Maintaining The Continuity of The Company’s Operation using the NIST Framework for SME
Abstract
Keywords
Full Text:
PDFReferences
Alabady, S. A. J. (2008). Design and implementation of a network security model using static VLAN and AAA server. In 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA. https://doi.org/10.1109/ICTTA.2008.4530276
Bresnahan, 2019 What Are the Bene ts of the NIST Cybersecurity Framework. From https://www.cybersaint.io/blog/benefits-of-nist-cybersecurity-framework
Bozhikov, A. (2013). Cyber Security Risk – An Important Business Continuity Planning Issue for Business Organisations. 3rd International Conference On The Application Of Information And Communication Technology And Statistics In Economics And Education, (Dec), 1–5.
Framework for improving critical infrastructure cybersecurity: Version 1.0. (2014). Cybersecurity: Executive Order 13636 and the Critical Infrastructure Framework, 55–98.
Friis, K., & Ringsmose, J. (2016). Conflict in cyber space: Theoretical, strategic and legal perspectives. Conflict in Cyber Space: Theoretical, Strategic and Legal Perspectives (pp. 1–204). Taylor and Francis Inc. https://doi.org/10.4324/9781315669878
Harel, Y., Gal, I. B., & Elovici, Y. (2017). Cyber security and the role of intelligent systems in addressing its challenges. ACM Transactions on Intelligent Systems and Technology, 8(4). https://doi.org/10.1145/3057729
IBM: Cost of a Data Breach Report 2019. (2019). Computer Fraud & Security, 2019(8), 4. https://doi.org/10.1016/s1361-3723(19)30081-8
Ishtiaq, M. (2019). Book Review Creswell, J. W. (2014). Research Design: Qualitative, Quantitative and Mixed Methods Approaches (4th ed.). Thousand Oaks, CA: Sage. English Language Teaching, 12(5), 40. https://doi.org/10.5539/elt.v12n5p40
NIST, 2012 NIST Special Publication 800-30 Revision 1 - Guide for Conducting Risk Assessments NIST Spec. Publ. September p. 95.
Nugraha, U. (2016). Pada Perguruan Tinggi Menggunakan Kerangka Kerja Nist Sp 800-300. Seminar Nasional Telekomunikasi Dan Informatika (SELISIK 2016), (Selisik), 121–126.
Steer R, 2010 DHS Risk Lexicon 2010 Edition September.
Susilo. (2017). Analisa Tingkat Resiko Tata Kelola Teknologi Informasi Perguruan Tinggi Menggunakan Model Framework National Institute of Standards & Technology (NIST) Special Publication 800-30 dan IT General Control Questionnaire (ITGCQ). Journal Industrial Servicess, Vol. 3c No(1), 240–248.
DOI: https://doi.org/10.31294/jtk.v7i1.9486
Copyright (c) 2021 Eko Haryadi, Dewi Yuliandari, Abdussomad Abdussomad, Diah Wijayanti, Mike Amelia, Syafrianto Syafrianto
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
ISSN: 2442-2436 (print), and 2550-0120