Abstract
Against the backdrop of rapidly evolving technologies and increasingly complex communications networks, cybersecurity is becoming a key aspect of strategic planning. Protecting information, financial, reputational and other assets from increasingly frequent and sophisticated cyberattacks depends on the ability to develop and continually update a comprehensive, proactive approach that takes into account a wide range of factors. The state of national cybersecurity has become one of the key indicators of the level of development along with «classic» indicators (GDP, etc.). The recently emerged research area of «cybersecurity economics» is constantly being enriched with new knowledge and approaches.The article analyzes the risks to the cybersecurity system at different levels and the main measures to strengthen it, and assesses the dynamics of management trends. Key competencies relevant for professionals in this field are outlined.
References
Aghajani G., Ghadimi N. (2018) Multi-Objective Energy Management in a Micro-Grid. Energy Reports, 4, 218-225. 10. DOI: https://doi.org/10.1016/j.egyr.2017.10.002
AlDaajeh S., Saleous H., Alrabaee S., Barka E., Breitinger F., Choo K.K.R. (2022) The Role of National Cybersecurity Strategies on the Improvement of Cybersecurity Education. Computers and Security, 119, 102754. DOI: https://doi.org/10.1016/j.cose.2022.102754
Alahmari A., Duncan B. (2020) Cybersecurity Risk Management in Small and Medium-Sized Enterprises: A Systematic Review of Recent Evidence. Paper presented at the 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment, Cyber SA 2020, 15-19 June 2020, Dublin, Ireland). DOI: https://doi.org/10.1109/CyberSA49311.2020.9139638
Alsharif M., Mishra S., AlShehri M. (2021) Impact of Human Vulnerabilities on Cybersecurity. Computer Systems Science and Engineering, 40(3), 1153-66. DOI: https://doi.org/10.32604/CSSE.2022.019938
Alsuliman F., Bhattacharyya S., Slhoub K., Nur N., Chambers C.N. (2022) Social Media vs. News Platforms: A Cross-Analysis for Fake News Detection Using Web Scraping and NLP. In: PETRA'22: Proceedings of the 15th International Conference on PErvasive Technologies Related to Assistive Environments, June 2022, pp. 190-196. DOI: https://doi.org/10.1145/3529190.3534755190-96
Amir M., Givargis T. (2020) Pareto Optimal Design Space Exploration of Cyber-Physical Systems. Internet of Things,12, 100308. DOI: https://doi.org/10.1016/j.iot.2020.100308
Carayannis E.G., Grigoroudis E., Rehman S.S., Samarakoon N. (2021) Ambidextrous Cybersecurity: The Seven Pillars (7Ps) of Cyber Resilience. IEEE Transactions on Engineering Management, 68(1), 223-34. DOI: https://doi.org/10.1109/TEM.2019.2909909
Carr M. (2016) Public Private Partnerships in India. International Affairs, 92(1), 43-62.
Catota F.E., Granger M.M., Sicker D.C. (2019) Cybersecurity Education in a Developing Nation: The Ecuadorian Environment. Journal of Cybersecurity, 5(1), 1-19. DOI: https://doi.org/10.1093/cybsec/tyz001
De Soto B.G., Georgescu A., Mantha B., Turk Z., Maciel A., Sonkor S.M. (2022) Construction Cybersecurity and Critical Infrastructure Protection: New Horizons for Construction 4.0. Journal of Information Technology in Construction, 27, 571-594. DOI: https://doi.org/10.36680/j.itcon.2022.028
Dhawan S.M., Gupta B.M., Elango B. (2021) Global Cyber Security Research Output (1998-2019): A Scientometric Analysis. Science and Technology Libraries, 40(2), 172-189. DOI: https://doi.org/10.1080/0194262X.2020.1840487
Falagas M.E., Pitsouni E.I., Malietzis G.A., Pappas G. (2008) Comparison of PubMed, Scopus, Web of Science, and Google Scholar: Strengths and Weaknesses. The FASEB Journal, 22(2), 338-342. DOI: https://doi.org/10.1096/fj.07-9492lsf
Firoozjaei M.D., Mahmoudyar N., Baseri Y., Ghorbani A.A. (2022) An Evaluation Framework for Industrial Control System Cyber Incidents. International Journal of Critical Infrastructure Protection, 36(C), 100487. DOI: https://doi.org/10.1016/j.ijcip.2021.100487
Furnell S., Bishop M. (2020) Addressing Cyber Security Skills: The Spectrum, Not the Silo. Computer Fraud and Security, 2020(2), 6-11. DOI: https://doi.org/10.1016/S1361-3723(20)30017-8
Gratian M., Bandi S., Cukier M., Dykstra J., Ginther A. (2018) Correlating Human Traits and Cyber Security Behavior Intentions. Computers and Security, 73, 345-358. DOI: https://doi.org/10.1016/j.cose.2017.11.015
Hautamaki J., Kokkonen T. (2020) Model for Cyber Security Information Sharing in Healthcare Sector. Paper presented at the 2nd International Conference on Electrical, Communication and Computer Engineering, ICECCE 2020, June 12-13, Istanbul, Turkey. DOI: https://doi.org/10.1109/ICECCE49384.2020.9179175
Härtel J.C.R., Härtel C.E.J. (2022) What the Digital Age Is and Means for Workers, Services, and Emotions Scholars and Practitioners. Research on Emotion in Organizations, 16, 9-17. DOI: https://doi.org/10.1108/S1746-979120200000016003
Isa S.M., Nico G., Permana M. (2022) Indobert for Indonesian Fake News Detection. ICIC Express Letters, 16(3), 289-297. DOI: https://doi.org/10.24507/icicel.16.03.289
Jentzsch N. (2018) State-of-the-Art of the Economics of Cyber-Security and Privacy (IPACSO Deliverable D4.1). DOI: https://doi.org/10.2139/ssrn.2671291
Jiang L., Jayatilaka A., Nasim M., Grobler M., Zahedi M., Ali Babar M. (2022) Systematic Literature Review on Cyber Situational Awareness Visualizations. IEEE Access, 10, 57525-57554. DOI: https://doi.org/10.1109/access.2022.3178195
Katsikeas S., Johnson P., Ekstedt M., Lagerström R. (2021) Research Communities in Cyber Security: A Comprehensive Literature Review. Computer Science Review, 42, 100431. DOI: https://doi.org/10.1016/j.cosrev.2021.100431
Kharchenko V., Dotsenko S., Illiashenko O., Kamenskyi S. (2019) Integrated Cyber Safety Security Management System: Industry 4.0 Issue. In: Conference Proceedings of 2019 10th International Conference on Dependable Systems, Services and Technologies, DESSERT 2019, June 5-7, pp. 197-201. DOI: https://doi.org/10.1109/DESSERT.2019.8770010
Kopotun I., Nikitin A., Dombrovan N., Tulinov V., Kyslenko D. (2020) Expanding the Potential of the Preventive and Law Enforcement Function of the Security Police in Combating Cybercrime in Ukraine and the EU. TEM Journal, 9(2), 460-468. DOI: https://doi.org/10.18421/TEM92-06
Kure H.I., Islam S., Abdur Razzaque M. (2018) An Integrated Cyber Security Risk Management Approach for a Cyber-Physical System. Applied Sciences (Switzerland), 8(6), 8060898. DOI: https://doi.org/10.3390/app8060898
Li Y., Liu Q. (2021) A Comprehensive Review Study of Cyber-Attacks and Cyber Security. Emerging Trends and Recent Developments. Energy Reports, 7, 8176-8186. DOI: https://doi.org/10.1016/j.egyr.2021.08.126
Limba T., Plėta T., Agafonov K., Damkus M. (2017) Cyber security management model for critical infrastructure. Entrepreneurship and Sustainability Issues, 4(4), 559-573. DOI: https://doi.org/10.9770/jesi.2017.4.4(12)
Mantha B.R.K., de Soto B.G. (2021) Assessment of the Cybersecurity Vulnerability of Construction Networks. Engineering, Construction and Architectural Management, 28(10), 3078-3105. DOI: https://doi.org/10.1108/ECAM-06-2020-0400
Marcantoni M., Jayawardhana B., Perez Chaher M., Bunte K. (2022) Secure Formation Control via Edge Computing Enabled by Fully Homomorphic Encryption and Mixed Uniform-Logarithmic Quantization. IEEE Control Systems Letters, 7, 395-400. DOI: https://doi.org/10.1109/LCSYS.2022.3188944
McEvoy R., Kowalski S. (2019) Cassandra's Calling Card: Socio-Technical Risk Analysis and Management in Cyber Security Systems. In: CEUR Workshop Proceedings, vol. 2398, pp. 65-80.
Michalec O., Milyaeva S., Rashid A. (2022) When the Future Meets the Past: Can Safety and Cyber Security Coexist in Modern Critical Infrastructures? Big Data & Society, 9(1), 205395172211083. DOI: https://doi.org/10.1177/20539517221108369
Mitrofanova A., Konovalova V., Mitrofanova E., Ashurbekov R., Trubitsyn T. (2017) Human Resource Risk Management in Organization: Methodological Aspect. Paper presented at the International Conference on Trends of Technologies and Innovations in Economic and Social Studies 2017. DOI: https://doi.org/10.2991/ttiess-17.2017.114
Mongeon P., Paul-Hus A. (2016) The Journal Coverage of Web of Science and Scopus: A Comparative Analysis. Scientometrics, 106(1), 213-228. DOI: https://doi.org/10.1007/s11192-015-1765-5
Morgan P.L., Collins E.I.M., Spiliotopoulos T., Greeno D.J, Jones D.M. (2022) Reducing Risk to Security and Privacy in the Selection of Trigger-Action Rules: Implicit vs. Explicit Priming for Domestic Smart Devices. International Journal of Human - Computer Studies, 168, 102902. DOI: https://doi.org/10.1016/j.ijhcs.2022.102902
Mouti S., Kumar S., Althubiti S.A., Altaf M., Alenezi F., Arumugam M. (2022) Cyber Security Risk Management with Attack Detection Frameworks Using Multi Connect Variational Auto-Encoder with Probabilistic Bayesian Networks. Computers and Electrical Engineering, 103, 108308. DOI: https://doi.org/10.1016/j.compeleceng.2022.108308
Pollini A., Callari T.C., Tedeschi A., Ruscio D., Save L., Chiarugi F., Guerri D. (2022) Leveraging Human Factors in Cybersecurity: An Integrated Methodological Approach. Cognition, Technology and Work, 24(2), 371-390. DOI: https://doi.org/10.1007/s10111-021-00683-y
Qi A., Shao G., Zheng W. (2018) Assessing China's Cybersecurity Law. Computer Law and Security Review, 34(6),1342-1354. DOI: https://doi.org/10.1016/j.clsr.2018.08.007
Quincozes S.E., Mosse D., Passos D., Albuquerque C., Ochi L.S., Dos Santos V.F. (2022) On the Performance of GRASP-Based Feature Selection for CPS Intrusion Detection. IEEE Transactions on Network and Service Management, 19(1), 614-626. DOI: https://doi.org/10.1109/TNSM.2021.3088763
Rajan R., Rana N.P., Parameswar N., Dhir S., Sushil S., Dwivedi Y.K. (2021) Developing a Modified Total Interpretive Structural Model (M-TISM) for Organizational Strategic Cybersecurity Management. Technological Forecasting and Social Change, 170, 120872. DOI: https://doi.org/10.1016/j.techfore.2021.120872
Rosado D.G., Santos-Olmo A., Sánchez L.E., Serrano M.A., Blanco C., Mouratidis H., Fernández-Medina E. (2022) Managing Cybersecurity Risks of Cyber-Physical Systems: The MARISMA-CPS Pattern. Computers in Industry, 142, 103715. DOI: https://doi.org/10.1016/j.compind.2022.103715
Scanlan J., Thomas T., Tan T., Chen Y.P., Watters P.A., Fieldhouse M., Fung L., Girdler S. (2020) Neurodiverse Knowledge, Skills and Ability Assessment for Cyber Security. Paper presented at the Australasian Conference on Information Systems 2020, Wellington. https://www.researchgate.net/publication/350964865_Neurodiverse_Knowledge_Skills_and_Ability_Assessment_for_Cyber_Security, дата обращения 19.04.2023.
Sobb T., Turnbull B., Moustafa N. (2020) Supply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions. Electronics (Switzerland), 9(11), 9111864. DOI: https://doi.org/10.3390/electronics9111864
Watanabe K. (2019) PPP (Public-Private Partnership)-Based Cyber Resilience Enhancement Efforts for National Critical Infrastructures Protection in Japan. In: Critical Information Infrastructures Security (Proceedings of the 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018), Heidelberg, Dordrecht, London, New York: Springer, pp. 169-178. DOI: https://doi.org/10.1007/978-3-030-05849-4_13
Zyoud H., Fuchs-Hanusch D. (2017) A bibliometric-based survey on AHP and TOPSIS techniques. Expert Systems with Applications, 78, 158-181. DOI: https://doi.org/10.1016/j.eswa.2017.02.016

This work is licensed under a Creative Commons Attribution 4.0 International License.