Can maturity models support cyber security?

被引:25
|
作者
Le, Ngoc T. [1 ]
Hoang, Doan B. [1 ]
机构
[1] Univ Technol Sydney, Fac Engn & IT, Broadway, NSW 2007, Australia
关键词
cyber space; cyber security; maturity model; security maturity model; cyber security metrics; INFORMATION SECURITY;
D O I
10.1109/PCCC.2016.7820663
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We are living in a cyber space with an unprecedented rapid expansion of the space and its elements. All interactive information is processed and exchanged via this space. Clearly a well-built cyber security is vital to ensure the security of the cyber space. However the definitions and scopes of both cyber space and cyber security are still not well-defined and this makes it difficult to establish sound security models and mechanisms for protecting this space. Out of existing models, maturity models offer a manageable approach for assessing the security level of a system or organization. The paper first provides a review of various definitions of cyber space and cyber security in order to ascertain a common understanding of the space and its security. The paper investigates existing security maturity models, focusing on their defining characteristics and identifying their strengths and weaknesses. Finally, the paper discusses and suggests measures for a sound and applicable cyber security model.
引用
收藏
页数:7
相关论文
共 50 条
  • [11] CAN Transceivers with cyber security functions
    Elend, Bernd
    Walrant, Thierry
    Olma, Georg
    [J]. AUTOMOTIVE SECURITY, 2017, 2017, 2310 : 53 - 57
  • [12] A Maturity Model for Part of the African Union Convention on Cyber Security
    von Solms, Sh
    [J]. 2015 SCIENCE AND INFORMATION CONFERENCE (SAI), 2015, : 1316 - 1320
  • [13] A Readiness Model for Measuring the Maturity of Cyber Security Incident Management
    Rieger, David
    Tjoa, Simon
    [J]. ADVANCES IN INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS, 2019, 23 : 283 - 293
  • [14] Evaluation of cyber security in agile manufacturing: Maturity of Technologies and Applications
    Arnarson, Halldor
    Kanafi, Faraz Safarpour
    Kaarlela, Tero
    Seldeslachts, Ulrich
    Pieters, Roel
    [J]. 2022 IEEE/SICE INTERNATIONAL SYMPOSIUM ON SYSTEM INTEGRATION (SII 2022), 2022, : 784 - 789
  • [15] A New Adaptive Cyber-security Capability Maturity Model
    Ghaffari, Fariba
    Arabsorkhi, Abouzar
    [J]. 2018 9TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2018, : 298 - 304
  • [16] Security risk models for cyber insurance
    Aalabaf-Sabaghi, Morteza
    [J]. JOURNAL OF THE ROYAL STATISTICAL SOCIETY SERIES A-STATISTICS IN SOCIETY, 2022, 185 : S772 - S772
  • [17] Deception Planning Models for Cyber Security
    De Faveri, Cristiano
    Moreira, Ana
    Souza, Eric
    [J]. PROCEEDINGS OF THE 2017 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ITS APPLICATIONS (ICCSA 2017), 2017,
  • [18] Decision support approaches for cyber security investment
    Fielder, Andrew
    Panaousis, Emmanouil
    Malacaria, Pasquale
    Hankin, Chris
    Smeraldi, Fabrizio
    [J]. DECISION SUPPORT SYSTEMS, 2016, 86 : 13 - 23
  • [19] Cyber Security Maturity Model and Maqasid al-Shari'ah
    Ridza, Nadwiyah M.
    Aziz, Normaziah A.
    Saidin, Aznan Zuhid
    Wahiddin, Mohamed Ridza
    Dahlan, Abdul Rahman A.
    Ibrahim, Jamaludin
    Osman, Rahmah A. H.
    [J]. PROCEEDINGS 2018 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY FOR THE MUSLIM WORLD (ICT4M), 2018, : 266 - 271
  • [20] An Evolution Roadmap for Community Cyber Security Information Sharing Maturity Model
    Zhao, Wanying
    White, Gregory
    [J]. PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 2369 - 2378