Mostrar el registro sencillo del ítem

dc.contributor.authorSabillon, Regner
dc.contributor.authorBermejo Higuera, Juan Ramón
dc.date2023
dc.date.accessioned2023-10-03T15:52:33Z
dc.date.available2023-10-03T15:52:33Z
dc.identifier.citationR. Sabillon and J. R. Bermejo Higuera, "New Validation of a Cybersecurity Model to Audit the Cybersecurity Program in a Canadian Higher Education Institution," 2023 Conference on Information Communications Technology and Society (ICTAS), Durban, South Africa, 2023, pp. 1-6, doi: 10.1109/ICTAS56421.2023.10082731.es_ES
dc.identifier.isbn9781665489300
dc.identifier.urihttps://reunir.unir.net/handle/123456789/15347
dc.description.abstractThis article presents the results of one empirical study that evaluated the validation of the CyberSecurity Audit Model (CSAM) for the second time in a different Canadian higher education institution. CSAM is utilized for conducting cybersecurity audits in medium or large organizations or a Nation State to evaluate and measure cybersecurity assurance, maturity, and cyber readiness. The authors review best practices and methodologies of global leaders in the cybersecurity assurance and audit arena, that puts in evidence the lack of universal guidelines to conduct extensive cybersecurity audits and the detection of existing weaknesses in general programs to deliver cybersecurity awareness training. The architecture of CSAM is described in central sections. CSAM has been tested, implemented, and validated in three research scenarios (1) a single cybersecurity domain audit (Awareness Education), (2) Cybersecurity audit of several domains (Governance and Strategy, Legal and compliance, Cyber Risks, Frameworks and Regulations, Incident Management, Cyber Insurance and Evolving Technologies) and (3) Cybersecurity audit of all model domains The study concludes by showing how the validation of the model allows to report significant information for future decision making that the target organization may correct cybersecurity weaknesses or to improve cybersecurity domains and controls.es_ES
dc.language.isoenges_ES
dc.publisher2023 Conference on Information Communications Technology and Society, ICTAS 2023 - Proceedingses_ES
dc.relation.urihttps://ieeexplore.ieee.org/document/10082731/authors#authorses_ES
dc.rightsrestrictedAccesses_ES
dc.subjectcyber readinesses_ES
dc.subjectcybersecurityes_ES
dc.subjectcybersecurity assurancees_ES
dc.subjectcybersecurity audites_ES
dc.subjectcybersecurity audit modeles_ES
dc.subjectcybersecurity controlses_ES
dc.subjectcybersecurity domain criticalityes_ES
dc.subjectcybersecurity domainses_ES
dc.subjectcybersecurity maturity assessmentes_ES
dc.subjectcybersecurity scorecardes_ES
dc.subjectScopus(2)es_ES
dc.subjectWOS(2)es_ES
dc.titleNew Validation of a Cybersecurity Model to Audit the Cybersecurity Program in a Canadian Higher Education Institutiones_ES
dc.typeconferenceObjectes_ES
reunir.tag~ARIes_ES
dc.identifier.doihttps://doi.org/10.1109/ICTAS56421.2023.10082731


Ficheros en el ítem

FicherosTamañoFormatoVer

No hay ficheros asociados a este ítem.

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem