A Holistic Cybersecurity Maturity Assessment Framework for Higher Education Institutions in the United Kingdom

被引:22
作者
Aliyu, Aliyu [1 ]
Maglaras, Leandros [1 ]
He, Ying [1 ]
Yevseyeva, Iryna [1 ]
Boiten, Eerke [1 ]
Cook, Allan [1 ]
Janicke, Helge [1 ]
机构
[1] De Montfort Univ, Sch Comp Sci & Informat, Leicester LE1 9BH, Leics, England
来源
APPLIED SCIENCES-BASEL | 2020年 / 10卷 / 10期
关键词
assessment framework; cybersecurity; GDPR; PCI-DSS; DSPT; NISD;
D O I
10.3390/app10103660
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
As organisations are vulnerable to cyberattacks, their protection becomes a significant issue. Capability Maturity Models can enable organisations to benchmark current maturity levels against best practices. Although many maturity models have been already proposed in the literature, a need for models that integrate several regulations exists. This article presents a light, web-based model that can be used as a cybersecurity assessment tool for Higher Education Institutes (HEIs) of the United Kingdom. The novel Holistic Cybersecurity Maturity Assessment Framework incorporates all security regulations, privacy regulations, and best practices that HEIs must be compliant to, and can be used as a self assessment or a cybersecurity audit tool.
引用
收藏
页数:15
相关论文
共 32 条
  • [1] Adler RM, 2013, 2013 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), P230, DOI 10.1109/THS.2013.6699005
  • [2] Akinsanya O.O., 2019, CEUR WORKSHOP PROC, V2348, P211
  • [3] Towards a maturity model for health-care cloud security (M2HCS)
    Akinsanya, Opeoluwa Ore
    Papadaki, Maria
    Sun, Lingfen
    [J]. INFORMATION AND COMPUTER SECURITY, 2020, 28 (03) : 321 - 345
  • [4] Almuhammadi S., 2017, Computer Science Information Technology, V7, P51, DOI [10.5121/csit.2017.70305, DOI 10.5121/CSIT.2017.70305]
  • [5] Aloul Fadi A., 2012, Journal of Advances in Information Technology, V3, P176, DOI 10.4304/jait.3.3.176-183
  • [6] Barrett Matthew P, 2018, TECHNICAL REPORT
  • [7] Brewer D., 2013, 270012013 ISOIEC BSI
  • [8] Butkovic M., 2013, CMUSEI2013TN028
  • [9] Caralli, 2013, ADV CYBERSECURITY CA
  • [10] Caralli R., 2012, TECHNICAL REPORT