A New Adaptive Cyber-security Capability Maturity Model

被引:0
|
作者
Ghaffari, Fariba [1 ]
Arabsorkhi, Abouzar [2 ]
机构
[1] Tarbait Modares Univ, Tehran, Iran
[2] Iran Telecommun Ctr, Tehran, Iran
关键词
Information Security; Security Measurement; Maturity Model; Systematic Literature Review;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
One of the key indicators of success in deploying business processes in organizations is to pay attention to the organization's current status and its proper targeting for the future. As our need to continuous planning and improvement, the maturity model is presented as a continuous and level-based performance evaluation tool. This model shows not only the current situation, but also the closest and most desirable situation for managers. Also, maturity model determines the amount of progress based on set of specific criteria. Since security is known as a process not a product, the maturity model is also used to measure the level of organization's security. Today, because of the growing importance of security, identifying the factors that can be used to assess the level of cyber security is the ability that organizations are trying to achieve. In this paper, based on the conditions of information security and technology maturity, examining different maturity models and reviewing content literature, we propose a comprehensive framework to defining the criteria for evaluation of organizational maturity.
引用
收藏
页码:298 / 304
页数:7
相关论文
共 50 条
  • [21] Grid Cyber-Security Strategy in an Attacker-Defender Model
    Chen, Yu-Cheng
    Mooney, Vincent John, III
    Grijalva, Santiago
    [J]. CRYPTOGRAPHY, 2021, 5 (02)
  • [22] Virtual Cyber-Security Testing Capability for large scale distributed information infrastructure protection
    Pederson, Perry
    Lee, David
    Shu, Guoqiang
    Chen, Dongluo
    Liu, Zhijun
    Li, Na
    Sang, Lifeng
    [J]. 2008 IEEE CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, VOLS 1 AND 2, 2008, : 372 - +
  • [23] Cyber-Security of Smart Microgrids: A Survey
    Nejabatkhah, Farzam
    Li, Yun Wei
    Liang, Hao
    Reza Ahrabi, Rouzbeh
    [J]. ENERGIES, 2021, 14 (01)
  • [24] Cyber-security: Who will provide protection?
    McIntosh, Chris
    [J]. Computer Fraud and Security, 2015, 2015 (12): : 19 - 20
  • [25] On SCADA PLC and Fieldbus Cyber-Security
    Davidson, Cordell
    Andel, Todd
    Yampolskiy, Mark
    McDonald, Todd
    Glisson, Brad
    Thomas, Tom
    [J]. PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2018), 2018, : 140 - 148
  • [26] Cyber-security in robotics and autonomous systems
    Matellan, Vicente
    Bonaci, Tamara
    Sabaliauskaite, Giedre
    [J]. ROBOTICS AND AUTONOMOUS SYSTEMS, 2018, 100 : 41 - 42
  • [27] THE IMPORTANCE AND ROLE OF NATO IN CYBER-SECURITY
    Cioaca, Catalin
    [J]. 15TH INTERNATIONAL CONFERENCE THE KNOWLEDGE-BASED ORGANIZATION: MILITARY SCIENCES. SECURITY AND DEFENSE, CONFERENCE PROCEEDINGS 1, 2009, 1 : 158 - 162
  • [28] WHERE NEXT FOR UK CYBER-SECURITY?
    Neville-Jones, Pauline
    Phillips, Mark
    [J]. RUSI JOURNAL, 2012, 157 (06): : 32 - 40
  • [29] AI, Connectivity and Cyber-Security in Avionics
    Gatti, Marc
    Damien, Alienor
    [J]. 2019 24TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2019, : 35 - 38
  • [30] Cyber-security fortresses built on quicksand
    Flexera Software, United States
    [J]. Netw. Secur., 8 (5-8):