Full Paper View Go Back
The role of Cyber Security and Human-Technology Centric for Digital Transformation
Yakubu Ajiji Makeri1
Section:Research Paper, Product Type: Isroset-Journal
Vol.6 ,
Issue.6 , pp.53-59, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijsrcse/v6i6.5359
Online published on Dec 31, 2018
Copyright © Yakubu Ajiji Makeri . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Yakubu Ajiji Makeri, “The role of Cyber Security and Human-Technology Centric for Digital Transformation,” International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.6, pp.53-59, 2018.
MLA Style Citation: Yakubu Ajiji Makeri "The role of Cyber Security and Human-Technology Centric for Digital Transformation." International Journal of Scientific Research in Computer Science and Engineering 6.6 (2018): 53-59.
APA Style Citation: Yakubu Ajiji Makeri, (2018). The role of Cyber Security and Human-Technology Centric for Digital Transformation. International Journal of Scientific Research in Computer Science and Engineering, 6(6), 53-59.
BibTex Style Citation:
@article{Makeri_2018,
author = {Yakubu Ajiji Makeri},
title = {The role of Cyber Security and Human-Technology Centric for Digital Transformation},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {12 2018},
volume = {6},
Issue = {6},
month = {12},
year = {2018},
issn = {2347-2693},
pages = {53-59},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=1045},
doi = {https://doi.org/10.26438/ijcse/v6i6.5359}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i6.5359}
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=1045
TI - The role of Cyber Security and Human-Technology Centric for Digital Transformation
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Yakubu Ajiji Makeri
PY - 2018
DA - 2018/12/31
PB - IJCSE, Indore, INDIA
SP - 53-59
IS - 6
VL - 6
SN - 2347-2693
ER -
Abstract :
Force point’s human-centric cyber security systems protect your most valuable assets at the human point; the development of the digital transformation in the organizations has become more expanding in these present and future years. This is because of the active demand to use the ICT services among all the organizations whether in the government agencies or private sectors. While digital transformation has led manufacturers to incorporate sensors and software analytics into their offerings, the same innovation has also brought pressure to offer clients more accommodating appliance deployment options. So, their needs a well plan to implement the cyber infrastructures and equipment. The cyber security play important role to ensure that the ICT components or infrastructures execute well along the organization’s business successful. This paper will present a study of security management models to guideline the security maintenance on existing cyber infrastructures. In order to perform security model for the currently existing cyber infrastructures, “Mobile devices and applications involves ensuring mobile devices and the applications used on these devices are secure and meet specified standards,” he continues. “Enable features such as conditional access to ensure applications and data are kept secure and separate from personal information on user owned devices. combination of the some security workforces and security process of extracting the security maintenance in cyber infrastructures. In the assessment, the focused on the cyber security maintenance within security models in cyber infrastructures and presented a way for the theoretical and practical analysis based on the selected security management models. Then, the proposed model does evaluation for the analysis which can be used to obtain insights into the configuration and to specify desired and undesired configurations. The implemented cyber security maintenance within security management model in a prototype and evaluated it for practical and theoretical scenarios. Furthermore, a framework model is presented which allows the evaluation of configuration changes in the agile and dynamic cyber infrastructure environments with regard to properties like vulnerabilities or expected availability. In case of a security perspective, this evaluation can be used to monitor the security levels of the configuration over its lifetime and to indicate degradations.
Key-Words / Index Term :
Cyber Security, Human technology, digital transformation
References :
[1] J. May, Analyzing the socio-organizational constructs for IS security within organizations, in: S. Furnell, P. Dowland (Eds.), in: Proceedings of the 11th IFIP TC11. 1 Working Conference on Information Security Management, Richmond, VA, 2008.
[2] K.H. Guo, Y. Yuan, The effects of multilevel sanctions on information security violations: a mediating model, Inf. Manage.
[4] A. Simmonds, P. Sandilands, L.v. Ekert, An ontology for network security attacks, in: S. Manandhar, J. Austin, U. Desai, Y. Oyanagi, A. Talukder (Eds.), Applied Computing, Springer, Berlin, 2004,
[5] D. Trcek, Security models: refocusing on the human factor, Computer 39, 2006,
[6] M.d. Vivo, G.O.d. Vivo, G. Isern, Internet security attacks at the basic levels, ACM SIGOPS Oper.
[7] ISO/IEC 17799 (2005), Information Technology – Security Techniques – Code of Practice for Information Services, International Organization for Standardization, Geneva.
[8] J. Fonseca, M. Vieira and H. Madeira, "Evaluation of Web Security Mechanisms using Vulnerability and Attack Injection," IEEE Transactions on Dependable and Secure Computing,
[9] C. Melara, J.M. Sarriegui, J.J. Gonzalez, A. Sawicka, D.L. Cooke, A system dynamics model of an insider attack on an information system, in: J.J. Gonzalez (Ed.), From Modeling to Managing Security: a System Dynamics Approach, Norwegian Academic Press, Kristiansand, Norway,
[10] C.E. Landwehr, Formal models for computer security, ACM Computer.
[11] D.L. Nazareth, J. Choi, Information security management: a system dynamics approach, Eighteenth Americas Conference on Information Systems (AMCIS- 2012), Seattle, WA, 2012, Paper 3.
[10] D. Trcek, Using system dynamics for managing risks in information systems, WSEAS Trans. Inf. Sci.
[12] M.E. Whitman, H.J. Mattord, Principles of Information Security, fourth ed., Course Technology, Boston, MA, 2014.
[13] M.A. Alnatheer, A conceptual model to understand information security culture, Int. J. Soc. Sci. Hum.
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at support@isroset.org or view contact page for more details.