Skip to main content

Cybersecurity: Practice

  • Living reference work entry
  • First Online:
Encyclopedia of Security and Emergency Management

Definition

Cybersecurity involves the application and management of techniques with the aim of protecting the confidentiality, integrity, and availability of information and information assets in cyberspace.

Introduction

The widespread use of electronic information processing coupled with the emergence of business conducted through the Internet has fueled the need for organizations to protect proprietary and customer information from malicious cyber actors and nations (Grispos et al. 2017). As a result, many organizations have recognized the importance of implementing effective cybersecurity practices. According to the International Organization for Standardization/International Electrotechnical Commission (ISO/IEC), cybersecurity encompasses the preservation of confidentiality, integrity, and availability of information in cyberspace (International Organization for Standardization/International Electrotechnical Commission 2012). Confidentiality refers to “the protection of sensitive...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  • Eloff, J. H., & Eloff, M. (2003). Information security management: A new paradigm. Paper presented at the Proceedings of the 2003 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology.

    Google Scholar 

  • Grispos, G., Glisson, W. B., & Storer, T. (2013). Cloud security challenges: Investigating policies, standards, and guidelines in a fortune 500 organization. Paper presented at the 21st European Conference on Information Systems, Utrecht.

    Google Scholar 

  • Grispos, G., Jesús, G-G., Liliana, P., & Bashar N. (2017). Are you ready? Towards the engineering of forensic-ready systems. In 2017 11th International Conference on Research Challenges in Information Science (RCIS), pp. 328–333. IEEE.

    Google Scholar 

  • International Organization for Standardization/International Electrotechnical Commission (2012). Information technology – Security techniques – Guidelines for cybersecurity. Retrieved from https://www.iso.org/obp/ui/#iso:std:iso-iec:27032:ed-1:v1:en

  • International Organization for Standardization/International Electrotechnical Commission (2013). Information technology – Security techniques – Code of practice for information security controls.

    Google Scholar 

  • International Organization for Standardization/International Electrotechnical Commission (2014). ISO/IEC 27000 – Information security management systems – Overview and vocabulary.

    Google Scholar 

  • National Institute of Standards and Technology (2018). Framework for improving critical infrastructure cybersecurity.

    Google Scholar 

  • PCI Security Standards Council (2018). Payment Card Industry (PCI) Data Security Standard (DSS), version 3.2.1.

    Google Scholar 

  • Peltier, T. R. (2013). Information security fundamentals. Boca Raton: CRC Press.

    Book  Google Scholar 

  • Ross, R. (2007). Managing enterprise security risk with NIST standards. IEEE Computer, 40(8), 88–91.

    Article  Google Scholar 

  • Siponen, M. (2006). Information security standards focus on the existence of process, not its content. Communications of the ACM, 49(8), 97–100.

    Article  Google Scholar 

  • Siponen, M., & Willison, R. (2009). Information security management standards: Problems and solutions. Information & Management, 46(5), 267–270.

    Article  Google Scholar 

  • The House of Representatives of the State of Washington (2010). Financial information security breaches – Credit and debit cards, chapter 151, laws of 2010 – House Bill 1149.

    Google Scholar 

  • Von Solms, B. (2000). Information security – The third wave? Computers & Security, 19(7), 615–615.

    Article  Google Scholar 

  • Von Solms, B. (2006). Information security – The fourth wave. Computers & Security, 25(3), 165–168.

    Article  Google Scholar 

  • Wiander, T. (2007). Implementing the ISO/IEC 17799 standard in practice-findings from small and medium sized software organisations. Paper presented at the 5th International Conference on Standardization and Innovation in Information Technology, 2007. SIIT 2007.

    Google Scholar 

Further Reading

  • Christou, G. (2016). Cybersecurity in the European Union: Resilience and adaptability in governance policy. Springer. Basingstoke, United Kingdom.

    Google Scholar 

  • Donaldson, S. E., Siegel, S. G., Williams, C. K., & Aslam, A. (2015). Enterprise cybersecurity – How to build a successful cyberdefense program against advanced threats. New York: Apress.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to George Grispos .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Grispos, G. (2019). Cybersecurity: Practice. In: Shapiro, L., Maras, MH. (eds) Encyclopedia of Security and Emergency Management. Springer, Cham. https://doi.org/10.1007/978-3-319-69891-5_81-1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-69891-5_81-1

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-69891-5

  • Online ISBN: 978-3-319-69891-5

  • eBook Packages: Springer Reference Law and CriminologyReference Module Humanities and Social SciencesReference Module Business, Economics and Social Sciences

Publish with us

Policies and ethics