Cybersecurity Capability Maturity Models for Providers of Critical Infrastructure

被引:0
作者
Miron, Walter [1 ]
Muita, Kevin [2 ]
机构
[1] Technol Strategy TELUS Commun, Ottawa, ON, Canada
[2] Carleton Univ, Technol Innovat Management Program, Ottawa, ON, Canada
来源
TECHNOLOGY INNOVATION MANAGEMENT REVIEW | 2014年
关键词
cybersecurity; critical infrastructure; capability maturity models; municipalities; standards; compliance; protection; regulation; framework; adoption;
D O I
暂无
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
Critical infrastructure such as power generation and distribution systems, telecommunications networks, pipelines and pipeline control networks, transportation control networks, financial networks, and government information and communications technology (ICT) have increasingly become the target of cyber-attacks. The impact and cost of these threats, as well as regulatory pressure to mitigate them, have created an impetus to secure these critical infrastructures. Managers have many controls and models at their disposal to help them secure infrastructure technology, including cybersecurity capability maturity models to enable measurement and communication of cybersecurity readiness to top management teams, regulators, and customers, thereby facilitating regulatory compliance, corporate responsibility, and improved brand quality. However, information and awareness is lacking about which models are most appropriate for a given situation and how they should be deployed. This article examines relevant cybersecurity capability maturity models to identify the standards and controls available to providers of critical infrastructure in an effort to improve their level of security preparedness. These capability models are described and categorized by their relevance to different infrastructure domains, and then recommendations are provided on employing capability maturity models to measure and communicate readiness. This article will be relevant to regulators, critical infrastructure providers, and researchers.
引用
收藏
页码:33 / 39
页数:7
相关论文
共 50 条
[21]   Zero trust cybersecurity: Critical success factors and A maturity assessment framework [J].
Yeoh, William ;
Liu, Marina ;
Shore, Malcolm ;
Jiang, Frank .
COMPUTERS & SECURITY, 2023, 133
[22]   Design of capability maturity model integration with cybersecurity risk severity complex prediction using bayesian-based machine learning models [J].
Fahad H. Alshammari .
Service Oriented Computing and Applications, 2023, 17 :59-72
[23]   Design of capability maturity model integration with cybersecurity risk severity complex prediction using bayesian-based machine learning models [J].
Alshammari, Fahad H. .
SERVICE ORIENTED COMPUTING AND APPLICATIONS, 2023, 17 (01) :59-72
[24]   Improvement of IT Infrastructure Management by Using Configuration Management and Maturity Models: A Systematic Literature Review and a Critical Analysis [J].
Serrano, Joao P. ;
Pereira, Ruben F. .
ORGANIZACIJA, 2020, 53 (01) :3-19
[25]   Digital Supply Chain Vulnerabilities in Critical Infrastructure: A Systematic Literature Review on Cybersecurity in the Energy Sector [J].
Aarland, Mari ;
Gjosaeter, Terje .
PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2021, :326-333
[26]   Predicting Cybersecurity Threats in Critical Infrastructure for Industry 4.0: A Proactive Approach Based on Attacker Motivations [J].
Alqudhaibi, Adel ;
Albarrak, Majed ;
Aloseel, Abdulmohsan ;
Jagtap, Sandeep ;
Salonitis, Konstantinos .
SENSORS, 2023, 23 (09)
[27]   Regulating risks within complex sociotechnical systems: Evidence from critical infrastructure cybersecurity standards [J].
Clark-Ginsberg, Aaron ;
Slayton, Rebecca .
SCIENCE AND PUBLIC POLICY, 2019, 46 (03) :339-346
[28]   Technical Framework Research on Critical Information Infrastructure Cybersecurity Classified Protection [J].
Ren Weihong ;
Yuan Jing ;
Jiang Lei ;
Zhao Tai .
Proceedings of the 2016 4th International Conference on Machinery, Materials and Information Technology Applications, 2016, 71 :1177-1181
[29]   A Design Science Approach to Constructing Critical Infrastructure and Communicating Cybersecurity Risks [J].
Muegge, Steven ;
Craigen, Dan .
TECHNOLOGY INNOVATION MANAGEMENT REVIEW, 2015, :6-16
[30]   CONSTRUCTION CYBERSECURITY AND CRITICAL INFRASTRUCTURE PROTECTION: NEW HORIZONS FOR CONSTRUCTION 4.0 [J].
de Soto, Borja Garcia ;
Georgescu, Alexandru ;
Mantha, Bharadwaj ;
Turk, Ziga ;
Maciel, Abel ;
Semih, Muammer .
JOURNAL OF INFORMATION TECHNOLOGY IN CONSTRUCTION, 2022, 27 :571-+