. This paper will present a study of security management models to guideline the security maintenance on existing cyber infrastructures. In order to perform security model for the currently existing cyber infrastructures, combination of the some security workforces and security process of extracting the security maintenance in cyber infrastructures. In the assessment, the focused on the cyber security maintenance within security models in cyber infrastructures and presented a way for the theoretical and practical analysis based on the selected security management models. Then, the proposed model does evaluation for the analysis which can be used to obtain insights into the configuration and to specify desired and undesired configurations. The implemented cyber security maintenance within security management model in a prototype and evaluated it for practical and theoretical scenarios. Furthermore, a framework model is presented which allows the evaluation of configuration changes in the agile and dynamic cyber infrastructure environments with regard to properties like vulnerabilities or expected availability. In case of a security perspective, this evaluation can be used to monitor the security levels of the configuration over its lifetime and to indicate degradations.en-UScyber securitydigital transformationsecurity maintenancesecurity management modelHuman-Technology Centric in Cyber Security Maintenance for Digital Transformation EraJ. Phys. Conf. Ser.Conference Paper1018112012