DRAFTING A SECURITY CONCEPT FOR MIDDLEWARE INTEGRATION ENVIRONMENTS IN THE MANUFACTURING ENTERPRISE
Abstract
Full Text:
PDFReferences
Barometer, A. R. Global risks, https://www. agcs.allianz.com/news-and-insights/reports/ allianz-risk-barometer.html, January 2020
Global, A. Cyber risk trends 2020, https://www .agcs.allianz.com/news-and-insights/news/ cyber-risk-trends-2020.html, 2020'
Shevchenkoa, H., Shevchenko, S., Zhdanova, Y., Spasiteleva, S., Negodenko, O. Cybersecu¬rity Providing in Information and Telecommu¬nication Systems, Proceedings of Selected Pa¬pers of the Workshop on Cybersecurity Provid¬ing in Information and Telecommunication Systems (CPITS 2021) Kyiv, 2021, http://ceur-ws.org/Vol-2923/ paper 34.pdf, January 2021
NIST, Framework for Improving Critical In-frastructure Cybersecurity, version 1.1, 16 April 2018, https://doi.org/10.6028/NIST .CSWP.04162018
Pelzer, L.M., The True Cost of Cybersecurity Incidents: The Problem, https://www.paloalt onetworks.com/blog/2021/06/the-cost-of-cyb ersecurity-incidents-the-problem, 2021
Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of network and information security within the Union, https://eur-lex.europa.eu/eli/dir/2016/1 148/oj, 2016
C.I.O. Council, CIO Handbook, https://www .cio.gov/cio-handbook/, 2021
I. 27001, Information technology - Security techniques - Information security management systems, https://www.iso.org/standard/54534 .html, July 2022
C. Point, Check Point Enterprise Security Framework, CESF, https://www.checkpoint. com/downloads/products/checkpoint-enterpri se-security-framework-whitepaper.pdf, 2020
IBM, Cost of a Data Breach Report 2020
Sava, J.A. Worldwide information security services spending from 2017 to 2022, https://www.statis¬ta.com/statistics/217362 /worldwide-it-security-spending-since-2010/, April 2022
IDC, IDC's Worldwide Security Spending Guide Taxonomy, 2021: Release V1, 2021, https://recordtrend.com/network-security/it-is-predicted-that-the-global-investment-in-net¬work-security-related-hardware-software-and-services-will-reach-143-5-billion-us-dollars-in-2021-from-idc/, February 2021
Verizon, Data Breach Investigations Report, https://www.verizon.com/business/ re-sources/reports/2022/dbir/2022-data-breach-investigations-report-dbir.pdf, 2022
Brooks, C. Alarming Cyber Statistics for Mid-Year 2022 That You Need to Know, https:// www.forbes.com/sites/chuck-brooks/2022/06/0 3/alarming-cyber-statistics-for-mid-year-2022-that-you-need-to-know/?sh=58310b837864, Ju ne 2022
M. 3. D. T. I. Team, Exploiting a crisis: How cybercriminals behaved during the outbreak, June 2020
Levanon, G., Remote Work: The Biggest Leg¬acy of Covid-19, https://www.forbes.com/sites /gadlevanon/2020/11/23/remote-work-the-biggest-legacy-of-covid-19/?sh=2e182df d7f59, November 2020
Arligton, V., Gartner CFO Survey Reveals 74% Intend to Shift Some Employees to Remote Work Permanently, https://www.gartner.com/ en/newsroom/press-releases/2020-04-03-gart ner-cfo-surey-reveals-74-percent-of-organiza-tions-to-shift-some-employees-to-remote-work-permanently2, April 2020
Dinha, F., The Hidden Cost of Remote Work, https://www.forbes.com/sites/forbestechcoun-cil/2021/03/30/the-hidden-cost-of-remote-wo-rk/?sh=639e2fd66947, March 2021
C. CEMR, European Charter of Services of General Interest at Local and Regional Level, https://www.ccre.org/img/uploads/piecesjointe /filename/charter_sgi_RO.pdf, March 2009
Deac-Suteu, D.-V., Titu, M.-A., Stanciu, A., The Reference Architecture of An Integrated Service Middleware Hub in The Environment of Knowledge-Based Organizations, ECAI, Cluj Napoca, 2021.
Microsoft, Evolving Zero Trus, https://query. prod.cms.rt.mi-crosoft.com/cms/api/am/binary /RWJJdT. November 2021
Puiu A. Playtech - How to find out all devices connected to your wireless network, https://play tech.ro/2017/cum-afli-toate-dispozitivele-conectate-la-reteaua-wireless/, March 2017
Refbacks
- There are currently no refbacks.