Cargando…

Cybersecurity Enterprises Policies: A Comparative Study

Cybersecurity is a critical issue that must be prioritized not just by enterprises of all kinds, but also by national security. To safeguard an organization’s cyberenvironments, information, and communication technologies, many enterprises are investing substantially in cybersecurity these days. One...

Descripción completa

Detalles Bibliográficos
Autores principales: Mishra, Alok, Alzoubi, Yehia Ibrahim, Gill, Asif Qumer, Anwar, Memoona Javeria
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8778887/
https://www.ncbi.nlm.nih.gov/pubmed/35062504
http://dx.doi.org/10.3390/s22020538
_version_ 1784637438806720512
author Mishra, Alok
Alzoubi, Yehia Ibrahim
Gill, Asif Qumer
Anwar, Memoona Javeria
author_facet Mishra, Alok
Alzoubi, Yehia Ibrahim
Gill, Asif Qumer
Anwar, Memoona Javeria
author_sort Mishra, Alok
collection PubMed
description Cybersecurity is a critical issue that must be prioritized not just by enterprises of all kinds, but also by national security. To safeguard an organization’s cyberenvironments, information, and communication technologies, many enterprises are investing substantially in cybersecurity these days. One part of the cyberdefense mechanism is building an enterprises’ security policies library, for consistent implementation of security controls. Significant and common cybersecurity policies of various enterprises are compared and explored in this study to provide robust and comprehensive cybersecurity knowledge that can be used in various enterprises. Several significant common security policies were identified and discussed in this comprehensive study. This study identified 10 common cybersecurity policy aspects in five enterprises: healthcare, finance, education, aviation, and e-commerce. We aimed to build a strong infrastructure in each business, and investigate the security laws and policies that apply to all businesses in each sector. Furthermore, the findings of this study reveal that the importance of cybersecurity requirements differ across multiple organizations. The choice and applicability of cybersecurity policies are determined by the type of information under control and the security requirements of organizations in relation to these policies.
format Online
Article
Text
id pubmed-8778887
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-87788872022-01-22 Cybersecurity Enterprises Policies: A Comparative Study Mishra, Alok Alzoubi, Yehia Ibrahim Gill, Asif Qumer Anwar, Memoona Javeria Sensors (Basel) Article Cybersecurity is a critical issue that must be prioritized not just by enterprises of all kinds, but also by national security. To safeguard an organization’s cyberenvironments, information, and communication technologies, many enterprises are investing substantially in cybersecurity these days. One part of the cyberdefense mechanism is building an enterprises’ security policies library, for consistent implementation of security controls. Significant and common cybersecurity policies of various enterprises are compared and explored in this study to provide robust and comprehensive cybersecurity knowledge that can be used in various enterprises. Several significant common security policies were identified and discussed in this comprehensive study. This study identified 10 common cybersecurity policy aspects in five enterprises: healthcare, finance, education, aviation, and e-commerce. We aimed to build a strong infrastructure in each business, and investigate the security laws and policies that apply to all businesses in each sector. Furthermore, the findings of this study reveal that the importance of cybersecurity requirements differ across multiple organizations. The choice and applicability of cybersecurity policies are determined by the type of information under control and the security requirements of organizations in relation to these policies. MDPI 2022-01-11 /pmc/articles/PMC8778887/ /pubmed/35062504 http://dx.doi.org/10.3390/s22020538 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Mishra, Alok
Alzoubi, Yehia Ibrahim
Gill, Asif Qumer
Anwar, Memoona Javeria
Cybersecurity Enterprises Policies: A Comparative Study
title Cybersecurity Enterprises Policies: A Comparative Study
title_full Cybersecurity Enterprises Policies: A Comparative Study
title_fullStr Cybersecurity Enterprises Policies: A Comparative Study
title_full_unstemmed Cybersecurity Enterprises Policies: A Comparative Study
title_short Cybersecurity Enterprises Policies: A Comparative Study
title_sort cybersecurity enterprises policies: a comparative study
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8778887/
https://www.ncbi.nlm.nih.gov/pubmed/35062504
http://dx.doi.org/10.3390/s22020538
work_keys_str_mv AT mishraalok cybersecurityenterprisespoliciesacomparativestudy
AT alzoubiyehiaibrahim cybersecurityenterprisespoliciesacomparativestudy
AT gillasifqumer cybersecurityenterprisespoliciesacomparativestudy
AT anwarmemoonajaveria cybersecurityenterprisespoliciesacomparativestudy