Cybersecurity Capability Maturity Models for Providers of Critical Infrastructure

被引:0
|
作者
Miron, Walter [1 ]
Muita, Kevin [2 ]
机构
[1] Technol Strategy TELUS Commun, Ottawa, ON, Canada
[2] Carleton Univ, Technol Innovat Management Program, Ottawa, ON, Canada
来源
TECHNOLOGY INNOVATION MANAGEMENT REVIEW | 2014年
关键词
cybersecurity; critical infrastructure; capability maturity models; municipalities; standards; compliance; protection; regulation; framework; adoption;
D O I
暂无
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
Critical infrastructure such as power generation and distribution systems, telecommunications networks, pipelines and pipeline control networks, transportation control networks, financial networks, and government information and communications technology (ICT) have increasingly become the target of cyber-attacks. The impact and cost of these threats, as well as regulatory pressure to mitigate them, have created an impetus to secure these critical infrastructures. Managers have many controls and models at their disposal to help them secure infrastructure technology, including cybersecurity capability maturity models to enable measurement and communication of cybersecurity readiness to top management teams, regulators, and customers, thereby facilitating regulatory compliance, corporate responsibility, and improved brand quality. However, information and awareness is lacking about which models are most appropriate for a given situation and how they should be deployed. This article examines relevant cybersecurity capability maturity models to identify the standards and controls available to providers of critical infrastructure in an effort to improve their level of security preparedness. These capability models are described and categorized by their relevance to different infrastructure domains, and then recommendations are provided on employing capability maturity models to measure and communicate readiness. This article will be relevant to regulators, critical infrastructure providers, and researchers.
引用
收藏
页码:33 / 39
页数:7
相关论文
共 50 条
  • [1] Secure by Design: Cybersecurity Extensions to Project Management Maturity Models for Critical Infrastructure Projects
    Payette, Jay
    Anegbe, Esther
    Caceres, Erika
    Muegge, Steven
    TECHNOLOGY INNOVATION MANAGEMENT REVIEW, 2015, : 26 - 34
  • [2] Comparative Study of Cybersecurity Capability Maturity Models
    Marcelo Rea-Guaman, Angel
    San Feliu, Tomas
    Calvo-Manzano, Jose A.
    Daniel Sanchez-Garcia, Isaac
    SOFTWARE PROCESS IMPROVEMENT AND CAPABILITY DETERMINATION, SPICE 2017, 2017, 770 : 100 - 113
  • [3] Cybersecurity capabilities for critical infrastructure resilience
    Malatji, Masike
    Marnewick, Annlize L.
    Von Solms, Sune
    INFORMATION AND COMPUTER SECURITY, 2022, 30 (02) : 255 - 279
  • [4] Critical energy infrastructure and the evolution of cybersecurity
    Sanders, Peyton
    Bronk, Chris
    Bazilian, Morgan D.
    ELECTRICITY JOURNAL, 2022, 35 (10)
  • [5] Model-Based Cybersecurity AnalysisExtending Enterprise Modeling to Critical Infrastructure Cybersecurity
    Yuning Jiang
    Manfred A. Jeusfeld
    Jianguo Ding
    Elin Sandahl
    Business & Information Systems Engineering, 2023, 65 : 643 - 676
  • [6] Collaboration Practices for the Cybersecurity of Supply Chains to Critical Infrastructure
    Wallis, Tania
    Dorey, Paul
    APPLIED SCIENCES-BASEL, 2024, 14 (13):
  • [7] Maturity Models in Cybersecurity: a systematic review
    Rea-Guaman, A. M.
    Sanchez-Garcia, I. D.
    San Feliu, T.
    Calvo-Manzano, J. A.
    2017 12TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2017,
  • [8] Model-Based Cybersecurity Analysis Extending Enterprise Modeling to Critical Infrastructure Cybersecurity
    Jiang, Yuning
    Jeusfeld, Manfred A.
    Ding, Jianguo
    Sandahl, Elin
    BUSINESS & INFORMATION SYSTEMS ENGINEERING, 2023, 65 (06) : 643 - 676
  • [9] Economic Impacts of Rules-versus Risk-Based Cybersecurity Regulations for Critical Infrastructure Providers
    Massacci, Fabio
    Ruprai, Raminder
    Collinson, Matthew
    Williams, Julian
    IEEE SECURITY & PRIVACY, 2016, 14 (03) : 52 - 60
  • [10] On building cybersecurity expertise in critical infrastructure protection
    Mishra, Sumita
    Raj, Rajendra K.
    Romanowski, Carol J.
    Schneider, Jennifer
    Critelli, Anthony
    2015 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2015,