Risk-Based Cybersecurity Compliance Assessment System (RC2AS)

被引:4
作者
Alfaadhel, Afnan [1 ]
Almomani, Iman [1 ,2 ]
Ahmed, Mohanned [1 ]
机构
[1] Prince Sultan Univ, Comp Sci Dept, Secur Engn Lab, Riyadh 11586, Saudi Arabia
[2] Univ Jordan, King Abdullah Sch Informat Technol, Comp Sci Dept, Amman 11942, Jordan
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 10期
关键词
compliance assessment; maturity model; cybersecurity; risk; ECC; Saudi Arabia;
D O I
10.3390/app13106145
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Cybersecurity attacks are still causing significant threats to individuals and organizations, affecting almost all aspects of life. Therefore, many countries worldwide try to overcome this by introducing and applying cybersecurity regularity frameworks to maintain organizations' information and digital resources. Saudi Arabia has taken practical steps in this direction by developing the essential cybersecurity control (ECC) as a national cybersecurity regulation reference. Generally, the compliance assessment processes of different international cybersecurity standards and controls (ISO2700x, PCI, and NIST) are generic for all organizations with different scopes, business functionality, and criticality level, where the overall compliance score is absent with no consideration of the security control risk. Therefore, to address all of these shortcomings, this research takes the ECC as a baseline to build a comprehensive and customized risk-based cybersecurity compliance assessment system (RC2AS). ECC has been chosen because it is well-defined and inspired by many international standards. Another motive for this choice is the limited related works that have deeply studied ECC. RC2AS is developed to be compatible with the current ECC tool. It offers an offline self-assessment tool that helps the organization expedite the assessment process, identify current weaknesses, and provide better planning to enhance its level based on its priorities. Additionally, RC2AS proposes four methods to calculate the overall compliance score with ECC. Several scenarios are conducted to assess these methods and compare their performance. The goal is to reflect the accurate compliance score of an organization while considering its domain, needs, resources, and risk level of its security controls. Finally, the outputs of the assessment process are displayed through rich dashboards that comprehensively present the organization's cybersecurity maturity and suggest an improvement plan for its level of compliance.
引用
收藏
页数:31
相关论文
共 43 条
  • [1] Aboelfotoh S. F., 2019, JOIV: International Journal on Informatics Visualization, V3, P157
  • [2] Ajmi L, 2019, 2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS)
  • [3] Al Hamed T., 2016, International Journal of Hybrid Information Technology, V9, P99, DOI DOI 10.14257/IJHIT.2016.9.11.10
  • [4] The role of national cybersecurity strategies on the improvement of cyb ersecurity e ducation
    AlDaajeh, Saleh
    Saleous, Heba
    Alrabaee, Saed
    Barka, Ezedin
    Breitinger, Frank
    Choo, Kim-Kwang Raymond
    [J]. COMPUTERS & SECURITY, 2022, 119
  • [5] A Holistic Cybersecurity Maturity Assessment Framework for Higher Education Institutions in the United Kingdom
    Aliyu, Aliyu
    Maglaras, Leandros
    He, Ying
    Yevseyeva, Iryna
    Boiten, Eerke
    Cook, Allan
    Janicke, Helge
    [J]. APPLIED SCIENCES-BASEL, 2020, 10 (10):
  • [6] Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia
    Almomani, Iman
    Ahmed, Mohanned
    Maglaras, Leandros
    [J]. PEERJ COMPUTER SCIENCE, 2021, 7
  • [7] Almudaires Fajer, 2021, 2021 International Conference on Information Technology (ICIT), P268, DOI 10.1109/ICIT52682.2021.9491648
  • [8] Almuhammadi S., 2017, Information Security Maturity Model for Nist Cyber Security Framework, V7, P51, DOI DOI 10.5121/CSIT.2017.70305
  • [9] Compliance with Saudi NCA-ECC based on ISO/IEC 27001
    Alsahafi, Tahani
    Halboob, Waleed
    Almuhtadi, Jalal
    [J]. TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2022, 29 (06): : 2090 - 2097
  • [10] [Anonymous], 2010, J INF ASSUR CYBERSEC, DOI DOI 10.5171/2010.305412