review of cyber - resilience models

Document Type : Original Article

Authors

1 PHD student

2 Lecturer and faculty member of Tarbiat Modares University

Abstract

cyber resilience is the ability of the system to return to the initial situation after an unexpected event .in the introduction of this article , the definition of resilience and resilience based on different references has been discussed and in the following the frameworks , models and issues related to cyber resilience have been mentioned .

a number of frameworks , models , and topics related to the resilience of cyber - resilience discussed in this paper are as follows :Cyber ​​security model with security strategy, care and resilience (return), Standard 27001, Resilience of infrastructure, plan for resilience to resilience, cyber - resilience engineering framework, cyber resilience keys, top issues for cyber resilience and ...
at the end of the article , the application of the MITRE cyber - resilience engineering framework and the سایبری security framework is proposed by adding new and innovative methods to create cyber resilience in the organization .

Keywords


  • فهرست منابع و مآخذ

    منابع لاتین

    • , D. J. (2014). Cyber Resiliency Engineering. 874.
    • Cyber Resilience. (2015). Retrieved from itgovernance.co.uk: http://www.itgovernance.co.uk/cyber-resilience.aspx#.VBxpblf4J4s
    • Deb Bodeau Richard Graubart. (2013, September). Cyber Resiliency and NIST Special Publication 800-53 Rev.4 Controls. Retrieved from NIST.
    • deloitte resilience. (2016). Retrieved from deloitte.com: https://www2.deloitte.com
    • Explore AXELOS Best Practice. (2016). Retrieved from axelos.com: https://www.axelos.com/
    • Joint Task Force Transformation Initiative. (2010, February). Guide for Applying the Risk Management Framework to Federal. Retrieved from dx.doi.org: http://dx.doi.org/10.6028/NIST.SP.800-37r1
    • Joint Task Force Transformation Initiative. (2011). NIST SP 800-39, Managing Information Security Risk: Organization, Mission, and Information System View. Retrieved from csrc.nist.gov: dx.doi.org/10.6028/NIST.SP.800-39
    • JOINT TASK FORCE TRANSFORMATION INITIATIVE. (2013, April). Security and Privacy Controls for Federal Information Systems and Organizations (NIST SP 800-53 R4). Retrieved from dx.doi.org: http://dx.doi.org/10.6028/NIST.SP.800-53r4
    • Malta Association of Risk Management (MARM). (2013). Cyber Resilience. Retrieved from marm.org.mt: http://www.slideshare.net/ianstaf/cyber-resilience-donald-tabone
    • Protect Your Organization with Cyber Resilience. (2015). Retrieved from itgovernance.co.uk: http://www.itgovernance.co.uk/find-out-more-about-cyber-resilience.aspx#.VYsrGlJ1xpk
    • (2015). The Cyber-Resilient Enterprise: Harnessing Your Security Intelligence. Retrieved from symantec.com: https://www.symantec.com/content/en/us/enterprise/white_papers/b-cyber-resilient-enterprise-wp-21332471-en-us.pdf
    • The Department of Homeland Security’s (DHS). (2015). CYBER RESILIENCE REVIEW & CYBER SECURITY EVALUATION TOOL. Retrieved from ics-cert.us-cert.gov: https://ics-cert.us-cert.gov/sites/default/files/FactSheets/ICS-CERT_FactSheet_CRR_CSET_S508C.pdf

    · Threat-Based Defense: A New Cyber Defense Playbook. (2012). Retrieved from mitre.org: https://www.mitre.org/sites/default/files/pdf/cyber_defense_playbook.pdf