IDEAS home Printed from https://ideas.repec.org/p/hal/journl/hal-03741854.html
   My bibliography  Save this paper

Understanding Cybersecurity Frameworks and Information Security Standards—A Review and Comprehensive Overview

Author

Listed:
  • Hamed Taherdoost

    (Hamta Business Corporation)

Abstract

Businesses are reliant on data to survive in the competitive market, and data is constantly in danger of loss or theft. Loss of valuable data leads to negative consequences for both individuals and organizations. Cybersecurity is the process of protecting sensitive data from damage or theft. To successfully achieve the objectives of implementing cybersecurity at different levels, a range of procedures and standards should be followed. Cybersecurity standards determine the requirements that an organization should follow to achieve cybersecurity objectives and facilitate against cybercrimes. Cybersecurity standards demonstrate whether an information system can meet security requirements through a range of best practices and procedures. A range of standards has been established by various organizations to be employed in information systems of different sizes and types. However, it is challenging for businesses to adopt the standard that is the most appropriate based on their cybersecurity demands. Reviewing the experiences of other businesses in the industry helps organizations to adopt the most relevant cybersecurity standards and frameworks. This study presents a narrative review of the most frequently used cybersecurity standards and frameworks based on existing papers in the cybersecurity field and applications of these cybersecurity standards and frameworks in various fields to help organizations select the cybersecurity standard or framework that best fits their cybersecurity requirements.

Suggested Citation

  • Hamed Taherdoost, 2022. "Understanding Cybersecurity Frameworks and Information Security Standards—A Review and Comprehensive Overview," Post-Print hal-03741854, HAL.
  • Handle: RePEc:hal:journl:hal-03741854
    DOI: 10.3390/electronics11142181
    Note: View the original document on HAL open archive server: https://hal.science/hal-03741854
    as

    Download full text from publisher

    File URL: https://hal.science/hal-03741854/document
    Download Restriction: no

    File URL: https://libkey.io/10.3390/electronics11142181?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Leszczyna, Rafał, 2018. "Standards on cyber security assessment of smart grid," International Journal of Critical Infrastructure Protection, Elsevier, vol. 22(C), pages 70-89.
    2. James J. Heckman & Carolyn Heinrich & Jeffrey Smith, 2002. "The Performance of Performance Standards," Journal of Human Resources, University of Wisconsin Press, vol. 37(4), pages 778-811.
    3. Hemphill, Thomas A. & Longstreet, Phil, 2016. "Financial data breaches in the U.S. retail economy: Restoring confidence in information technology security standards," Technology in Society, Elsevier, vol. 44(C), pages 30-38.
    4. Justus Baron & Jorge Contreras & Martin Husovec & Pierre Larouche, 2019. "Making the Rules: The Governance of Standard Development Organizations and their Policies on Intellectual Property Rights," JRC Research Reports JRC115004, Joint Research Centre.
    5. Riza Azmi & William Tibben & Khin Than Win, 2018. "Review of cybersecurity frameworks: context and shared concepts," Journal of Cyber Policy, Taylor & Francis Journals, vol. 3(2), pages 258-283, May.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Alessandro Mazzoccoli, 2023. "Optimal Cyber Security Investment in a Mixed Risk Management Framework: Examining the Role of Cyber Insurance and Expenditure Analysis," Risks, MDPI, vol. 11(9), pages 1-14, August.
    2. Kamal Uddin Sarker & Farizah Yunus & Aziz Deraman, 2023. "Penetration Taxonomy: A Systematic Review on the Penetration Process, Framework, Standards, Tools, and Scoring Methods," Sustainability, MDPI, vol. 15(13), pages 1-26, July.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Hamed Taherdoost, 2022. "Understanding Cybersecurity Frameworks and Information Security Standards—A Review and Comprehensive Overview," Post-Print hal-03741855, HAL.
    2. Judit Krekó & Balázs Munkácsy & Márton Csillag & Ágota Scharle, 2022. "A job trial subsidy for youth:cheap labour or a screening device?," CERS-IE WORKING PAPERS 2222, Institute of Economics, Centre for Economic and Regional Studies.
    3. Muhammad Waseem & Muhammad Adnan Khan & Arman Goudarzi & Shah Fahad & Intisar Ali Sajjad & Pierluigi Siano, 2023. "Incorporation of Blockchain Technology for Different Smart Grid Applications: Architecture, Prospects, and Challenges," Energies, MDPI, vol. 16(2), pages 1-29, January.
    4. Caroline Buts & Ellen Van Droogenbroeck & Michaël R. J. Dooms & Kim Willems, 2020. "The Economic Impact of Standards in Belgium," International Journal of Standardization Research (IJSR), IGI Global, vol. 18(1), pages 44-64, January.
    5. Clare Leaver & Gian Luigi Albano & University College London and ELSE, 2004. "Transparency, Recruitment and Retention in the Public Sector," Economics Series Working Papers 219, University of Oxford, Department of Economics.
    6. Pascal Courty & Gerald Marschke, 2003. "Making Government Accountable: Lessons from a Federal Job Training Program," The Centre for Market and Public Organisation 03/083, The Centre for Market and Public Organisation, University of Bristol, UK.
    7. Bernhard Boockmann & Tobias Brändle, 2019. "Coaching, Counseling, Case‐Working: Do They Help the Older Unemployed Out of Benefit Receipt and Back Into the Labor Market?," German Economic Review, Verein für Socialpolitik, vol. 20(4), pages 436-468, November.
    8. Courty, Pascal & Kim, Do Han & Marschke, Gerald, 2011. "Curbing cream-skimming: Evidence on enrolment incentives," Labour Economics, Elsevier, vol. 18(5), pages 643-655, October.
    9. Oliver Bruttel, 2005. "Are Employment Zones Successful? Evidence From the First Four Years," Local Economy, London South Bank University, vol. 20(4), pages 389-403, November.
    10. Khazaei, Javad & Amini, M. Hadi, 2021. "Protection of large-scale smart grids against false data injection cyberattacks leading to blackouts," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
    11. Jussi Heikkilä & Timo Ali-Vehmas & Julius Rissanen, 2021. "The Link Between Standardization and Economic Growth: A Bibliometric Analysis," International Journal of Standardization Research (IJSR), IGI Global, vol. 19(1), pages 1-25, January.
    12. McInerney, Melissa, 2010. "Privatizing public services and strategic behavior: The impact of incentives to reduce workers' compensation claim duration," Journal of Public Economics, Elsevier, vol. 94(9-10), pages 777-789, October.
    13. Milan Stojkov & Nikola Dalčeković & Branko Markoski & Branko Milosavljević & Goran Sladić, 2021. "Towards Cross-Standard Compliance Readiness: Security Requirements Model for Smart Grid," Energies, MDPI, vol. 14(21), pages 1-29, October.
    14. Carolyn Heinrich, 2008. "False or Fitting Recognition? The Use of High Performance Bonuses in Motivating Organizational Achievements," Public administration issues, Higher School of Economics, issue 4, pages 72-104.
    15. Courty, Pascal & Marschke, Gerald, 2004. "A General Test of Gaming," CEPR Discussion Papers 4514, C.E.P.R. Discussion Papers.
    16. Pirog, Maureen & Gerrish, Ed, 2015. "Impact of the Child Support Performance and Incentive Act on child support order establishment," Children and Youth Services Review, Elsevier, vol. 58(C), pages 104-117.
    17. Miana Plesca & Jeffrey Smith, 2008. "Evaluating multi-treatment programs: theory and evidence from the U.S. Job Training Partnership Act experiment," Studies in Empirical Economics, in: Christian Dustmann & Bernd Fitzenberger & Stephen Machin (ed.), The Economics of Education and Training, pages 293-330, Springer.
    18. Julie Berry Cullen & Randall Reback, 2006. "Tinkering Toward Accolades: School Gaming Under a Performance Accountability System," NBER Working Papers 12286, National Bureau of Economic Research, Inc.
    19. Bekkers, Rudi & Tur, Elena M. & Henkel, Joachim & van der Vorst, Tommy & Driesse, Menno & Contreras, Jorge L., 2022. "Overcoming inefficiencies in patent licensing: A method to assess patent essentiality for technical standards," Research Policy, Elsevier, vol. 51(10).
    20. Besley, Tim & Bevan, Gwyn & Burchardi, Konrad, 2009. "Naming & Shaming: The impacts of different regimes on hospital waiting times in England and Wales," CEPR Discussion Papers 7306, C.E.P.R. Discussion Papers.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:hal:journl:hal-03741854. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: CCSD (email available below). General contact details of provider: https://hal.archives-ouvertes.fr/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.