Authors :
Kamal Aldin Yousif Yaseen; Israa Abdulrauof Osman
Volume/Issue :
Volume 10 - 2025, Issue 2 - February
Google Scholar :
https://tinyurl.com/3abx69dz
Scribd :
https://tinyurl.com/38879yz6
DOI :
https://doi.org/10.5281/zenodo.14942742
Abstract :
In this paper several key elements will be addressed to enhance the organizations cybersecurity posture and
align it with its business objectives, the introductory letter outlined the organizations recent assessment of cybersecurity
policies and vulnerabilities, emphasizing the need for a proactive cybersecurity approach to protect critical information
assets. The significance of strong cybersecurity measures in the face of evolving cyber threats was underscored,
highlighting the potential catastrophic implications of data breaches. The call to action for all stakeholders to embrace and
drive best cybersecurity practices, in line with industry frameworks like the NIST Framework, was also emphasized.
Keywords :
Cybersecurity, Phishing, Measures, Incident, Patching, Awareness, Vulnerability.
References :
- Anderson, Ross, and Tyler Moore. "The economics of information security." science 314, no. 5799 (2006), 610-613.
- Buchanan, Ben. “The cybersecurity dilemma Hacking, trust, and fear between nations”, Oxford University Press, 2016.
- Ciampa, M., “Security Awareness: Applying Practical Security in Your World”, Cengage Learning, 2017.
- Vasiliki Tzavara, Savvas Vassiliadis, “Tracing the evolution of cyber resilience: a historical and conceptual review”, International Journal of Information, 2024.
- ENISA, Definition of cybersecurity gaps and overlaps in standardization (2015). https://www.enisa.europa.eu/publications/definition-of-cybersecurity
- Lewallen, J., “Emerging technologies and problem definition uncertainty”, the case of cybersecurity, Regul, Govern, (2020). https://doi.org/10.1111/rego.12341
- Accenture., “The nature of effective defense”, shifting from cybersecurity to cyber resilience (2018). https://www.accenture.com/_acnmedia/accenture/conversion-assets/dotcom/documents/local/en/ accenture-shifting-from-cybersecurity-to-cyber-resilience-pov.pdf
- Gunderson, L., Holling, C, Panarchy, “Understanding Transformations in Human and Natural Systems”, Bibliovault OAI Repository, p. 114. The University of Chicago Press, (2003)
- International Telecommunication Union., “Cybersecurity, dataprotection and cyber resilience in smart sustainable cities”, (2015)
- Holling, C.S., “Resilience and Stability of Ecological Systems”, Annual Reviews Inc. (1973)
- Fiering, M.B., “Alternative indices of resilience”, Water Resour.Res. Resour. Res. 18(1), 33–39 (1982). https://doi.org/10.1029/WR018i001p00033
- Holling, C.S., “Engineering resilience versus ecological resilience”, In: Schulze, P.E. (ed.) Engineering within Ecological Constraints, pp. 31–43. National Academy Press, Washington DC (1996)
- Benjamin, R., Gladman, B., Randell, B., “Protecting IT systems from cybercrime”, Comput. J.. J. 41, 429–443 (1998)
- Luthar, S.S., Cicchetti, D., Becker, B., “The construct of resilience, a critical evaluation and guidelines for future work”, Child Dev, 71(3), 543–562 (2000). https://doi.org/10.1111/1467-8624.00164
- Jorgensen, J., Rossignol, P., Takikawa, M., Upper, D., “Cyber ecology: looking to ecology for insights into information assurance”, vol. 2, pp. 287–296 (2001). https://doi.org/10.1109/DISCEX, 2001.932180
- Saagar Makwana, 2002, “IBM Global Services Resilient infrastructure: Improving your business resilience”, IBM Global Services.
- Zahri, Y., Ahmad, N.M.Z, “Future Cyber Weapons. National ICT Security and Emergency Response Centre” (2003)
- UK Cabinet Office, “Transformational Government—Enabled by Technology” (2005)
- Gordon, L.A., Loeb, M.P, “Managing Cybersecurity Resources, A Cost-Benefit Analysis”, McGraw-Hill Inc, New York (2006)
- Hollnagel, E., Woods, D., Leveson, N, “Resilience engineering, concepts and precepts Resilience engineering concepts and precepts” (2006)
- Chai, S., Sharman, R., Patil, S., Satam, S., Rao, R., Upadhyaya, S., “Surface transportation and cyber-infrastructure an exploratory study”, pp. 124–128 (2007). https://doi.org/10.1109/ISI.2007.37 9544
- Ulieru, M., “Design for resilience of networked critical infrastructures”, In Proceedings of the 2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference, DEST 2007, pp. 540–545 (2007). https://doi.org/10.1109/DEST.2007.372035
- Banatre, M., Pataricza, A., van Moorsel, A., Palanque, P., Strigini, L., “From Resilience-Building to Resilience-Scaling Technologies”, Directions—ReSIST NoE Deliverable D13.
In this paper several key elements will be addressed to enhance the organizations cybersecurity posture and
align it with its business objectives, the introductory letter outlined the organizations recent assessment of cybersecurity
policies and vulnerabilities, emphasizing the need for a proactive cybersecurity approach to protect critical information
assets. The significance of strong cybersecurity measures in the face of evolving cyber threats was underscored,
highlighting the potential catastrophic implications of data breaches. The call to action for all stakeholders to embrace and
drive best cybersecurity practices, in line with industry frameworks like the NIST Framework, was also emphasized.
Keywords :
Cybersecurity, Phishing, Measures, Incident, Patching, Awareness, Vulnerability.