Nuolat dažnėja raginimai didinti sistemų atsparumą kibernetinėms grėsmėms, tačiau praktiškai nėra metodikų, aprašančių, kaip šie procesai turėtų būti įgyvendinami. Atsižvelgiant į tai, darbe išgrynintos kibernetinio atsparumo suvokties ribos, išskirti pagrindiniai organizacijų kibernetinio atsparumo elementai. Organizacijų atsparumas kibernetinėms grėsmėms išnagrinėtas keliais valdymo lygmenimis, taip sudarant prielaidas tolimesnei kibernetinio atsparumo procesų ir jų metu vykdomų sąveikų analizės plėtotei. Siekiant suformuoti kibernetinio saugumo valdymo modelio teorinį pagrindą buvo vykdoma mokslinės literatūros analizė, kurios metu taikyti sisteminimo, sintezės, lyginimo bei apibendrinimo metodai. Modelio suformavimui taikyti konceptuali...
Za zagotavljanje informacijske varnosti katerekoli organizacije, še posebej tistih, ki izhajajo iz p...
This master thesis is an explorative study of organizational aspects of cyber threat management in a...
International audienceWith the current high risks of cyber incidents either caused by malicious cybe...
There is a growing number of calls to increase systems’ resilience to cyber threats, however there ...
Suomen kansallinen Kyberturvallisuuskeskus on vuodesta 2016 tarjonnut konsultointiapua, kyberharjoit...
The management of cyber issues has become essential for business success, since the activities of or...
Planiranje kibernetičke sigurnosti unutar složenog sustava i primjena njezinih načela i postupaka im...
This research addresses the perceived prevailing situation, where organizations are still struggling...
Introduction: This master thesis explores the concept of cyber resilience and aims at identifying cy...
The functioning of a modern society is based on the cooperation of several critical infrastructures,...
Due to the hazardous current cyber environment, cyber resilience is more necessary than ever. Compa...
The concept of cyber resilience has emerged in recent years in response to the recognition that cybe...
Cyber security is commonly defined as the practice of protecting computers, networks, programs and d...
This thesis proposes to analyze how an organization can determine the condition of its incident hand...
Cyber resilience is about protecting data and information owned by University XYZ and adapting busin...
Za zagotavljanje informacijske varnosti katerekoli organizacije, še posebej tistih, ki izhajajo iz p...
This master thesis is an explorative study of organizational aspects of cyber threat management in a...
International audienceWith the current high risks of cyber incidents either caused by malicious cybe...
There is a growing number of calls to increase systems’ resilience to cyber threats, however there ...
Suomen kansallinen Kyberturvallisuuskeskus on vuodesta 2016 tarjonnut konsultointiapua, kyberharjoit...
The management of cyber issues has become essential for business success, since the activities of or...
Planiranje kibernetičke sigurnosti unutar složenog sustava i primjena njezinih načela i postupaka im...
This research addresses the perceived prevailing situation, where organizations are still struggling...
Introduction: This master thesis explores the concept of cyber resilience and aims at identifying cy...
The functioning of a modern society is based on the cooperation of several critical infrastructures,...
Due to the hazardous current cyber environment, cyber resilience is more necessary than ever. Compa...
The concept of cyber resilience has emerged in recent years in response to the recognition that cybe...
Cyber security is commonly defined as the practice of protecting computers, networks, programs and d...
This thesis proposes to analyze how an organization can determine the condition of its incident hand...
Cyber resilience is about protecting data and information owned by University XYZ and adapting busin...
Za zagotavljanje informacijske varnosti katerekoli organizacije, še posebej tistih, ki izhajajo iz p...
This master thesis is an explorative study of organizational aspects of cyber threat management in a...
International audienceWith the current high risks of cyber incidents either caused by malicious cybe...