Risk-Based Cybersecurity Compliance Assessment System (RC2AS)

被引:4
|
作者
Alfaadhel, Afnan [1 ]
Almomani, Iman [1 ,2 ]
Ahmed, Mohanned [1 ]
机构
[1] Prince Sultan Univ, Comp Sci Dept, Secur Engn Lab, Riyadh 11586, Saudi Arabia
[2] Univ Jordan, King Abdullah Sch Informat Technol, Comp Sci Dept, Amman 11942, Jordan
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 10期
关键词
compliance assessment; maturity model; cybersecurity; risk; ECC; Saudi Arabia;
D O I
10.3390/app13106145
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Cybersecurity attacks are still causing significant threats to individuals and organizations, affecting almost all aspects of life. Therefore, many countries worldwide try to overcome this by introducing and applying cybersecurity regularity frameworks to maintain organizations' information and digital resources. Saudi Arabia has taken practical steps in this direction by developing the essential cybersecurity control (ECC) as a national cybersecurity regulation reference. Generally, the compliance assessment processes of different international cybersecurity standards and controls (ISO2700x, PCI, and NIST) are generic for all organizations with different scopes, business functionality, and criticality level, where the overall compliance score is absent with no consideration of the security control risk. Therefore, to address all of these shortcomings, this research takes the ECC as a baseline to build a comprehensive and customized risk-based cybersecurity compliance assessment system (RC2AS). ECC has been chosen because it is well-defined and inspired by many international standards. Another motive for this choice is the limited related works that have deeply studied ECC. RC2AS is developed to be compatible with the current ECC tool. It offers an offline self-assessment tool that helps the organization expedite the assessment process, identify current weaknesses, and provide better planning to enhance its level based on its priorities. Additionally, RC2AS proposes four methods to calculate the overall compliance score with ECC. Several scenarios are conducted to assess these methods and compare their performance. The goal is to reflect the accurate compliance score of an organization while considering its domain, needs, resources, and risk level of its security controls. Finally, the outputs of the assessment process are displayed through rich dashboards that comprehensively present the organization's cybersecurity maturity and suggest an improvement plan for its level of compliance.
引用
收藏
页数:31
相关论文
共 50 条
  • [31] Risk-Based Admissibility Assessment of Wind Generation Integrated into a Bulk Power System
    Wang, Cheng
    Liu, Feng
    Wang, Jianhui
    Wei, Wei
    Mei, Shengwei
    IEEE TRANSACTIONS ON SUSTAINABLE ENERGY, 2016, 7 (01) : 325 - 336
  • [32] Risk-Based Dynamic Security Assessment for Power System Operation and Operational Planning
    Ciapessoni, Emanuele
    Cirio, Diego
    Massucco, Stefano
    Morini, Andrea
    Pitto, Andrea
    Silvestro, Federico
    ENERGIES, 2017, 10 (04):
  • [33] Risk-based assessment and decision making of power system security in power market
    Tang, GQ
    Liu, FB
    Li, Y
    Yu, B
    Fu, R
    PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL CONFERENCE ON ELECTRIC UTILITY DEREGULATION, RESTRUCTURING AND POWER TECHNOLOGIES, VOLS 1 AND 2, 2004, : 551 - 555
  • [35] Immunogenicity for antisense oligonucleotides: a risk-based assessment
    Stebbins, Christopher C.
    Petrillo, Marco
    Stevenson, Lauren F.
    BIOANALYSIS, 2019, 11 (21) : 1913 - 1916
  • [36] Risk-based assessment and reliability data center
    Cho, Bill
    Proceedings of the ASME Pressure Vessels and Piping Conference 2005, Vol 7, 2005, 7 : 653 - 654
  • [37] FDA adopts risk-based plant assessment
    不详
    CHEMICAL WEEK, 2004, 166 (33) : 31 - 31
  • [38] Risk-based condition assessment and maintenance engineering
    Ghiocel, DM
    COMPUTATIONAL FLUID AND SOLID MECHANICS 2003, VOLS 1 AND 2, PROCEEDINGS, 2003, : 2281 - 2284
  • [39] Preliminary risk-based assessment of refrigerants in groundwater
    Vilardi, C
    Gogos, AS
    FIRST INTERNATIONAL CONFERENCE ON REMEDIATION OF CHLORINATED AND RECALCITRANT COMPOUNDS, VOL 1: RISK, RESOURCE, AND REGULATORY ISSUES, 1998, : 169 - 173
  • [40] A Framework for Incorporation of Infeed Uncertainty in Power System Risk-Based Security Assessment
    de Jong, Martijn
    Papaefthymiou, Georgios
    Palensky, Peter
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2018, 33 (01) : 613 - 621