Can maturity models support cyber security?

被引:25
|
作者
Le, Ngoc T. [1 ]
Hoang, Doan B. [1 ]
机构
[1] Univ Technol Sydney, Fac Engn & IT, Broadway, NSW 2007, Australia
关键词
cyber space; cyber security; maturity model; security maturity model; cyber security metrics; INFORMATION SECURITY;
D O I
10.1109/PCCC.2016.7820663
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We are living in a cyber space with an unprecedented rapid expansion of the space and its elements. All interactive information is processed and exchanged via this space. Clearly a well-built cyber security is vital to ensure the security of the cyber space. However the definitions and scopes of both cyber space and cyber security are still not well-defined and this makes it difficult to establish sound security models and mechanisms for protecting this space. Out of existing models, maturity models offer a manageable approach for assessing the security level of a system or organization. The paper first provides a review of various definitions of cyber space and cyber security in order to ascertain a common understanding of the space and its security. The paper investigates existing security maturity models, focusing on their defining characteristics and identifying their strengths and weaknesses. Finally, the paper discusses and suggests measures for a sound and applicable cyber security model.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Analysis of Cyber Security Features in Industry 4.0 Maturity Models
    Goncalves de Azambuja, Antonio Joao
    Kern, Alexander
    Anderl, Reiner
    [J]. COMPUTER SECURITY: ESORICS 2021 INTERNATIONAL WORKSHOPS, 2022, 13106 : 91 - 106
  • [2] Information and cyber security maturity models: a systematic literature review
    Rabii, Anass
    Assoul, Saliha
    Ouazzani Touhami, Khadija
    Roudies, Ounsa
    [J]. INFORMATION AND COMPUTER SECURITY, 2020, 28 (04) : 627 - 644
  • [3] Modelling Cyber Security Governance Maturity
    de Bruin, Rossouw
    von Solms, S. H.
    [J]. 2015 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGY AND SOCIETY (ISTAS), 2015,
  • [4] NCSecMM: A National Cyber Security Maturity Model for an Interoperable "National Cyber Security" Framework
    El Kettani, Mohamed Dafir Ech-Cherif
    Debbagh, Taieb
    [J]. 9TH EUROPEAN CONFERENCE ON E-GOVERNMENT, PROCEEDINGS, 2009, : 236 - +
  • [5] A Maturity Assessment Model for Cyber Security Education in Europe
    Vidor, Silvia
    Budde, Carlos E.
    [J]. INFORMATION SECURITY EDUCATION - ADAPTING TO THE FOURTH INDUSTRIAL REVOLUTION, WISE 2022, 2022, 650 : 60 - 74
  • [6] Security Maturity Model of Web Applications for Cyber Attacks
    Rojas, Renato
    Muedas, Ana
    Mauricio, David
    [J]. PROCEEDINGS OF 2019 THE 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP 2019) WITH WORKSHOP 2019 THE 4TH INTERNATIONAL CONFERENCE ON MULTIMEDIA AND IMAGE PROCESSING (ICMIP 2019), 2019, : 130 - 137
  • [7] A Dynamic Capability Maturity Model for Improving Cyber Security
    Adler, Richard M.
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2013, : 230 - 235
  • [8] An Investigation on Cyber Security Threats and Security Models
    Thakur, Kutub
    Qiu, Meikang
    Gai, Keke
    Ali, Md Liakat
    [J]. 2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 307 - 311
  • [9] Decision support for healthcare cyber security
    Sonmez, Ferda Ozdemir
    Hankin, Chris
    Malacaria, Pasquale
    [J]. COMPUTERS & SECURITY, 2022, 122
  • [10] CAN Transceivers with cyber security functions
    Elend, Bernd
    Walrant, Thierry
    Olma, Georg
    [J]. AUTOMOTIVE SECURITY, 2017, 2017, 2310 : 53 - 57