Security Governance & Information Security Management Systems

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Computer Science & Engineering".

Deadline for manuscript submissions: closed (30 May 2022) | Viewed by 10823

Special Issue Editors


E-Mail Website
Guest Editor
GSyA Research Group, University of Castilla–La Mancha, 13700 Ciudad Real, Spain
Interests: security patterns; security engineering; security in cloud computing and big data; secure information systems; security technology
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Research Group GSyA, University of Castilla-la Mancha, 13700 Ciudad Real, Spain
Interests: information security; information security management system; risk analysis; information systems risk analysis and management; standards; maturity levels in Information Security Management Systems; business continuity plans

E-Mail Website
Guest Editor
Alarcos Research Group, University of Castilla – La Mancha, 13070 Ciudad Real, Spain
Interests: security by design; security patterns; information systems risk analysis and management; blockchain; quantum-based security
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Cybersecurity is a real and more and more critical need in a digitized society, in which the number of threats and their impacts continues to grow. Today, digital elements and infrastructures are ever more complex and the IT-dependent elements that constitute the essential pillars of communication, economic, social, and institutional infrastructures require appropriate risk analysis and management mechanisms. Security management and threat mitigation within these systems have implicitly become a fundamental issue for citizens (to preserve their privacy), for businesses (to protect digital assets and transactions), and for states (to protect their critical infrastructures and ensure the continuity of government and government services, etc.), and, therefore, it is extremely important to have adequate management systems to solve all the problems that currently exist.

This Special Issue will focus on the different trends associated with security governance and information system security management to provide a broad and comprehensive view of this complex scenario.

Proposals for this Special Issue on ''Security Governance & Information Security Management Systems'' are requested to represent an overview of the current status of this research field, covering a variety of topics including, but not limited to, new standards, frameworks, methods, algorithms, solutions, and applications in the following areas:

  • Cybersecurity governance and awareness
  • Information security management systems
  • Information system risk analysis and management
  • Cybersecurity risk in Industry
  • Security compliance
  • Cybersecurity law & regulations
  • Cybersecurity audits
  • Business continuity plans
  • Resiliency policy
  • Maturity levels in information security management systems
  • Emerging challenges in information security management systems
  • Blockchain technology for information security management systems
  • Quantum technology for information security management systems

Dr. David G. Rosado
Dr. Luis Enrique Sánchez Crespo
Dr. Manuel A. Serrano
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Information security management systems
  • Information system risk analysis and management
  • Cybersecurity compliance
  • Cybersecurity governance
  • Cybersecurity audits
  • Cybersecurity laws
  • Resiliency
  • Maturity level

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

32 pages, 67364 KiB  
Article
Color Image Encryption Algorithm Based on Dynamic Block Zigzag Transformation and Six-Sided Star Model
by Xiaoqiang Zhang, Mi Liu, Jingxi Tian and Zhengjun Gong
Electronics 2022, 11(16), 2512; https://doi.org/10.3390/electronics11162512 - 11 Aug 2022
Cited by 5 | Viewed by 1414
Abstract
As a result of the rise in network technology, information security has become particularly important. Digital images play an important role in network transmission. To improve their security and efficiency, a new color image encryption algorithm is proposed. The proposed algorithm adopts a [...] Read more.
As a result of the rise in network technology, information security has become particularly important. Digital images play an important role in network transmission. To improve their security and efficiency, a new color image encryption algorithm is proposed. The proposed algorithm adopts a classical scrambling–diffusion framework. In the scrambling stage, the dynamic block Zigzag transformation is designed by combining the chaotic sequence with the standard Zigzag transformation, which can dynamically select the transformation range and the number of times. It is used to scramble the pixel positions in the R, G, and B components. In the diffusion stage, the six-sided star model is established by combining the chaotic sequence and the six-sided star structure characteristics, which can store the 24 bits of the pixel in a defined order to realize bit-level diffusion operation. Experimental analyses indicate that our algorithm has the characteristics of high key sensitivity, large key space, high efficiency, and resistance to plaintext attacks, statistical attacks, etc. Full article
(This article belongs to the Special Issue Security Governance & Information Security Management Systems)
Show Figures

Figure 1

13 pages, 1975 KiB  
Article
Research on the Effectiveness of Cyber Security Awareness in ICS Risk Assessment Frameworks
by Keyong Wang, Xiaoyue Guo and Dequan Yang
Electronics 2022, 11(10), 1659; https://doi.org/10.3390/electronics11101659 - 23 May 2022
Cited by 2 | Viewed by 4292
Abstract
Assessing security awareness among users is essential for protecting industrial control systems (ICSs) from social engineering attacks. This research aimed to determine the effect of cyber security awareness on the emergency response to cyber security incidents in the ICS. Additionally, this study has [...] Read more.
Assessing security awareness among users is essential for protecting industrial control systems (ICSs) from social engineering attacks. This research aimed to determine the effect of cyber security awareness on the emergency response to cyber security incidents in the ICS. Additionally, this study has adopted a variety of cyber security emergency response process measures and frameworks and comprehensively proposes a new organizational model of cyber security incident response. The corresponding measures are evaluated based on the MP2DR2 risk control matrix model to assess their practical value in the evaluation stage. This study found that after adding security awareness measures to response control measures, the influential value ranking of other control measures changed. The practical value of security awareness control measures was given a higher priority than that of other control measures. The research results highlight the importance of cyber security awareness and aim to inspire ICSs to place a higher priority on staff cyber security awareness in relation to cyber security incidents, which can effectively prevent the occurrence of cyber security incidents and make the field of industrial control application agency respond to incidents faster to restore the regular progress of all works. Full article
(This article belongs to the Special Issue Security Governance & Information Security Management Systems)
Show Figures

Figure 1

22 pages, 2618 KiB  
Article
Comparing Three Countries’ Higher Education Students’ Cyber Related Perceptions and Behaviours during COVID-19
by Andrea Tick, Desireé J. Cranfield, Isabella M. Venter, Karen V. Renaud and Rénette J. Blignaut
Electronics 2021, 10(22), 2865; https://doi.org/10.3390/electronics10222865 - 20 Nov 2021
Cited by 16 | Viewed by 3905
Abstract
In 2020, a global pandemic led to lockdowns, and subsequent social and business restrictions. These required overnight implementation of emergency measures to permit continued functioning of vital industries. Digital technologies and platforms made this switch feasible, but it also introduced several cyber related [...] Read more.
In 2020, a global pandemic led to lockdowns, and subsequent social and business restrictions. These required overnight implementation of emergency measures to permit continued functioning of vital industries. Digital technologies and platforms made this switch feasible, but it also introduced several cyber related vulnerabilities, which students might not have known how to mitigate. For this study, the Global Cyber Security Index and the Cyber Risk literacy and education index were used to provide a cyber security context for each country. This research project—an international, cross-university, comparative, quantitative project—aimed to explore the risk attitudes and concerns, as well as protective behaviours adopted by, students at a South African, a Welsh and a Hungarian University, during the pandemic. This study’s findings align with the relative rankings of the Oliver Wyman Risk Literacy and Education Index for the countries in which the universities reside. This study revealed significant differences between the student behaviours of students within these universities. The most important differences were identified between students’ risk attitudes and concerns. It was also discovered that South African students reported having changed their protective online behaviours to the greatest extent, since the pandemic commenced. Recommendations are made suggesting that cyber security training and education, as well as improving the digital trust and confidence in digital platforms, are critical. Full article
(This article belongs to the Special Issue Security Governance & Information Security Management Systems)
Show Figures

Figure 1

Back to TopTop