Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia

被引:19
作者
Almomani, Iman [1 ,2 ]
Ahmed, Mohanned [1 ]
Maglaras, Leandros [3 ]
机构
[1] Prince Sultan Univ, Secur Engn Lab, Riyadh, Saudi Arabia
[2] Univ Jordan, Comp Sci Dept, Amman, Jordan
[3] De Montfort Univ Leicester, Sch Comp Sci & Informat, Leicester, Leics, England
关键词
Saudi Arabia; Cybersecurity; Maturity assessment; Audit tool; ISO27001; CITC; NCA; ECC; CRF; GDPR; COVID-19; Higher education;
D O I
10.7717/peerj-cs.703
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Saudi Arabia government has proposed different frameworks such as the CITC's Cybersecurity Regulatory Framework (CRF) and the NCA's Essential Cybersecurity Controls (ECC) to ensure data and infrastructure security in all IT-based systems. However, these frameworks lack a practical, published mechanism that continuously assesses the organizations' security level, especially in HEI (Higher Education Institutions) systems. This paper proposes a Cybersecurity Maturity Assessment Framework (SCMAF) for HEIs in Saudi Arabia. SCMAF is a comprehensive, customized security maturity assessment framework for Saudi organizations aligned with local and international security standards. The framework can be used as a self-assessment method to establish the security level and highlight the weaknesses and mitigation plans that need to be implemented. SCMAF is a mapping and codification model for all regulations that the Saudi organizations must comply with. The framework uses different levels of maturity against which the security performance of each organization can be measured. SCMAF is implemented as a lightweight assessment tool that could be provided online through a web-based service or offline by downloading the tool to ensure the organizations' data privacy. Organizations that apply this framework can assess the security level of their systems, conduct a gap analysis and create a mitigation plan. The assessment results are communicated to the organization using visual score charts per security requirement per level attached with an evaluation report.
引用
收藏
页数:26
相关论文
共 51 条
[1]  
Ahmed S., 2011, Proceedings of the 2011 13th International Conference on Advanced Communication Technology (ICACT). Smart Service Innovation through Mobile Interactivity, P1579
[2]  
Ajmi L., 2019, 2019 2nd International Conference on Computer Applications Information Security (ICCAIS), P1, DOI [10.1109/CAIS.2019.8769470, DOI 10.1109/CAIS.2019.8769470]
[3]  
Al Hamed T., 2016, International Journal of Hybrid Information Technology, V9, P99, DOI DOI 10.14257/IJHIT.2016.9.11.10
[4]  
Al Sheikh A., 2017, CYBER SECURITY FRAME
[5]  
Alharthi A., 2017, International Journal of Intelligent Computing Research, V8, P817, DOI [DOI 10.20533/IJICR.2042.4655.2017, 10.20533/ijicr.2042.4655.2017.0100, DOI 10.20533/IJICR.2042.4655.2017.0100]
[6]  
Alhussain R., 2012, CONCEPTUAL FRAMEWORK
[7]  
Ali W., 2020, Higher Education Studies, V10, P16, DOI DOI 10.5539/HES.V10N3P16
[8]   A Holistic Cybersecurity Maturity Assessment Framework for Higher Education Institutions in the United Kingdom [J].
Aliyu, Aliyu ;
Maglaras, Leandros ;
He, Ying ;
Yevseyeva, Iryna ;
Boiten, Eerke ;
Cook, Allan ;
Janicke, Helge .
APPLIED SCIENCES-BASEL, 2020, 10 (10)
[9]  
Almuhammadi S., 2017, Information Security Maturity Model for Nist Cyber Security Framework, V7, P51, DOI DOI 10.5121/CSIT.2017.70305
[10]  
Alshehri Y.A., 2020, Creative Education, V11, P985, DOI [10.4236/ce.2020.117071, DOI 10.4236/CE.2020.117071]