2020
DOI: 10.1108/ics-03-2019-0039
|View full text |Cite
|
Sign up to set email alerts
|

Information and cyber security maturity models: a systematic literature review

Abstract: Purpose This paper aims to clarify the uncertainty reflected in the current state of information security maturity evaluation where it has not enough matured and converged so that a generic approach or many specfics approaches become the go-to choice. In fact, in the past decade, many secruity maturity models are still being produced and remain unproven regardless of the existence of ISO 21827. Design/methodology/approach The authors have used the systematic literature review to summarize existing research, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
27
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 40 publications
(28 citation statements)
references
References 13 publications
0
27
0
1
Order By: Relevance
“…Previous studies have investigated information security and cybersecurity maturity models [26][27][28]. These maturity models have different focuses according to their purpose and target.…”
Section: Information Security and Cybersecurity Maturity Modelsmentioning
confidence: 99%
“…Previous studies have investigated information security and cybersecurity maturity models [26][27][28]. These maturity models have different focuses according to their purpose and target.…”
Section: Information Security and Cybersecurity Maturity Modelsmentioning
confidence: 99%
“…On the other hand, academia has also produced countless information security maturity models such as SOASMM for SOA architecture [9], MMISS-SME [10] for small and medium enterprises, CCSMM for American governmental entities [11] or ISMM-PCI [12] for the payment card industry. Through our systematic literature review [1], we became aware of the lack of implementation and validation results for academic security maturity models. We also perceived that the academic shift towards specialization is also related to the implementation issue, hence why our solution intervenes at the implementation phase.…”
Section: Related Work and Problematicmentioning
confidence: 99%
“…We can rely on existing references such as standards or prominent security maturity models in order to extract these concepts. In fact, we analyzed and compared the main security concepts used in the security maturity models we found through our systematic literature review [1]. We have found that these models are highly connected to the ISO 27001 and ISO 27002 standards [4].…”
Section: Core Conceptmentioning
confidence: 99%
See 1 more Smart Citation
“…Guna melakukan tindakan antisipatif untuk menanggulangi cybercrime tersebut, diperlukan cybersecurity, yaitu tindakan pelindungan atas segala macam bentuk serangan cybercrime dan tindakan pemulihan akibat cybercrime. Beberapa hal yang harus dipenuhi dalam cybersecurity (Humayun et al, 2020;Rabii et al, 2020) adalah ketersediaan (availability), kerahasiaan (confidentiality), integritas (integrity), otentikasi (authentication) dan akuntabilitas (accountability). Ketersediaan (availability) merupakan kemampuan dan ketersediaan informasi atau data yang diperlukan untuk diakses kapanpun hanya oleh pihak yang berwenang.…”
Section: Tinjauan Pustaka Cybercrime Dan Cybersecurityunclassified