2
Lecturer and faculty member of Tarbiat Modares University
Abstract
cyber resilience is the ability of the system to return to the initial situation after an unexpected event .in the introduction of this article , the definition of resilience and resilience based on different references has been discussed and in the following the frameworks , models and issues related to cyber resilience have been mentioned .
a number of frameworks , models , and topics related to the resilience of cyber - resilience discussed in this paper are as follows :Cyber security model with security strategy, care and resilience (return), Standard 27001, Resilience of infrastructure, plan for resilience to resilience, cyber - resilience engineering framework, cyber resilience keys, top issues for cyber resilience and ... at the end of the article , the application of the MITRE cyber - resilience engineering framework and the سایبری security framework is proposed by adding new and innovative methods to create cyber resilience in the organization .
, D. J. (2014). Cyber Resiliency Engineering. 874.
Cyber Resilience. (2015). Retrieved from itgovernance.co.uk: http://www.itgovernance.co.uk/cyber-resilience.aspx#.VBxpblf4J4s
Deb Bodeau Richard Graubart. (2013, September). Cyber Resiliency and NIST Special Publication 800-53 Rev.4 Controls. Retrieved from NIST.
deloitte resilience. (2016). Retrieved from deloitte.com: https://www2.deloitte.com
Explore AXELOS Best Practice. (2016). Retrieved from axelos.com: https://www.axelos.com/
Joint Task Force Transformation Initiative. (2010, February). Guide for Applying the Risk Management Framework to Federal. Retrieved from dx.doi.org: http://dx.doi.org/10.6028/NIST.SP.800-37r1
Joint Task Force Transformation Initiative. (2011). NIST SP 800-39, Managing Information Security Risk: Organization, Mission, and Information System View. Retrieved from csrc.nist.gov: dx.doi.org/10.6028/NIST.SP.800-39
JOINT TASK FORCE TRANSFORMATION INITIATIVE. (2013, April). Security and Privacy Controls for Federal Information Systems and Organizations (NIST SP 800-53 R4). Retrieved from dx.doi.org: http://dx.doi.org/10.6028/NIST.SP.800-53r4
Malta Association of Risk Management (MARM). (2013). Cyber Resilience. Retrieved from marm.org.mt: http://www.slideshare.net/ianstaf/cyber-resilience-donald-tabone
Protect Your Organization with Cyber Resilience. (2015). Retrieved from itgovernance.co.uk: http://www.itgovernance.co.uk/find-out-more-about-cyber-resilience.aspx#.VYsrGlJ1xpk
(2015). The Cyber-Resilient Enterprise: Harnessing Your Security Intelligence. Retrieved from symantec.com: https://www.symantec.com/content/en/us/enterprise/white_papers/b-cyber-resilient-enterprise-wp-21332471-en-us.pdf
The Department of Homeland Security’s (DHS). (2015). CYBER RESILIENCE REVIEW & CYBER SECURITY EVALUATION TOOL. Retrieved from ics-cert.us-cert.gov: https://ics-cert.us-cert.gov/sites/default/files/FactSheets/ICS-CERT_FactSheet_CRR_CSET_S508C.pdf
· Threat-Based Defense: A New Cyber Defense Playbook. (2012). Retrieved from mitre.org: https://www.mitre.org/sites/default/files/pdf/cyber_defense_playbook.pdf