Journal ArticleDOI
DoD cyber technology policies to secure automated information systems
TLDR
The aim of this research study shall provide insight to the applicable processes, IA controls, and standards to include providing a method for selecting necessary government models and for system development.Abstract:
Availability, integrity, and confidentiality (AIC) is a key theme everywhere as cyber security has become more than an emerging topic. The Department of Defense (DoD) has implemented multiple processes such as the Department of Defense information assurance certification and accreditation process (DIACAP), common criteria (CC), and created proven baselines to include information assurance (IA) controls to protect information system (IS) resources. The aim of this research study shall provide insight to the applicable processes, IA controls, and standards to include providing a method for selecting necessary government models and for system development.read more
Citations
More filters
Book ChapterDOI
Information Security Risk Assessment: Risk Assessment
Mark Talabis,Jason Martin +1 more
Journal ArticleDOI
Promoting innovation and application of internet of things in academic and research information organizations
TL;DR: In this article, the authors investigated factors promoting innovation and application of internet of things in academic and research information organizations in public and private chartered institutions and found that information professionals, digital content managers, information systems and technologists that normally consume big data and technological resources were involved in the process of data collection using structured questionnaire and content analysis.
Cyber Security in Industry 4.0: The Pitfalls of Having Hyperconnected Systems
TL;DR: It is imperative to ensure that cyber security plays a role during the rise of this digital industrial revolution by integrating the Internet of Things, Internet of Everything cyber-physical systems, cloud computing technologies, and more into manufacturing.
Book ChapterDOI
The Future of National and International Security on the Internet
TL;DR: Examined within this chapter are the potential security-related threats with the use of social media, mobile devices, virtual worlds, augmented reality, and mixed reality.
Book
Technology, Innovation, and Enterprise Transformation
Manish Wadhwa,Alan Harper +1 more
TL;DR: The Technology, Innovation, and Enterprise Transformation (TEET) as discussed by the authors is a reference source for the latest technical insights within the business field, highlighting current theoretical frameworks, novel empirical research discoveries, and fundamental literature surveys.
References
More filters
Related Papers (5)
DITEC (DoD-Centric and Independent Technology Evaluation Capability): A Process for Testing Security
Use of Open Source Software and Virtualization in Academia to Enhance Higher Education Everywhere
Maurice Dawson,Imad Al Saeed +1 more