[go: up one dir, main page]

Pourzolfaghar et al., 2026 - Google Patents

Adapted Cybersecurity Risk Analysis, Assessment, and Mitigation Framework for Smart Buildings

Pourzolfaghar et al., 2026

Document ID
2257803623095990162
Author
Pourzolfaghar Z
Habibi Lashkari A
Hashemi R
Helfert M
Publication year
Publication venue
Understanding Cybersecurity Management in the Construction Industry: Challenges, Strategies and Trends

External Links

Snippet

In this chapter we introduced a tailored cybersecurity risk management framework specifically designed for smart buildings and the digital construction ecosystem. Building on the limitations of existing risk practices in the industry, the structured, seven domain …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal operating condition and not elsewhere provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/0275Electronic Article Surveillance [EAS] tag technology used for parent or child unit, e.g. same transmission technology, magnetic tag, RF tag, RFID

Similar Documents

Publication Publication Date Title
Ross et al. Protecting controlled unclassified information in nonfederal systems and organizations
Turk et al. Cybersecurity assessment of BIM/CDE design environment using cyber assessment framework
Saleh Information security maturity model
Brumfield Cybersecurity risk management: Mastering the fundamentals using the NIST cybersecurity framework
Goodwin et al. Developing a National strategy for CyberSecurity
Akinsola et al. Enhancing software supply chain resilience: Strategy for mitigating software supply chain security risks and ensuring security continuity in development lifecycle
Kohnke et al. Implementing cybersecurity: A guide to the national institute of standards and technology risk management framework
Baars et al. Foundations of information security based on ISO27001 and ISO27002
Abdelmagid et al. Zero Trust Architecture as a Risk Countermeasure in Small–Medium Enterprises and Advanced Technology Systems
Authority Cyber security framework
Edwards Vulnerability assessment and penetration testing
Khan et al. A Fuzzy‐AHP Decision‐Making Framework for Optimizing Software Maintenance and Deployment in Information Security Systems
Edwards Critical Security Controls for Effective Cyber Defense
Haber et al. Regulatory compliance
Edwards Data Protection
Babu AI-Driven Threat Modeling: Enhancing Risk Assessment in Software Projects
Edwards Data Recovery
Pourzolfaghar et al. Adapted Cybersecurity Risk Analysis, Assessment, and Mitigation Framework for Smart Buildings
Kaur et al. Information Technology Risk Management
Cochran Incident response, business continuity, and disaster recovery
Honan ISO27001 in a Windows Environment: The best practice handbook for a Microsoft Windows environment
Kadam Cyber security breaches in corporate networks: a literature review on recent threats and their impact
Pinckard et al. A Mapping of the Federal Financial Institutions Examination Council (FFIEC) Cybersecurity Assessment Tool (CAT) to the Cyber Resilience Review (CRR)
Shaqiri A System for Cost-Efficient Cybersecurity Planning, Compliance, and Investment Prioritization
Blum Establish a Control Baseline