Identifying and validating components for national cyber security framework

Farisya Setiadi, Albaar Rubhasy, Zainal A. Hasibuan

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

National Cyber Security (NCS) is an effort to safeguard nation's assets from loss caused by cyber threats and attacks. In order that NCS development can be performed in a directed and integrated manner, a framework is needed to optimally guide NCS implementation. The NCS framework were identified as previous works comprises twelve components. This paper tries to decompose these twelve main components into sub-component, The sub-components are extracted based on literature review, then validated by a group of experts and practitioners with Delphi technique. 54 sub-components were identified from literature review. Then, the sub-components were updated into 57 sub-components after validated by a group of experts. The findings of this research could be used on the future work for developing a robust Indonesia National Cyber Security Framework.

Original languageEnglish
Title of host publicationProceedings of the 3rd International Conference on Informatics and Computing, ICIC 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781538669204
DOIs
Publication statusPublished - 1 Oct 2018
Event3rd International Conference on Informatics and Computing, ICIC 2018 - Palembang, Indonesia
Duration: 17 Oct 201818 Oct 2018

Publication series

NameProceedings of the 3rd International Conference on Informatics and Computing, ICIC 2018

Conference

Conference3rd International Conference on Informatics and Computing, ICIC 2018
Country/TerritoryIndonesia
CityPalembang
Period17/10/1818/10/18

Keywords

  • Component
  • Cyber Security
  • Delphi Technique
  • Framework
  • NCS
  • Sub-components

Fingerprint

Dive into the research topics of 'Identifying and validating components for national cyber security framework'. Together they form a unique fingerprint.

Cite this