A cyclical evaluation model of information security maturity
نویسندگان
چکیده
! ABSTRACT Purpose The lack of a security evaluation method might expose organizations to several risky situations. This paper aims at presenting a cyclical evaluation model of information security maturity. Design/methodology/approach This model was developed through the definition of a set of steps to be followed in order to obtain periodical evaluation of maturity and continuous improvement of controls. Findings – This model is based on controls present in ISO/IEC 27002, provides a means to measure the current situation of information security management through the use of a maturity model and provides a subsidy to take appropriate and feasible improvement actions, based on risks. A case study is performed and the results indicate that the method is efficient for evaluating the current state of information security, to support information security management, risks identification and business and internal control processes. Research limitations/implications It is possible that modifications to the process may be needed where there is less understanding of security requirements, such as in a less mature organization. Originality/value This paper presents a generic model applicable to all kinds of organizations. The main contribution of this paper is the use of a maturity scale allied to the cyclical process of evaluation, providing the generation of immediate indicators for the management of information security. !
منابع مشابه
Identifying the Challenges of the Blockchain Technology Maturity Model in Health-Oriented Organizations
Introduction: Blockchain is a widely used technology in the health area; however, it also comes with challenges. By identifying these challenges, the road to blockchain maturity can be made smoother in this field. This study aimed to identify the challenges of the blockchain technology maturity model in health-oriented organizations. Method: In this phenomenological qualitative study, experts i...
متن کاملIdentifying the Challenges of the Blockchain Technology Maturity Model in Health-Oriented Organizations
Introduction: Blockchain is a widely used technology in the health area; however, it also comes with challenges. By identifying these challenges, the road to blockchain maturity can be made smoother in this field. This study aimed to identify the challenges of the blockchain technology maturity model in health-oriented organizations. Method: In this phenomenological qualitative study, experts i...
متن کاملQuantitative Security Risk Evaluation using CVSS Metrics by Estimation of Frequency and Maturity of Exploit
The evaluation of network risk is a vital task. It is an essential step in securing any network. This evaluation can help security professionals in making optimal decisions about how to design security countermeasures in order to improve security. This paper proposes a risk estimation model that uses vulnerability database National Institute of Standards and Technology (NIST) National Vulnerabi...
متن کاملThe Relationship between Capital Investment Choice and Capital Productivity: A Test of Firm Life Cycle Theory (A Comparative Investigation of Cyclical and Non-Cyclical Companies)
According to the firm life cycle theory, companies go through certain behavioral patterns in various stages of their life. A thorough understanding and recognition of these behavioral patterns, new investment in assets and the optimal use of assets can considerably enhance the capital productivity. In the current study, the relationship between the stages of firm life cycle and capital producti...
متن کاملIsfam: the Information Security Focus Area Maturity Model
Information security is mainly a topic that is considered to be information technology related. However, to successfully implement information security, an organization’s information security program should reflect the business strategy. Nowadays information security is in many companies enforced by the information technology department, based on what they think should be in place to protect th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Inf. Manag. Comput. Security
دوره 22 شماره
صفحات -
تاریخ انتشار 2014