Adopting security maturity model to the organizations' capability model

被引:11
|
作者
Al-Matari, Osamah M. M. [1 ]
Helal, Iman M. A. [1 ]
Mazen, Sherif A. [1 ]
Elhennawy, Sherif
机构
[1] Cairo Univ, Dept Informat Syst, FCI, Giza, Egypt
关键词
Security maturity; Security controls; Maturity assessments; Capability process; Cybersecurity; INFORMATION SECURITY; MANAGEMENT;
D O I
10.1016/j.eij.2020.08.001
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Each organization faces threats and risks in daily operations. One of the main risks is how to assess the security level to protect from the increasing risks associated with technology evolution. So, organizations can specify the required approaches and skills. In this paper, we propose a security maturity model that classifies the organizations into five levels. Each level determines the technologies and process capability used by the organizations. There is a set of factors that can help in determining the security maturity level, such as technology, people, and infrastructure. This paper adopts an Information Security Management model to assess organization's security level. The authors make a correspondence between maturity levels and security levels in an organization. Also, the proposed process capability controls influence both levels. The proposed model helps the organizations bridging the cybersecurity gaps. These gaps relate to talent, technology, organizational units, financial, management and operations gaps. Thus, the model helps the cybersecurity auditors to create a comprehensive plan for measuring the security level of the organization. This plan can manage and develop the organization's automated countermeasures. Also, it can help in applying the suitable standard and framework based on the organization's daily operation. Cybersecurity auditors use cybersecurity techniques and tools to assess the organization's postures. Finally, the authors applied the security maturity controls in two case studies: retirement organization and public telecommunication corporation in the Republic of Yemen. (C) 2021 THE AUTHORS. Published by Elsevier BV on behalf of Faculty of Computers and Artificial Intelligence, Cairo University.
引用
收藏
页码:193 / 199
页数:7
相关论文
共 50 条
  • [1] Transforming software organizations with the capability maturity model
    Arent, J
    [J]. PRODUCT FOCUSED SOFTWARE PROCESS IMPROVEMENT, 2000, 1840 : 103 - 114
  • [2] A Capability Maturity Framework for IT Security Governance in Organizations
    Maleh, Yassine
    Sahid, Abdelkbir
    Ezzati, Abdellah
    Belaissaoui, Mustapha
    [J]. INNOVATIONS IN BIO-INSPIRED COMPUTING AND APPLICATIONS, IBICA 2017, 2018, 735 : 221 - 233
  • [3] A Dynamic Capability Maturity Model for Improving Cyber Security
    Adler, Richard M.
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2013, : 230 - 235
  • [4] Lessons learned with the Systems Security Engineering Capability Maturity Model
    Hefner, R
    [J]. PROCEEDINGS OF THE 1997 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, 1997, : 566 - 567
  • [5] A New Adaptive Cyber-security Capability Maturity Model
    Ghaffari, Fariba
    Arabsorkhi, Abouzar
    [J]. 2018 9TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2018, : 298 - 304
  • [6] Information Security Maturity Model for Healthcare Organizations in the United States
    Barnes, Bridget
    Daim, Tugrul
    [J]. IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2024, 71 : 928 - 939
  • [7] The capability maturity model and CASE
    Mathiassen, L
    Sorensen, C
    [J]. INFORMATION SYSTEMS JOURNAL, 1996, 6 (03) : 195 - 208
  • [8] Essence of the capability maturity model
    Bamberger, J
    [J]. COMPUTER, 1997, 30 (06) : 112 - 114
  • [9] Computer-aided system of Systems Security Engineering Capability Maturity Model
    Zhang, JR
    Wang, YH
    Cui, BL
    [J]. PROCEEDINGS OF THE 2001 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING, VOLS I AND II, 2001, : 266 - 269
  • [10] Software quality and the Capability Maturity Model
    Herbsleb, J
    Zubrow, D
    Goldenson, D
    Hayes, W
    Paulk, M
    [J]. COMMUNICATIONS OF THE ACM, 1997, 40 (06) : 30 - 40