An Adaptable Maturity Strategy for Information Security

07/17/2018
by   Gliner Dias Alencar, et al.
0

The lack of security in information systems has caused numerous financial and moral losses to several organizations. The organizations have a series of information security measures recommended by literature and international standards. However, the implementation of policies, actions, and adjustment to such standards is not simple and must be addressed by specific needs identified by the Information Security Governance in each organization. There are many challenges in effectively establishing, maintaining, and measuring information security in a way that adds value. Those challenges demonstrate a need for further investigations which address the problem. This paper presents a strategy to measure the maturity in information security aiming, also, to assist in the application and prioritization of information security actions in the corporate environment. For this, a survey was used as the main methodological instrument, reaching 157 distinct companies. As a result, it was possible to classify the ISO/IEC 27001 and 27002 controls in four stages according to the importance given by the companies. The COBIT maturity levels and a risk analysis matrix were also used. Finally, the adaptable strategy was successfully tested in a company

READ FULL TEXT

page 7

page 8

research
09/25/2018

Analyzing CDR/IPDR data to find People Network from Encrypted Messaging Services

Organizations maintaining personal details of their users have to adhere...
research
05/12/2021

Maximizing the Value of Enterprise Human-Computer Interaction Standards: Strategies and Applications

Human factors/ergonomics (HFE) standards are not only a useful reference...
research
02/10/2018

Security level analysis of academic information systems based on standard ISO 27002:2003 using SSE-CMM

This research was conducted to find out the level of information securit...
research
03/03/2022

How Do Organizations Seek Cyber Assurance? Investigations on the Adoption of the Common Criteria and Beyond

Cyber assurance, which is the ability to operate under the onslaught of ...
research
12/07/2020

The Challenges with Internet of Things for Business

Many companies consider IoT as a central element for increasing competit...
research
11/11/2022

An investigation of security controls and MITRE ATT&CK techniques

Attackers utilize a plethora of adversarial techniques in cyberattacks t...
research
10/11/2020

Croatian public companies for energy distribution and supply: integration of information subsystems

This research is about integration of information subsystems from:inform...

Please sign up or login with your details

Forgot password? Click here to reset