Methodologies, Requirements and Challenges of Cybersecurity Frameworks: A Review

  • Khaleefah A
  • M. Al-Mashhadi H
N/ACitations
Citations of this article
22Readers
Mendeley users who have this article in their library.

Abstract

As a result of the emergence of new business paradigms and the development of the digital economy, the interaction between operations, services, things, and software through numerous fields and communities may now be processed through value chains networks. Despite the integration of all data networks, computing models, and distributed software that offers a broader cloud computing, the security solution is have a serious important impact and missing or weak, and more work is needed to strengthen security requirements such as mutual entity trustworthiness, Access controls and identity management, as well as data protection, are all aspects of detecting and preventing attacks or threats. Various international organizations, academic universities and institutions, and organizations have been working diligently to establish cybersecurity frameworks (CSF) in order to combat cybersecurity threats by (CSFs). This paper describes CSFs from the perspectives of standard organizations such as ISO CSF and NIST CSF, as well as several proposed frameworks from researchers, and discusses briefly their characteristics and features. The common ideas described in this study could be helpful for creating a CSF model in general.

Cite

CITATION STYLE

APA

Khaleefah, A. D., & M. Al-Mashhadi, H. (2023). Methodologies, Requirements and Challenges of Cybersecurity Frameworks: A Review. International Journal of Wireless and Microwave Technologies, 13(1), 1–13. https://doi.org/10.5815/ijwmt.2023.01.01

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free