A New Adaptive Cyber-security Capability Maturity Model

被引:0
|
作者
Ghaffari, Fariba [1 ]
Arabsorkhi, Abouzar [2 ]
机构
[1] Tarbait Modares Univ, Tehran, Iran
[2] Iran Telecommun Ctr, Tehran, Iran
关键词
Information Security; Security Measurement; Maturity Model; Systematic Literature Review;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
One of the key indicators of success in deploying business processes in organizations is to pay attention to the organization's current status and its proper targeting for the future. As our need to continuous planning and improvement, the maturity model is presented as a continuous and level-based performance evaluation tool. This model shows not only the current situation, but also the closest and most desirable situation for managers. Also, maturity model determines the amount of progress based on set of specific criteria. Since security is known as a process not a product, the maturity model is also used to measure the level of organization's security. Today, because of the growing importance of security, identifying the factors that can be used to assess the level of cyber security is the ability that organizations are trying to achieve. In this paper, based on the conditions of information security and technology maturity, examining different maturity models and reviewing content literature, we propose a comprehensive framework to defining the criteria for evaluation of organizational maturity.
引用
收藏
页码:298 / 304
页数:7
相关论文
共 50 条
  • [1] A Dynamic Capability Maturity Model for Improving Cyber Security
    Adler, Richard M.
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2013, : 230 - 235
  • [2] Fighting Botnets with Cyber-Security Analytics Dealing with heterogeneous cyber-security information in new generation SIEMs
    Gallego-Nicasio Crespo, Beatriz
    Garwood, Alan
    [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, : 192 - 198
  • [3] Social Cyber-Security
    Carley, Kathleen M.
    Cervone, Guido
    Agarwal, Nitin
    Liu, Huan
    [J]. SOCIAL, CULTURAL, AND BEHAVIORAL MODELING, SBP-BRIMS 2018, 2018, 10899 : 389 - 394
  • [4] Beyond the Castle Model of cyber-risk and cyber-security
    Leuprecht, Christian
    Skillicorn, David B.
    Tait, Victoria E.
    [J]. GOVERNMENT INFORMATION QUARTERLY, 2016, 33 (02) : 250 - 257
  • [5] REGULATING CYBER-SECURITY
    Sales, Nathan Alexander
    [J]. NORTHWESTERN UNIVERSITY LAW REVIEW, 2013, 107 (04) : 1503 - 1568
  • [6] Cyber-security threat
    Klebba, Jesse
    [J]. CHEMISTRY & INDUSTRY, 2017, 81 (10) : 9 - 9
  • [7] Cyber-Security and Privacy
    Lopez, Javier
    Martinelli, Fabio
    Samarati, Pierangela
    [J]. ERCIM NEWS, 2015, (100): : 10 - 11
  • [8] Cyber-security trust model through adaptive cloud authentication protocol for web application
    Alsuwat, Hatim
    [J]. JOURNAL OF ELECTRONIC IMAGING, 2023, 32 (04)
  • [9] Cyber-security in networked and distributed model predictive control
    Arauz, T.
    Chanfreut, P.
    Maestre, J. M.
    [J]. ANNUAL REVIEWS IN CONTROL, 2022, 53 : 338 - 355
  • [10] Balancing Cyber-Security and Privacy
    Patakyova, Maria T.
    [J]. BRATISLAVA LAW REVIEW, 2020, 4 (01): : 181 - 183