On this page
Research Article | Open Access
Volume 14 2022 | None
APPLICATIONS OF AN IoT BASED CYBERSECURITY SYSTEMS
A.Bhuvaneswari,A.Sai Sitaramanjaneyulu,G.Bhargavi,4 K.Anji Reddy
Pages: 2428-2436
Abstract
Currently, commercial companies and public organisations face steady, advanced cyber threats and cyber attacks. In order to defend against cyber-criminals, organisations must construct and develop a culture and sensitivity for cyber-security. IT (IT) and InfoSec audits (InfoSec) were previously effective and are aimed at combining cyber security audits to address cyber risk, cyber risk, and cyber attacks that are evolving in a hostile cyber landscape. However, increasing cyber attacks and the cyber threat landscape challenges existing models for cybersecurity auditing and demonstrates the crucial need for a new paradigm for cybersecurity auditing. This article covers worldwide cyber security and auditing leaders' best practises and approaches
Keywords
—cybersecurity; cybersecurity audit; cybersecurity audit model cybersecurity assurance; cybersecurity controls; cybersecurity domains
PDF
57
Views
15
Downloads