Volume 21 No 6 (2023)
 Download PDF
Comparative Study of Cyber Security Risk Assessment Frameworks
Swapna Siddamsetti, Dr.Rajasekaran Subramanian
Abstract
Cybersecurity risk management is regarded as an essential component of a strategy for risk management because it enables the funding to be allocated to control the most severe risk by establishing priorities. There are several approaches for risk assessment and analysis. Meanwhile, international and national standardization groups reacted by developing multiple risk management for cybersecurity frameworks and standards that firms may use as they mature their network security capabilities. In summary, this study aims to critically assess three cybersecurity risk management frameworks widely used by enterprises to mitigate cyber risks. The article opens with an overview of why businesses should develop a cybersecurity risk control strategy. In addition, the article gives an introduction of some well-known risks associated with cybersecurity strategies, as well as Furthermore, the article identifies the evaluation criteria for making comparisons structures and offers a comprehensive assessment of particular risk management for cybersecurity structures intending to support framework selection decision-making, facilitating pragmatic execution of cybersecurity projects, and assisting organizations in dealing with cybersecurity risks. Finally, the study concludes with some thoughts.
Keywords
Cybersecurity risk management is regarded as an essential component of a strategy for risk management
Copyright
Copyright © Neuroquantology

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.