Mostrar el registro sencillo del ítem
New Validation of a Cybersecurity Model to Audit the Cybersecurity Program in a Canadian Higher Education Institution
dc.contributor.author | Sabillon, Regner | |
dc.contributor.author | Bermejo Higuera, Juan Ramón | |
dc.date | 2023 | |
dc.date.accessioned | 2023-10-03T15:52:33Z | |
dc.date.available | 2023-10-03T15:52:33Z | |
dc.identifier.citation | R. Sabillon and J. R. Bermejo Higuera, "New Validation of a Cybersecurity Model to Audit the Cybersecurity Program in a Canadian Higher Education Institution," 2023 Conference on Information Communications Technology and Society (ICTAS), Durban, South Africa, 2023, pp. 1-6, doi: 10.1109/ICTAS56421.2023.10082731. | es_ES |
dc.identifier.isbn | 9781665489300 | |
dc.identifier.uri | https://reunir.unir.net/handle/123456789/15347 | |
dc.description.abstract | This article presents the results of one empirical study that evaluated the validation of the CyberSecurity Audit Model (CSAM) for the second time in a different Canadian higher education institution. CSAM is utilized for conducting cybersecurity audits in medium or large organizations or a Nation State to evaluate and measure cybersecurity assurance, maturity, and cyber readiness. The authors review best practices and methodologies of global leaders in the cybersecurity assurance and audit arena, that puts in evidence the lack of universal guidelines to conduct extensive cybersecurity audits and the detection of existing weaknesses in general programs to deliver cybersecurity awareness training. The architecture of CSAM is described in central sections. CSAM has been tested, implemented, and validated in three research scenarios (1) a single cybersecurity domain audit (Awareness Education), (2) Cybersecurity audit of several domains (Governance and Strategy, Legal and compliance, Cyber Risks, Frameworks and Regulations, Incident Management, Cyber Insurance and Evolving Technologies) and (3) Cybersecurity audit of all model domains The study concludes by showing how the validation of the model allows to report significant information for future decision making that the target organization may correct cybersecurity weaknesses or to improve cybersecurity domains and controls. | es_ES |
dc.language.iso | eng | es_ES |
dc.publisher | 2023 Conference on Information Communications Technology and Society, ICTAS 2023 - Proceedings | es_ES |
dc.relation.uri | https://ieeexplore.ieee.org/document/10082731/authors#authors | es_ES |
dc.rights | restrictedAccess | es_ES |
dc.subject | cyber readiness | es_ES |
dc.subject | cybersecurity | es_ES |
dc.subject | cybersecurity assurance | es_ES |
dc.subject | cybersecurity audit | es_ES |
dc.subject | cybersecurity audit model | es_ES |
dc.subject | cybersecurity controls | es_ES |
dc.subject | cybersecurity domain criticality | es_ES |
dc.subject | cybersecurity domains | es_ES |
dc.subject | cybersecurity maturity assessment | es_ES |
dc.subject | cybersecurity scorecard | es_ES |
dc.subject | Scopus(2) | es_ES |
dc.subject | WOS(2) | es_ES |
dc.title | New Validation of a Cybersecurity Model to Audit the Cybersecurity Program in a Canadian Higher Education Institution | es_ES |
dc.type | conferenceObject | es_ES |
reunir.tag | ~ARI | es_ES |
dc.identifier.doi | https://doi.org/10.1109/ICTAS56421.2023.10082731 |
Ficheros en el ítem
Ficheros | Tamaño | Formato | Ver |
---|---|---|---|
No hay ficheros asociados a este ítem. |