Journal article Open Access

Cybersecurity Assessments

Sanjana Gadalay


MARC21 XML Export

<?xml version='1.0' encoding='UTF-8'?>
<record xmlns="http://www.loc.gov/MARC21/slim">
  <leader>00000nam##2200000uu#4500</leader>
  <datafield tag="041" ind1=" " ind2=" ">
    <subfield code="a">eng</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">Cybersecurity, Risk Assessment, Risk Scoring, Threat Modeling.</subfield>
  </datafield>
  <controlfield tag="005">20220111134848.0</controlfield>
  <controlfield tag="001">5835690</controlfield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Publisher</subfield>
    <subfield code="4">spn</subfield>
    <subfield code="a">Blue Eyes Intelligence Engineering  and Sciences Publication(BEIESP)</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
    <subfield code="s">220942</subfield>
    <subfield code="z">md5:80a91ba3af2b754b59bcdc852afceed7</subfield>
    <subfield code="u">https://zenodo.org/record/5835690/files/D5004119420.pdf</subfield>
  </datafield>
  <datafield tag="542" ind1=" " ind2=" ">
    <subfield code="l">open</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="c">2020-11-30</subfield>
  </datafield>
  <datafield tag="909" ind1="C" ind2="O">
    <subfield code="p">openaire</subfield>
    <subfield code="o">oai:zenodo.org:5835690</subfield>
  </datafield>
  <datafield tag="909" ind1="C" ind2="4">
    <subfield code="c">330-332</subfield>
    <subfield code="n">4</subfield>
    <subfield code="p">International Journal of Recent Technology and Engineering (IJRTE)</subfield>
    <subfield code="v">9</subfield>
  </datafield>
  <datafield tag="100" ind1=" " ind2=" ">
    <subfield code="u">Department of Computer Science and Engineering, Mahatma Gandhi Institute of Technology (MGIT), Hyderabad, India.</subfield>
    <subfield code="a">Sanjana Gadalay</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2=" ">
    <subfield code="a">Cybersecurity Assessments</subfield>
  </datafield>
  <datafield tag="540" ind1=" " ind2=" ">
    <subfield code="u">https://creativecommons.org/licenses/by/4.0/legalcode</subfield>
    <subfield code="a">Creative Commons Attribution 4.0 International</subfield>
  </datafield>
  <datafield tag="650" ind1="1" ind2="7">
    <subfield code="a">cc-by</subfield>
    <subfield code="2">opendefinition.org</subfield>
  </datafield>
  <datafield tag="650" ind1="1" ind2=" ">
    <subfield code="a">ISSN</subfield>
    <subfield code="0">(issn)2277-3878</subfield>
  </datafield>
  <datafield tag="650" ind1="1" ind2=" ">
    <subfield code="a">Retrieval Number</subfield>
    <subfield code="0">(handle)100.1/ijrte.D5004119420</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
    <subfield code="a">&lt;p&gt;The purpose of this study is to review the existing cybersecurity assessments and practices used by technology companies to protect their assets from potential harm and damage. Today, the software systems have thousands of vulnerabilities and, when breached, can cost the companies millions of dollars. A clear path for identifying risks, detecting threats, and responding to them is imperative. However, it is not easy to quantify cybersecurity risks as the networks and networks of networks are becoming complicated and, so most risk assessments use relevant parameters to calculate a risk score. If this score is high, it has a high impact on the critical systems. This knowledge helps hi-tech companies such as finance, banking, healthcare, defense, and supply-chain sectors to prioritize their actions and investments effectively. This study examines the risk assessment strategies and steps that companies adopt across the software development lifecycle (SDLC) to stay ahead of cybersecurity risks.&lt;/p&gt;</subfield>
  </datafield>
  <datafield tag="773" ind1=" " ind2=" ">
    <subfield code="n">issn</subfield>
    <subfield code="i">isCitedBy</subfield>
    <subfield code="a">2277-3878</subfield>
  </datafield>
  <datafield tag="024" ind1=" " ind2=" ">
    <subfield code="a">10.35940/ijrte.D5004.119420</subfield>
    <subfield code="2">doi</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">publication</subfield>
    <subfield code="b">article</subfield>
  </datafield>
</record>
19
12
views
downloads
Views 19
Downloads 12
Data volume 2.7 MB
Unique views 13
Unique downloads 12

Share

Cite as