Pourzolfaghar et al., 2026 - Google Patents
Adapted Cybersecurity Risk Analysis, Assessment, and Mitigation Framework for Smart BuildingsPourzolfaghar et al., 2026
- Document ID
- 2257803623095990162
- Author
- Pourzolfaghar Z
- Habibi Lashkari A
- Hashemi R
- Helfert M
- Publication year
- Publication venue
- Understanding Cybersecurity Management in the Construction Industry: Challenges, Strategies and Trends
External Links
Snippet
In this chapter we introduced a tailored cybersecurity risk management framework specifically designed for smart buildings and the digital construction ecosystem. Building on the limitations of existing risk practices in the industry, the structured, seven domain …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal operating condition and not elsewhere provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/0202—Child monitoring systems using a transmitter-receiver system carried by the parent and the child
- G08B21/0275—Electronic Article Surveillance [EAS] tag technology used for parent or child unit, e.g. same transmission technology, magnetic tag, RF tag, RFID
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Ross et al. | Protecting controlled unclassified information in nonfederal systems and organizations | |
| Turk et al. | Cybersecurity assessment of BIM/CDE design environment using cyber assessment framework | |
| Saleh | Information security maturity model | |
| Brumfield | Cybersecurity risk management: Mastering the fundamentals using the NIST cybersecurity framework | |
| Goodwin et al. | Developing a National strategy for CyberSecurity | |
| Akinsola et al. | Enhancing software supply chain resilience: Strategy for mitigating software supply chain security risks and ensuring security continuity in development lifecycle | |
| Kohnke et al. | Implementing cybersecurity: A guide to the national institute of standards and technology risk management framework | |
| Baars et al. | Foundations of information security based on ISO27001 and ISO27002 | |
| Abdelmagid et al. | Zero Trust Architecture as a Risk Countermeasure in Small–Medium Enterprises and Advanced Technology Systems | |
| Authority | Cyber security framework | |
| Edwards | Vulnerability assessment and penetration testing | |
| Khan et al. | A Fuzzy‐AHP Decision‐Making Framework for Optimizing Software Maintenance and Deployment in Information Security Systems | |
| Edwards | Critical Security Controls for Effective Cyber Defense | |
| Haber et al. | Regulatory compliance | |
| Edwards | Data Protection | |
| Babu | AI-Driven Threat Modeling: Enhancing Risk Assessment in Software Projects | |
| Edwards | Data Recovery | |
| Pourzolfaghar et al. | Adapted Cybersecurity Risk Analysis, Assessment, and Mitigation Framework for Smart Buildings | |
| Kaur et al. | Information Technology Risk Management | |
| Cochran | Incident response, business continuity, and disaster recovery | |
| Honan | ISO27001 in a Windows Environment: The best practice handbook for a Microsoft Windows environment | |
| Kadam | Cyber security breaches in corporate networks: a literature review on recent threats and their impact | |
| Pinckard et al. | A Mapping of the Federal Financial Institutions Examination Council (FFIEC) Cybersecurity Assessment Tool (CAT) to the Cyber Resilience Review (CRR) | |
| Shaqiri | A System for Cost-Efficient Cybersecurity Planning, Compliance, and Investment Prioritization | |
| Blum | Establish a Control Baseline |