Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Security Controls

Handbook of Research on Advanced Research Methodologies for a Digital Society
The principles of control of systems, devices, and connectivity were established early in the global standards, mainly through the COBIT guides or the ISO 27000 family standards. They imply the need to guarantee security through instruments for monitoring unwanted behavior that detects and prevents unwanted use by third parties.
Published in Chapter:
Social Research Methods in Cybersecurity: From Criminology to Industrial Cybersecurity
Felix Antonio Barrio (University Isabel I de Castilla, Spain) and Raquel Poy (University of Leon, Spain)
DOI: 10.4018/978-1-7998-8473-6.ch046
Abstract
The application of social research methods in cybersecurity requires a multidisciplinary combination since the security of technologies and communication networks is made up of a set of uses, techniques, and results directly conditioned by the parameters of confidentiality, data availability, integrity, and privacy. However, each of these technological concepts is prepared and subject to conditions of use that involve ethical, sociological, economic, and legal aspects. Firstly, social engineering techniques in cybercrime tend to combine social investigation techniques with computational engineering and telecommunications elements. Secondly, research on cybersecurity phenomena in industrial environments implies the adaptation to the organizational specificity of each sector. In this chapter, the social research topics commonly addressed by leading companies and researchers in cybersecurity at a global level are analyzed from a comparative point of view, extracting a taxonomy of social research on cybersecurity.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Requirements and Life Cycle Model-Based Assessment of NPP I&C Systems Cyber Security and Safety
The management, operational, and technical controls (i.e., safeguards or countermeasures) prescribed for an information system to protect the confidentiality, integrity, and availability of the system and its information.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR