A cyclical evaluation model of information security maturity

نویسندگان

  • Evandro Alencar Rigon
  • Carla Merkle Westphall
  • Daniel Ricardo dos Santos
  • Carlos Becker Westphall
چکیده

! ABSTRACT Purpose The lack of a security evaluation method might expose organizations to several risky situations. This paper aims at presenting a cyclical evaluation model of information security maturity. Design/methodology/approach This model was developed through the definition of a set of steps to be followed in order to obtain periodical evaluation of maturity and continuous improvement of controls. Findings – This model is based on controls present in ISO/IEC 27002, provides a means to measure the current situation of information security management through the use of a maturity model and provides a subsidy to take appropriate and feasible improvement actions, based on risks. A case study is performed and the results indicate that the method is efficient for evaluating the current state of information security, to support information security management, risks identification and business and internal control processes. Research limitations/implications It is possible that modifications to the process may be needed where there is less understanding of security requirements, such as in a less mature organization. Originality/value This paper presents a generic model applicable to all kinds of organizations. The main contribution of this paper is the use of a maturity scale allied to the cyclical process of evaluation, providing the generation of immediate indicators for the management of information security. !

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Identifying the Challenges of the Blockchain Technology Maturity Model in Health-Oriented Organizations

Introduction: Blockchain is a widely used technology in the health area; however, it also comes with challenges. By identifying these challenges, the road to blockchain maturity can be made smoother in this field. This study aimed to identify the challenges of the blockchain technology maturity model in health-oriented organizations. Method: In this phenomenological qualitative study, experts i...

متن کامل

Identifying the Challenges of the Blockchain Technology Maturity Model in Health-Oriented Organizations

Introduction: Blockchain is a widely used technology in the health area; however, it also comes with challenges. By identifying these challenges, the road to blockchain maturity can be made smoother in this field. This study aimed to identify the challenges of the blockchain technology maturity model in health-oriented organizations. Method: In this phenomenological qualitative study, experts i...

متن کامل

Quantitative Security Risk Evaluation using CVSS Metrics by Estimation of Frequency and Maturity of Exploit

The evaluation of network risk is a vital task. It is an essential step in securing any network. This evaluation can help security professionals in making optimal decisions about how to design security countermeasures in order to improve security. This paper proposes a risk estimation model that uses vulnerability database National Institute of Standards and Technology (NIST) National Vulnerabi...

متن کامل

The Relationship between Capital Investment Choice and Capital Productivity: A Test of Firm Life Cycle Theory (A Comparative Investigation of Cyclical and Non-Cyclical Companies)

According to the firm life cycle theory, companies go through certain behavioral patterns in various stages of their life. A thorough understanding and recognition of these behavioral patterns, new investment in assets and the optimal use of assets can considerably enhance the capital productivity. In the current study, the relationship between the stages of firm life cycle and capital producti...

متن کامل

Isfam: the Information Security Focus Area Maturity Model

Information security is mainly a topic that is considered to be information technology related. However, to successfully implement information security, an organization’s information security program should reflect the business strategy. Nowadays information security is in many companies enforced by the information technology department, based on what they think should be in place to protect th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Inf. Manag. Comput. Security

دوره 22  شماره 

صفحات  -

تاریخ انتشار 2014