Unraveling trust management in cybersecurity: insights from a systematic literature review

被引:0
作者
Pigola, Angelica [1 ]
Meirelles, Fernando de Souza [1 ]
机构
[1] Fundacao Getulio Vargas FGV EAESP, Sao Paulo Business Sch, Ave 9 Julho,2029 Bela Vista, BR-01313902 Sao Paulo, SP, Brazil
关键词
Trust management; Systematic literature review; Cybersecurity; Information security; INFORMATION-SYSTEMS; THREAT MITIGATION; RISK-MANAGEMENT; SECURITY; PRIVACY; BLOCKCHAIN; INTERNET; DESIGN; REQUIREMENTS; METHODOLOGY;
D O I
10.1007/s10799-024-00438-x
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
This paper presents the findings of a systematic literature review aimed at elucidating the key anchors, strategies, methods, and techniques pertinent to trust management (TM) in cybersecurity. Drawing upon a meticulous analysis of 106 scholarly papers published between 2001 and 2024, the review offers a comprehensive overview of TM in cybersecurity practices in diverse cyber contexts. The study identifies seven foundational anchors crucial for effective TM frameworks: authentication, authorization, access control, privacy protection, monitoring and auditing, encryption and cryptography, risk management, and iterative and interactive trust processes. Additionally, ten overarching strategies emerge from the synthesis of literature, encompassing identity and access management, role-based access control, least privilege principle, digital certificates or public key infrastructure, security policies and procedures, encryption and data protection, continuous monitoring and risk assessment, vendor and third-party risk management, compliance management and continuous collaboration. Furthermore, the review delineates several methods instrumental in TM processes, and various techniques augmenting these methods were also identified, ranging from trust scoring algorithms and trust aggregation mechanisms to trust reasoning engines and trust-aware routing protocols. The synthesis of literature not only elucidates the multifaceted nature of TM in cybersecurity presented in a framework but also underscores the evolving strategies and technologies employed to establish and maintain trust in dynamic digital ecosystems. By providing a comprehensive overview of anchors, strategies, methods, and techniques in TM in cybersecurity. This review offers valuable insights for practitioners, researchers, and policymakers engaged in enhancing trustworthiness and resilience in contemporary cyber environments.
引用
收藏
页数:23
相关论文
共 50 条
  • [21] The impact of time pressure on cybersecurity behaviour: a systematic literature review
    Chowdhury, Noman H.
    Adam, Marc T. P.
    Skinner, Geoffrey
    BEHAVIOUR & INFORMATION TECHNOLOGY, 2019, 38 (12) : 1290 - 1308
  • [22] Cybersecurity Awareness Through Serious Games: A Systematic Literature Review
    Moumouh, Chaimae
    Chkouri, Mohamed Yassin
    Fernandez-Aleman, Jose L.
    EMERGING TRENDS IN INTELLIGENT SYSTEMS & NETWORK SECURITY, 2023, 147 : 190 - 199
  • [23] The social contract theory meets cybersecurity: systematic literature review
    Kleiner, Jan
    DIGITAL POLICY REGULATION AND GOVERNANCE, 2024,
  • [24] An Assessment of Capabilities Required for Effective Cybersecurity Incident Management - A Systematic Literature Review
    Falowo, Olufunsho I.
    Koshoedo, Kehinde
    Ozer, Murat
    2023 INTERNATIONAL CONFERENCE ON DATA SECURITY AND PRIVACY PROTECTION, DSPP, 2023, : 1 - 11
  • [25] Evolution of Cybersecurity Concerns: A Systematic Literature Review
    Ganapati, Sukumar
    Ahn, Michael
    Reddick, Christopher G.
    TOGETHER IN THE UNSTABLE WORLD: DIGITAL GOVERNMENT AND SOLIDARITY, 2023, : 90 - 97
  • [26] Artificial Intelligence for Cybersecurity: A Systematic Mapping of Literature
    Wiafe, Isaac
    Koranteng, Felix Nti
    Obeng, Emmanuel Nyarko
    Assyne, Nana
    Wiafe, Abigail
    Gulliver, Stephen R.
    IEEE ACCESS, 2020, 8 : 146598 - 146612
  • [27] Cognitively Available Cybersecurity: A Systematic Literature Review
    Kavrestad, Joakim
    Naqvi, Bilal
    HUMAN-CENTERED SOFTWARE ENGINEERING, HCSE 2024, 2024, 14793 : 160 - 170
  • [28] Systematic Literature Review on Cybersecurity and its Influence on Cyber Attacks Targeting IoT Devices
    Padilla-Gomez, Mario
    Gamboa-Cruzado, Javier
    Tavara-Aponte, Segundo
    Nunez-Meza, Angel
    Amayo-Gamboa, Flavio
    Arauco-Esquivel, Saul
    COMPUTACION Y SISTEMAS, 2024, 28 (04): : 1847 - 1864
  • [29] Toward a Holistic Privacy Requirements Engineering Process: Insights From a Systematic Literature Review
    Herwanto, Guntur Budi
    Ekaputra, Fajar J.
    Quirchmayr, Gerald
    Tjoa, A. Min
    IEEE ACCESS, 2024, 12 : 47518 - 47542
  • [30] A systematic literature review of the role of trust and security on Fintech adoption in banking
    Jafri, Johan Ariff
    Amin, Syajarul Imna Mohd
    Rahman, Aisyah Abdul
    Nor, Shifa Mohd
    HELIYON, 2024, 10 (01)