Evaluation of the national information security policy by analytic hierarchy process

被引:0
|
作者
Andrade dos Santos, Clarice Saraiva [1 ,2 ]
Gaviao, Luiz Octavio [1 ,3 ]
dos Santos Oliveira, Leonardo Augusto [1 ,4 ]
Pereira, Jose Cristiano [5 ,6 ]
机构
[1] Escola Super Guerra, Rio De Janeiro, RJ, Brazil
[2] Seguranga Int & Def, Rio De Janeiro, RJ, Brazil
[3] Univ Fed Fluminense, Engn Prod, Niteroi, RJ, Brazil
[4] Administracao Empresas, Fundacao Getulio Vargas, Rio De Janeiro, Brazil
[5] Univ Catolica Petropolis, Petropolis, RJ, Brazil
[6] Lab Nacl Comp Cient, Petropolis, RJ, Brazil
来源
PERSPECTIVAS EM CIENCIA DA INFORMACAO | 2022年 / 27卷 / 04期
关键词
Information Security; Maturity Models; Analytic Hierarchy Process; MATURITY;
D O I
10.1590/1981-5344/29373
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Recent cybersecurity reports show that Brazil is one of the countries with the highest number of cybercrimes, affecting more than 60 million people and causing losses estimated at more than 20 billion dollars. Within the scope of the Public Administration, the National Information Security Policy (PNSI) assigned to the Institutional Security Office of the Presidency (GSI/PR) the task of monitoring and evaluating its execution, stimulating the broad participation of society and agencies and public authorities in the construction of the process, which includes the academic effort. To contribute to this context, this research analyzed different reference models, whose structure best suited the needs of the institutions evaluated and a quantitative method capable of objectively indicating the weight of the various variables in the model. The maturity model chosen was the CSF-NIST and the method selected was the Analytic Hierarchy Process (AHP), for weighting the criteria and sub criteria. A case study illustrates the application of the selected model and method, indicating "how" to implement them, considering the specificities of the evaluated institution.
引用
收藏
页码:108 / 145
页数:38
相关论文
共 50 条
  • [1] Information Security Policy Decision Making: An Analytic Hierarchy Process Approach
    Hwang, Junseok
    Syamsuddin, Irfan
    [J]. 2009 THIRD ASIA INTERNATIONAL CONFERENCE ON MODELLING & SIMULATION, VOLS 1 AND 2, 2009, : 158 - 163
  • [2] An Evaluation Model for Information Security of Android Application Based on Analytic Hierarchy Process
    Wan Yan
    Wang Guolin
    Feng Xiangyang
    [J]. 2016 WORLD AUTOMATION CONGRESS (WAC), 2016,
  • [3] Evaluation Model for Computer Network Information Security Based on Analytic Hierarchy Process
    Xi Zhen-yuan
    Chen He
    Wang Xiang-zhong
    Sheng Jian-ling
    Fan Yu-tao
    [J]. 2009 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL 3, PROCEEDINGS, 2009, : 186 - 189
  • [4] Ranking information security controls by using fuzzy analytic hierarchy process
    Khajouei, Hamid
    Kazemi, Mehdi
    Moosavirad, Seyed Hamed
    [J]. INFORMATION SYSTEMS AND E-BUSINESS MANAGEMENT, 2017, 15 (01) : 1 - 19
  • [5] Ranking information security controls by using fuzzy analytic hierarchy process
    Hamid Khajouei
    Mehdi Kazemi
    Seyed Hamed Moosavirad
    [J]. Information Systems and e-Business Management, 2017, 15 : 1 - 19
  • [6] Security policy selection method of pipeline transportation based on Analytic Hierarchy Process
    Li, H
    Xu, BH
    [J]. 2005 International Conference on Services Systems and Services Management, Vols 1 and 2, Proceedings, 2005, : 1194 - 1198
  • [7] Information Security Risk Assessment Based On Analytic Hierarchy Process and Fuzzy Comprehensive
    Xiao Long
    Qi Yong
    Li Qianmu
    [J]. 2008 INTERNATIONAL CONFERENCE ON RISK MANAGEMENT AND ENGINEERING MANAGEMENT, ICRMEM 2008, PROCEEDINGS, 2008, : 404 - 409
  • [8] Evaluation Model of Cloud Storage Security Level with the Fusion Analytic Hierarchy Process
    Cheng Cheng
    Zhuo Enyi
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (09): : 77 - 86
  • [9] Forewarned is forearmed Assessment of IoT information security risks using analytic hierarchy process
    Bharathi, S. Vijayakumar
    [J]. BENCHMARKING-AN INTERNATIONAL JOURNAL, 2019, 26 (08) : 2443 - 2467
  • [10] An Information System Security Risk Assessment Model Based on Fuzzy Analytic Hierarchy Process
    Liu Dong-liang
    Yang Shi-song
    [J]. 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 874 - 877