A New Adaptive Cyber-security Capability Maturity Model

被引:0
|
作者
Ghaffari, Fariba [1 ]
Arabsorkhi, Abouzar [2 ]
机构
[1] Tarbait Modares Univ, Tehran, Iran
[2] Iran Telecommun Ctr, Tehran, Iran
关键词
Information Security; Security Measurement; Maturity Model; Systematic Literature Review;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
One of the key indicators of success in deploying business processes in organizations is to pay attention to the organization's current status and its proper targeting for the future. As our need to continuous planning and improvement, the maturity model is presented as a continuous and level-based performance evaluation tool. This model shows not only the current situation, but also the closest and most desirable situation for managers. Also, maturity model determines the amount of progress based on set of specific criteria. Since security is known as a process not a product, the maturity model is also used to measure the level of organization's security. Today, because of the growing importance of security, identifying the factors that can be used to assess the level of cyber security is the ability that organizations are trying to achieve. In this paper, based on the conditions of information security and technology maturity, examining different maturity models and reviewing content literature, we propose a comprehensive framework to defining the criteria for evaluation of organizational maturity.
引用
收藏
页码:298 / 304
页数:7
相关论文
共 50 条
  • [41] Cultural and psychological factors in cyber-security
    Halevi, Tzipora
    Memon, Nasir
    Lewis, James
    Kumaraguru, Ponnurangam
    Arora, Sumit
    Dagar, Nikita
    Aloul, Fadi
    Chen, Jay
    [J]. Journal of Mobile Multimedia, 2017, 13 (1-2): : 43 - 56
  • [42] A genetic epidemiology approach to cyber-security
    Gil, Santiago
    Kott, Alexander
    Barabasi, Albert-Laszlo
    [J]. SCIENTIFIC REPORTS, 2014, 4
  • [43] Cyber-security initiative now underway
    Jevtic, N
    [J]. CHEMICAL PROCESSING, 2003, 66 (02): : 17 - 17
  • [44] Fuzz Testing for Automotive Cyber-security
    Fowler, Daniel
    Bryans, Jeremy
    Shaikh, Siraj Ahmed
    Wooderson, Paul
    [J]. 2018 48TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W), 2018, : 239 - 246
  • [45] A genetic epidemiology approach to cyber-security
    Santiago Gil
    Alexander Kott
    Albert-László Barabási
    [J]. Scientific Reports, 4
  • [46] Data Analysis for Network Cyber-security
    Dietz, Sebastian
    [J]. JOURNAL OF THE ROYAL STATISTICAL SOCIETY SERIES A-STATISTICS IN SOCIETY, 2016, 179 (03) : 878 - 878
  • [47] Adopting security maturity model to the organizations' capability model
    Al-Matari, Osamah M. M.
    Helal, Iman M. A.
    Mazen, Sherif A.
    Elhennawy, Sherif
    [J]. EGYPTIAN INFORMATICS JOURNAL, 2021, 22 (02) : 193 - 199
  • [48] Repercussions of Coronavirus on Cyber-Security Threats
    Pandharipande, Aryan
    Parashar, Ritik
    [J]. BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2020, 13 (14): : 45 - 48
  • [49] The Effects of Cyber-Security on Healthcare Industry
    Alharam, Aysha K.
    El-madany, Wael
    [J]. 2017 9TH IEEE-GCC CONFERENCE AND EXHIBITION (GCCCE), 2018, : 689 - 694
  • [50] Cyber-Security Considerations for the Smart Grid
    Clements, Sam
    Kirkham, Harold
    [J]. IEEE POWER AND ENERGY SOCIETY GENERAL MEETING 2010, 2010,