2021
DOI: 10.3390/jcp1010007
|View full text |Cite
|
Sign up to set email alerts
|

The Cybersecurity Focus Area Maturity (CYSFAM) Model

Abstract: The cost of recovery after a cybersecurity attack is likely to be high and may result in the loss of business at the extremes. Evaluating the acquired cybersecurity capabilities and evolving them to a desired state in consideration of risks are inevitable. This research proposes the CYberSecurity Focus Area Maturity (CYSFAM) Model for assessing cybersecurity capabilities. In this design science research, CYSFAM was evaluated at a large financial institution. From the many cybersecurity standards, 11 encompassi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 29 publications
0
5
0
Order By: Relevance
“…In line with [3,18], this study demonstrates that classification helps enrich the understanding of SME types to communicate and keep them engaged effectively. The classification approach is in contrast with the idea of CYSFAM [43] that proposes a maturity model for generic organisations. Moreover, compared to [3,18] (which identify four and two types of SMEs, respectively), this study indicates five types of SMEs with no counterpart for the cybersecurity capable SMEs.…”
Section: Discussionmentioning
confidence: 99%
“…In line with [3,18], this study demonstrates that classification helps enrich the understanding of SME types to communicate and keep them engaged effectively. The classification approach is in contrast with the idea of CYSFAM [43] that proposes a maturity model for generic organisations. Moreover, compared to [3,18] (which identify four and two types of SMEs, respectively), this study indicates five types of SMEs with no counterpart for the cybersecurity capable SMEs.…”
Section: Discussionmentioning
confidence: 99%
“…Their outcomes allowed for reporting some findings regarding how to set up the overall organisational structures, basic management processes, and some supporting tools for SMEs. In [11,39,40], Ozkan et al describe several information security and maturity models that can be applied to SMEs characteristics, in which ISO-27001:2013 is one of the available frameworks.…”
Section: Case Studies and Related Workmentioning
confidence: 99%
“…Besides improving metric values, SMEs can also implement countermeasures (or controls) to counter vulnerabilities. Common countermeasures can be sourced from a variety of parties, from National Cyber Security Centres (NCSCs) and CERTs [35,49], to standards organisations [25,26], to peer-reviewed research [57]. In our SME context, we should be able to argue that the countermeasures included in our solution are both necessary and sufficient.…”
Section: Data Requirementsmentioning
confidence: 99%
“…Cybersecurity incidents are commonplace nowadays and can have a devastating impact on businesses [57]. Small-and Medium-Sized Enterprises (SMEs, [19]) are especially vulnerable since they have limited resources to deal with cyber-attacks [24].…”
Section: Introductionmentioning
confidence: 99%