Abstract
As a result of the emergence of new business paradigms and the development of the digital economy, the interaction between operations, services, things, and software through numerous fields and communities may now be processed through value chains networks. Despite the integration of all data networks, computing models, and distributed software that offers a broader cloud computing, the security solution is have a serious important impact and missing or weak, and more work is needed to strengthen security requirements such as mutual entity trustworthiness, Access controls and identity management, as well as data protection, are all aspects of detecting and preventing attacks or threats. Various international organizations, academic universities and institutions, and organizations have been working diligently to establish cybersecurity frameworks (CSF) in order to combat cybersecurity threats by (CSFs). This paper describes CSFs from the perspectives of standard organizations such as ISO CSF and NIST CSF, as well as several proposed frameworks from researchers, and discusses briefly their characteristics and features. The common ideas described in this study could be helpful for creating a CSF model in general.
Cite
CITATION STYLE
Khaleefah, A. D., & M. Al-Mashhadi, H. (2023). Methodologies, Requirements and Challenges of Cybersecurity Frameworks: A Review. International Journal of Wireless and Microwave Technologies, 13(1), 1–13. https://doi.org/10.5815/ijwmt.2023.01.01
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.