Cargando…
Cybersecurity Enterprises Policies: A Comparative Study
Cybersecurity is a critical issue that must be prioritized not just by enterprises of all kinds, but also by national security. To safeguard an organization’s cyberenvironments, information, and communication technologies, many enterprises are investing substantially in cybersecurity these days. One...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8778887/ https://www.ncbi.nlm.nih.gov/pubmed/35062504 http://dx.doi.org/10.3390/s22020538 |
_version_ | 1784637438806720512 |
---|---|
author | Mishra, Alok Alzoubi, Yehia Ibrahim Gill, Asif Qumer Anwar, Memoona Javeria |
author_facet | Mishra, Alok Alzoubi, Yehia Ibrahim Gill, Asif Qumer Anwar, Memoona Javeria |
author_sort | Mishra, Alok |
collection | PubMed |
description | Cybersecurity is a critical issue that must be prioritized not just by enterprises of all kinds, but also by national security. To safeguard an organization’s cyberenvironments, information, and communication technologies, many enterprises are investing substantially in cybersecurity these days. One part of the cyberdefense mechanism is building an enterprises’ security policies library, for consistent implementation of security controls. Significant and common cybersecurity policies of various enterprises are compared and explored in this study to provide robust and comprehensive cybersecurity knowledge that can be used in various enterprises. Several significant common security policies were identified and discussed in this comprehensive study. This study identified 10 common cybersecurity policy aspects in five enterprises: healthcare, finance, education, aviation, and e-commerce. We aimed to build a strong infrastructure in each business, and investigate the security laws and policies that apply to all businesses in each sector. Furthermore, the findings of this study reveal that the importance of cybersecurity requirements differ across multiple organizations. The choice and applicability of cybersecurity policies are determined by the type of information under control and the security requirements of organizations in relation to these policies. |
format | Online Article Text |
id | pubmed-8778887 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-87788872022-01-22 Cybersecurity Enterprises Policies: A Comparative Study Mishra, Alok Alzoubi, Yehia Ibrahim Gill, Asif Qumer Anwar, Memoona Javeria Sensors (Basel) Article Cybersecurity is a critical issue that must be prioritized not just by enterprises of all kinds, but also by national security. To safeguard an organization’s cyberenvironments, information, and communication technologies, many enterprises are investing substantially in cybersecurity these days. One part of the cyberdefense mechanism is building an enterprises’ security policies library, for consistent implementation of security controls. Significant and common cybersecurity policies of various enterprises are compared and explored in this study to provide robust and comprehensive cybersecurity knowledge that can be used in various enterprises. Several significant common security policies were identified and discussed in this comprehensive study. This study identified 10 common cybersecurity policy aspects in five enterprises: healthcare, finance, education, aviation, and e-commerce. We aimed to build a strong infrastructure in each business, and investigate the security laws and policies that apply to all businesses in each sector. Furthermore, the findings of this study reveal that the importance of cybersecurity requirements differ across multiple organizations. The choice and applicability of cybersecurity policies are determined by the type of information under control and the security requirements of organizations in relation to these policies. MDPI 2022-01-11 /pmc/articles/PMC8778887/ /pubmed/35062504 http://dx.doi.org/10.3390/s22020538 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Mishra, Alok Alzoubi, Yehia Ibrahim Gill, Asif Qumer Anwar, Memoona Javeria Cybersecurity Enterprises Policies: A Comparative Study |
title | Cybersecurity Enterprises Policies: A Comparative Study |
title_full | Cybersecurity Enterprises Policies: A Comparative Study |
title_fullStr | Cybersecurity Enterprises Policies: A Comparative Study |
title_full_unstemmed | Cybersecurity Enterprises Policies: A Comparative Study |
title_short | Cybersecurity Enterprises Policies: A Comparative Study |
title_sort | cybersecurity enterprises policies: a comparative study |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8778887/ https://www.ncbi.nlm.nih.gov/pubmed/35062504 http://dx.doi.org/10.3390/s22020538 |
work_keys_str_mv | AT mishraalok cybersecurityenterprisespoliciesacomparativestudy AT alzoubiyehiaibrahim cybersecurityenterprisespoliciesacomparativestudy AT gillasifqumer cybersecurityenterprisespoliciesacomparativestudy AT anwarmemoonajaveria cybersecurityenterprisespoliciesacomparativestudy |