To see the other types of publications on this topic, follow the link: Cybersecurity maturity model.

Journal articles on the topic 'Cybersecurity maturity model'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cybersecurity maturity model.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kour, Ravdeep, Ramin Karim, and Adithya Thaduri. "Cybersecurity for railways – A maturity model." Proceedings of the Institution of Mechanical Engineers, Part F: Journal of Rail and Rapid Transit 234, no. 10 (2019): 1129–48. http://dx.doi.org/10.1177/0954409719881849.

Full text
Abstract:
With the advancements in and widespread adoption of information and communication technologies in infrastructures, cyber-attacks are becoming more frequent and more severe. Advanced cybersecurity threats with automated capabilities are increasing in such sectors as finance, health, grid, retail, government, telecommunications, transportation, etc. Cyber-attacks are also increasing in railways with an impact on railway stakeholders, e.g. threat to the safety of employees, passengers, or the public in general; loss of sensitive railway information; reputational damage; monetary loss; erroneous d
APA, Harvard, Vancouver, ISO, and other styles
2

Yigit Ozkan, Bilge, Sonny van Lingen, and Marco Spruit. "The Cybersecurity Focus Area Maturity (CYSFAM) Model." Journal of Cybersecurity and Privacy 1, no. 1 (2021): 119–39. http://dx.doi.org/10.3390/jcp1010007.

Full text
Abstract:
The cost of recovery after a cybersecurity attack is likely to be high and may result in the loss of business at the extremes. Evaluating the acquired cybersecurity capabilities and evolving them to a desired state in consideration of risks are inevitable. This research proposes the CYberSecurity Focus Area Maturity (CYSFAM) Model for assessing cybersecurity capabilities. In this design science research, CYSFAM was evaluated at a large financial institution. From the many cybersecurity standards, 11 encompassing focus areas were identified. An assessment instrument—containing 144 questions—was
APA, Harvard, Vancouver, ISO, and other styles
3

P, Dr Rachana. "Strategic Approaches to Cybersecurity Audits for Control Evaluation." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–5. https://doi.org/10.55041/ijsrem40065.

Full text
Abstract:
This article presents an empirical study evaluating the effectiveness of the CyberSecurity Audit Model (CSAM 2.0) at a Canadian higher education institution. CSAM 2.0 is a comprehensive model used to assess cybersecurity assurance, maturity, and readiness in medium to large organizations and at the national level. It allows for the effective evaluation of security controls across various cybersecurity domains. The study highlights global best practices in cybersecurity audits, highlighting the lack of standardized guidelines and weaknesses in cybersecurity training programs. The paper details
APA, Harvard, Vancouver, ISO, and other styles
4

Princess Eloho Odio, Richard Okon, Mary Oyenike Adeyanju, Eseoghene Kokogho, and Obianuju Clement Onwuzulike. "Developing a cybersecurity maturity model for fintech firms using predictive analytics." International Journal of Science and Technology Research Archive 8, no. 1 (2025): 023–49. https://doi.org/10.53771/ijstra.2025.8.1.0021.

Full text
Abstract:
As the fintech industry expands, so does the sophistication of cybersecurity threats, making it critical for firms to adopt proactive and resilient security measures. This abstract proposes a cybersecurity maturity model specifically designed for fintech firms, incorporating predictive analytics to assess and enhance their cybersecurity posture. By leveraging predictive analytics, this model enables fintech companies to anticipate potential vulnerabilities, detect emerging threats, and strengthen their security strategies before incidents occur. The proposed cybersecurity maturity model is str
APA, Harvard, Vancouver, ISO, and other styles
5

Zwarts, Hendrik, Jaco Du Toit, and Basie Von Solms. "Augmenting Cybersecurity Awareness at Critical Infrastructures in Developing Countries Through a Cybersecurity Governance Maturity Model." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 726–33. https://doi.org/10.34190/eccws.24.1.3708.

Full text
Abstract:
As the utilization of cyber systems in the management and operation of critical infrastructures have grown, the cybersecurity threats to critical infrastructure sectors such as energy, healthcare, transportation and water simultaneously increased exponentially. Critical infrastructures in developing countries are particularly vulnerable to growing cybersecurity threats due to limited resources, inadequate cybersecurity policies and a general shortage of skilled cybersecurity specialists. Addressing these vulnerabilities is essential for developing countries to ensure the operational continuity
APA, Harvard, Vancouver, ISO, and other styles
6

Büyüközkan, Gülçin, and Merve Güler. "Cybersecurity maturity model: Systematic literature review and a proposed model." Technological Forecasting and Social Change 213 (April 2025): 123996. https://doi.org/10.1016/j.techfore.2025.123996.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dotsenko, T. V., and M. V. Kuzmenko. "Maturity of the country's cybersecurity system in the conditions of war: assessment trends." Economic Bulletin of Dnipro University of Technology 87 (September 2024): 34–43. http://dx.doi.org/10.33271/ebdut/87.034.

Full text
Abstract:
Methods. The study used the following methods: an inductive approach to formulating the concept of maturity of the country's cybersecurity system in military conditions; a deductive method to derive the concept of assessing the maturity of the country's cybersecurity system during military operations; content analysis identified the key elements of assessing the maturity of the national cybersecurity system in military operations; strategic analysis identified the main vectors of assessing the problem under study, and the latest approaches to assessing the national cybersecurity system. Result
APA, Harvard, Vancouver, ISO, and other styles
8

Aliyu, Aliyu, Leandros Maglaras, Ying He, et al. "A Holistic Cybersecurity Maturity Assessment Framework for Higher Education Institutions in the United Kingdom." Applied Sciences 10, no. 10 (2020): 3660. http://dx.doi.org/10.3390/app10103660.

Full text
Abstract:
As organisations are vulnerable to cyberattacks, their protection becomes a significant issue. Capability Maturity Models can enable organisations to benchmark current maturity levels against best practices. Although many maturity models have been already proposed in the literature, a need for models that integrate several regulations exists. This article presents a light, web-based model that can be used as a cybersecurity assessment tool for Higher Education Institutes (HEIs) of the United Kingdom. The novel Holistic Cybersecurity Maturity Assessment Framework incorporates all security regul
APA, Harvard, Vancouver, ISO, and other styles
9

Peliukh, O. I., M. V. Yesina, and D. Yu Holubnychyi. "CERT-UA assessment based on the CSIRT ENISA Maturity Model." Radiotekhnika, no. 213 (June 16, 2023): 41–48. http://dx.doi.org/10.30837/rt.2023.2.213.04.

Full text
Abstract:
Cybersecurity threats are steadily increasing in today's world, which is characterised by increased openness and integration into the global network. The proliferation of cyber incidents, including hacker attacks, confidential data leaks and information theft, is becoming an extremely pressing issue in this context. Accordingly, the eradication of these threats requires the development of effective methods of responding to cyber incidents. The central theme of this article is to consider the critical importance of assessing and improving the effectiveness of cyber incident response teams. The
APA, Harvard, Vancouver, ISO, and other styles
10

Abdullahi Garba, Adamu, Aliyu Musa Bade, Muktar Yahuza, and Ya’u Nuhu. "Cybersecurity capability maturity models review and application domain." International Journal of Engineering & Technology 9, no. 3 (2020): 779. http://dx.doi.org/10.14419/ijet.v9i3.30719.

Full text
Abstract:
Cybersecurity is a way of protecting organization critical assets, through the identification of cyber threats that can compromise the information stored, it involves the protection, identification, and responding to threats. The main aim of this article is to conduct an ample review of the published cybersecurity capability maturity models using a systematic review of published articles from 2014 to 2019. Features of Hal- vorsen and Conradi’s taxonomy were adopted to explain the models identified. The results indicated adopting a model to a certain organization is not feasible. However, modif
APA, Harvard, Vancouver, ISO, and other styles
11

Razikin, Khairur, and Agus Widodo. "General Cybersecurity Maturity Assessment Model: Best Practice to Achieve Payment Card Industry-Data Security Standard (PCI-DSS) Compliance." CommIT (Communication and Information Technology) Journal 15, no. 2 (2021): 91–104. http://dx.doi.org/10.21512/commit.v15i2.6931.

Full text
Abstract:
The use of technology in the era of the Industrial Revolution 4.0 is essential, marked by the use of technology in the economy and business. This situation makes many companies in the payment sector have to improve their information technology security systems. In Indonesia, Bank Indonesia and the Financial Services Authority (Otoritas Jasa Keuangan - OJK) are agencies that provide operational permits for companies by making Payment Card Industry-Data Security Standard (PCI-DSS) certification as one of the requirements for companies to obtain operating permits. However, not all companies can e
APA, Harvard, Vancouver, ISO, and other styles
12

Coleman, Joe. "The DOD's CMMC 2.0: What Heat Treaters Need to Know." AM&P Technical Articles 182, no. 2 (2024): 37–39. http://dx.doi.org/10.31399/asm.amp.2024-02.p037.

Full text
Abstract:
Abstract Cybersecurity Maturity Model Certification (CMMC) 2.0 represents the most recent iteration of the US Department of Defense's cybersecurity regulations. The CMMC 2.0 framework was developed to improve the cybersecurity posture of defense contractors and their supply chain, including heat treaters. This article reviews key requirements and how DoD contractors can prepare for compliance.
APA, Harvard, Vancouver, ISO, and other styles
13

Abhilash Maroju, Srinivas A Vaddadi, Sravanthi Dontu, Rohith Vallabhaneni,. "An Empirical Paradigm on Cybersecurity Vulnerability Mitigation Framework." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9s (2023): 786–92. http://dx.doi.org/10.17762/ijritcc.v11i9s.9484.

Full text
Abstract:
Current cybersecurity vulnerability assessment tools were developed in accordance with guidelines established by entities like the National Institute of Standards and Technology (NIST) and the United States Department of Energy. When assessing their facility's cybersecurity maturity, owners and operators of critical infrastructure frequently use frameworks like the NIST Cybersecurity Framework (CSF) and the cybersecurity capability maturity model (C2M2). These frameworks are great at finding vulnerabilities and doing qualitative cybersecurity analysis, but they don't help you get to the level
APA, Harvard, Vancouver, ISO, and other styles
14

Roy, Yanina, Olena Riabchun, and Valeriy Yermoshin. "MATURITY MODEL OF CYBER SECURITY SYSTEM OPPORTUNITIES AT CRITICAL INFRASTRUCTURE FACILITIES OF THE ES-C2M2 ENERGY SECTOR." Cybersecurity: Education, Science, Technique 2, no. 10 (2020): 67–74. http://dx.doi.org/10.28925/2663-4023.2020.10.6774.

Full text
Abstract:
Currently, a large set of IS maturity assessment models based on similar principles is available for both commercial and government organizations and institutions. At the same time, the actual use of such models is quite limited, primarily due to the weak attachment to the characteristics of specific organizations. This problem is partially solved by adapting existing approaches in the form of industry models (for example, ES-C2M2 for companies in the energy sector, ONG-C2M2 for companies in the oil and gas sector). Moreover, the emergence of a new model is very likely, which includes not only
APA, Harvard, Vancouver, ISO, and other styles
15

Panalangin, Mansur L., Ariel Roy L. Reyes, Haron A. Mohamad, Shahara A. Abo, and Arnold S. Cararag. "Building a Resilient Computer Emergency Response Team (CERT): A Strategic Approach Using SWOT Analysis and the CERT Resilience Maturity Model for Cybersecurity Preparedness in the Bangsamoro Government, Philippines." American Journal of Innovation in Science and Engineering 4, no. 2 (2025): 41–48. https://doi.org/10.54536/ajise.v4i2.4289.

Full text
Abstract:
exposed clients to risks during online transactions and service access. These incidents underscore the urgent need to enhance the region’s cybersecurity preparedness and establish a resilient Computer Emergency Response Team (CERT). This study evaluates the current state of cybersecurity readiness across selected Bangsamoro Government ministries, offices, and agencies by integrating SWOT analysis with the CERT Resilience Management Model (CERT-RMM). Through this structured approach, the study identifies key strengths, weaknesses, opportunities, and threats while determining the current maturit
APA, Harvard, Vancouver, ISO, and other styles
16

Kulugh, Victor Emmanuel, Ageebee Silas Faki, and Egena Onu. "Theoretical Framework of Cybersecurity Resilience Maturity Assessment Model for Critical Information Infrastructure." Dutse Journal of Pure and Applied Sciences 11, no. 1b (2025): 75–85. https://doi.org/10.4314/dujopas.v11i1b.9.

Full text
Abstract:
Modern Societies depend heavily on Critical infrastructures (CIs) to thrive. The CI in turn is driven by critical information infrastructures (CIIs) which is a combination of information technology (IT) and operations technology (OT). However, the CIs are underpinned by the CIIs, thus, they (CIs) inherit the vulnerabilities of the CIIs and share the same threats as the CIIs. Failure of the CIIs driving the CIs will potentially lead to catastrophic consequences arising from cascaded, escalating and common cause effects against other dependent/ interdependent CIs/CIIs. Consequently, the CIIs sho
APA, Harvard, Vancouver, ISO, and other styles
17

Sabillon, Regner, Juan Ramon Bermejo Higuera, Jeimy Cano, Javier Bermejo Higuera, and Juan Antonio Sicilia Montalvo. "Assessing the Effectiveness of Cyber Domain Controls When Conducting Cybersecurity Audits: Insights from Higher Education Institutions in Canada." Electronics 13, no. 16 (2024): 3257. http://dx.doi.org/10.3390/electronics13163257.

Full text
Abstract:
This study validates a comprehensive cybersecurity audit model through empirical analysis in three higher education institutions in Canada. The research aims to enhance cybersecurity resilience by assessing the effectiveness of cybersecurity controls across diverse educational environments. Given the increasing frequency and sophistication of cyberattacks targeting educational institutions, this research is essential to ensure the protection of sensitive academic and personal data. Data were collected through detailed audits involving system vulnerabilities, compliance with security policies,
APA, Harvard, Vancouver, ISO, and other styles
18

Domnik, Jan, and Alexander Holland. "On Data Leakage Prevention Maturity: Adapting the C2M2 Framework." Journal of Cybersecurity and Privacy 4, no. 2 (2024): 167–95. http://dx.doi.org/10.3390/jcp4020009.

Full text
Abstract:
In an evolving cybersecurity landscape marked by escalating data breaches and regulatory demands, data leakage prevention (DLP) has emerged as one of several defense mechanisms. This study underscores unresolved foundational issues within DLP, revealing that it remains a significant challenge in large organizations. This highlights the necessity for a holistic approach to DLP to effectively address these persistent challenges. By developing a DLP Maturity Model, adapted from the renowned C2M2 framework, this research provides a comprehensive tool for assessing organizational DLP capabilities a
APA, Harvard, Vancouver, ISO, and other styles
19

Lubis, Muharman, Muhammad Fakhrul Safitra, Hanif Fakhrurroja, and Alif Noorachmad Muttaqin. "Guarding Our Vital Systems: A Metric for Critical Infrastructure Cyber Resilience." Sensors 25, no. 15 (2025): 4545. https://doi.org/10.3390/s25154545.

Full text
Abstract:
The increased occurrence and severity of cyber-attacks on critical infrastructure have underscored the need to embrace systematic and prospective approaches to resilience. The current research takes as its hypothesis that the InfraGuard Cybersecurity Framework—a capability model that measures the maturity of cyber resilience through three functional pillars, Cyber as a Shield, Cyber as a Space, and Cyber as a Sword—is an implementable and understandable means to proceed with. The model treats the significant aspects of situational awareness, active defense, risk management, and recovery from i
APA, Harvard, Vancouver, ISO, and other styles
20

Ferreira, Daniel Jorge, and Henrique São Mamede. "Predicting Cybersecurity Risk - A Methodology for Assessments." ARIS2 - Advanced Research on Information Systems Security 2, no. 2 (2022): 50–63. http://dx.doi.org/10.56394/aris2.v2i2.23.

Full text
Abstract:
Defining an appropriate cybersecurity incident response model is a critical challenge that all companies face on a daily basis.However, there is not always an adequate answer. This is due to the lack of predictive models based on data (evidence). There is a significant investment in research to identify the main factors that can cause such incidents, always trying to have the most appropriate response and, consequently, enhancing response capacity and success. At the same time, several different methodologies assess the risk management and maturity level of organizations.There is, however, a g
APA, Harvard, Vancouver, ISO, and other styles
21

Patrick, Mayala, Edrick Mugisha, Keneth Mbaga, and Mansour Likamba. "Cybersecurity in Tanzanian Maritime Operations: Exploring Global Best Practices and Their Local Adaptation Using the Cybersecurity Capability Maturity Model (C2M2)." Social Science and Humanities Journal 8, no. 10 (2024): 5688–97. http://dx.doi.org/10.18535/sshj.v8i10.1421.

Full text
Abstract:
The increasing integration of digital technologies in maritime operations has significantly enhanced efficiency in cargo tracking, port management, and communication systems. However, this digital transformation also introduces substantial cybersecurity risks, particularly in developing regions like Tanzania, where technological infrastructure and specialized skills may lag behind global standards. This study evaluates the cybersecurity readiness of three key Tanzanian maritime organizations Tanzania Ports Authority (TPA), Tanzania Shipping Agency Corporation (TASAC), and SINOTASHIP using the
APA, Harvard, Vancouver, ISO, and other styles
22

Almomani, Iman, Mohanned Ahmed, and Leandros Maglaras. "Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia." PeerJ Computer Science 7 (September 9, 2021): e703. http://dx.doi.org/10.7717/peerj-cs.703.

Full text
Abstract:
The Saudi Arabia government has proposed different frameworks such as the CITC’s Cybersecurity Regulatory Framework (CRF) and the NCA’s Essential Cybersecurity Controls (ECC) to ensure data and infrastructure security in all IT-based systems. However, these frameworks lack a practical, published mechanism that continuously assesses the organizations’ security level, especially in HEI (Higher Education Institutions) systems. This paper proposes a Cybersecurity Maturity Assessment Framework (SCMAF) for HEIs in Saudi Arabia. SCMAF is a comprehensive, customized security maturity assessment framew
APA, Harvard, Vancouver, ISO, and other styles
23

Uraipan, Naris, Prasong Praneetpolgrang, and Tharini Manisri. "Application of an Analytic Hierarchy Process to Select the Level of a Cyber Resilient Capability Maturity Model in Digital Supply Chain Systems." ECTI Transactions on Computer and Information Technology (ECTI-CIT) 15, no. 2 (2021): 198–207. http://dx.doi.org/10.37936/ecti-cit.2021152.240631.

Full text
Abstract:
Cyber resilient is the ability to prepare for, respond to and recover from cyber attacks. Cyber resilient has emerged over the past few years because traditional cybersecurity measures are no longer enough to protect organizations from the spate of persistent attacks. It helps an organization protect against cyber risks, defend against and limit the severity of attacks, and ensure its continued survival despite an attack.The cyber resilient capability maturity model is a very important element within an effective in digital supply chain. The maturity model has 6 components: identify, protect,
APA, Harvard, Vancouver, ISO, and other styles
24

Pigola, Angélica, and Priscila Rezende da Costa. "Dynamic Capabilities in Cybersecurity Intelligence: A Meta-Synthesis to Enhance Protection Against Cyber Threats." Communications of the Association for Information Systems 53, no. 1 (2023): 1099–135. http://dx.doi.org/10.17705/1cais.05347.

Full text
Abstract:
Advanced cybersecurity threats with automated capabilities are on the rise in industries such as finance, healthcare, technology, retail, telecoms, and transportation, as well as government. It is necessary to conduct analyses of cybersecurity-related resources and capabilities to build cybersecurity intelligence (CI). The purpose of this paper is to suggest a dynamic capability in a cybersecurity intelligence (DCCI) model based on existing literature that helped firms reduce risks of cyber violations and advance the development of systems and the life cycle of firms. Through a meta-synthesis,
APA, Harvard, Vancouver, ISO, and other styles
25

Varona Taborda, María Alejandra. "Dynamic Cybersecurity Model based on ISO standards for Higher Education Institutions in Colombia." Ingeniería Solidaria 17, no. 3 (2021): 1–21. http://dx.doi.org/10.16925/2357-6014.2021.03.05.

Full text
Abstract:
Introduction: This article is the result of a research process whose product was to generate a guide for Higher Education Institutions (in Spanish, IES) to adopt a Cybersecurity Model based on ISO standards (International Organization for Standardization).
 Problem: IES do not have a cybersecurity model aligned to the ISO / IEC 27032: 2012 standard (International Organization for Standardization / International Electrotechnical Commission), which causes a lack of clarity and uncertainty in the level of maturity and low efficiency in processes and information security controls to be implem
APA, Harvard, Vancouver, ISO, and other styles
26

Mori, Shigeo, and Atsuhiro Goto. "Reviewing National Cybersecurity Strategies." Journal of Disaster Research 13, no. 5 (2018): 957–66. http://dx.doi.org/10.20965/jdr.2018.p0957.

Full text
Abstract:
The damages caused by cyber-attacks are becoming larger, broader and more serious and to include monetary losses and losses of lifeline. Some cyber-attacks are arguably suspected to be parts of national campaigns. Under such circumstances, the public sector must endeavour to enhance the national cybersecurity capacities. There are several benchmarks for national cybersecurity, i.e., a snapshot relative assessment of a nation’s cybersecurity strength at a global level. However, by considering the development of technology, attackers’ skills and capacities of other nations, we believe that it is
APA, Harvard, Vancouver, ISO, and other styles
27

Baykız, Tekin, and Şuay Nilhan Açıkalın. "THE DIGITALIZATION OF DIPLOMACY MATURITY MODEL (DD-MM): A NEW MODEL FOR OPTIMIZING DIPLOMATIC DIGITALIZATION." Journal of Nusantara Studies (JONUS) 9, no. 2 (2024): 441–73. http://dx.doi.org/10.24200/jonus.vol9iss2pp441-473.

Full text
Abstract:
This paper introduces the Digitalization of Diplomacy Maturity Model (DD-MM), a comprehensive framework designed to assess and enhance the digital capabilities of diplomatic institutions. The DD-MM encompasses four critical dimensions: people, digital visibility, technology and security, and policies, providing a structured approach to evaluate and advance the maturity of digital diplomacy practices. In the people dimension, the model emphasizes role definitions, change management, and specialized training programs, highlighting the need for diplomats to acquire digital literacy and competency
APA, Harvard, Vancouver, ISO, and other styles
28

Rohith, Lakshmi Narasimha. "Defining Observability Maturity: A Blueprint for Scalable and Resilient IT Operations." International Scientific Journal of Engineering and Management 03, no. 09 (2024): 1–7. https://doi.org/10.55041/isjem02080.

Full text
Abstract:
In today's rapidly evolving IT landscape, organizations are faced with the challenge of maintaining high availability, performance, and security in increasingly complex, distributed systems. Traditional monitoring approaches rely on static thresholds and rule-based alerts, these are no longer adequate to manage modern cloud-native architectures, microservices, and hybrid environments. To address these challenges, organizations must advance their observability maturity by integrating AI-driven analytics, automation, and predictive insights into their operations. This paper introduces the Observ
APA, Harvard, Vancouver, ISO, and other styles
29

Hochstetter-Diez, Jorge, Mauricio Diéguez-Rebolledo, Julio Fenner-López, and Cristina Cachero. "AIM Triad: A Prioritization Strategy for Public Institutions to Improve Information Security Maturity." Applied Sciences 13, no. 14 (2023): 8339. http://dx.doi.org/10.3390/app13148339.

Full text
Abstract:
In today’s world, private and government organizations are legally obligated to prioritize their information security. They need to provide proof that they are continually improving their cybersecurity compliance. One approach that can help organizations achieve this goal is implementing information security maturity models. These models provide a structured framework for measuring performance and implementing best practices. However, choosing a suitable model can be challenging, requiring cultural, process, and work practice changes. Implementing multiple models can be overwhelming, if possib
APA, Harvard, Vancouver, ISO, and other styles
30

Blinov, A. V., and S. V. Bezzateev. "DevSecOps: UNIFYING DEVELOPMENT AND SECURITY PROCESSES." Voprosy kiberbezopasnosti 2, no. 66 (2025): 78–89. https://doi.org/10.21681/2311-3456-2025-2-78-89.

Full text
Abstract:
Research objective: the objective of this study is to examine and describe the concept of DevSecOps, its structure, and key components, as well as to develop a simplified DevSecOps maturity model. This model can be utilized by organizations to assess their current DevSecOps maturity level and identify priority areas for the phased implementation of secure software development practices. Methods: the research involved analyzing modern approaches to integrating security into DevOps processes, developing a DevSecOps maturity model based on international standards and practices, and creating metho
APA, Harvard, Vancouver, ISO, and other styles
31

Vivek Madan. "The Role of Compliance in Cybersecurity: Strengthening the Digital Fortress." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 3757–61. https://doi.org/10.32628/cseit25112851.

Full text
Abstract:
In today's digitally driven world, cybersecurity compliance is emerging as a core pillar of modern risk management. As cyber threats grow in sophistication and frequency, aligning with frameworks like GDPR, ISO/IEC 27001, HIPAA, SOC 2, and NIST 800-53 goes far beyond checking regulatory boxes. These standards represent a strategic approach to digital risk fostering operational resilience, organizational trust, and long-term excellence. This article dives into the measurable value of cybersecurity compliance, utilizing industry data, visual benchmarks, and a compliance maturity model. It also u
APA, Harvard, Vancouver, ISO, and other styles
32

Fleming, Courtney, Mark Reith, and Wayne Henry. "Securing Commercial Satellites for Military Operations: A Cybersecurity Supply Chain Framework." International Conference on Cyber Warfare and Security 18, no. 1 (2023): 85–92. http://dx.doi.org/10.34190/iccws.18.1.1062.

Full text
Abstract:
The increased reliance on commercial satellites for military operations has made it essential for the Department of Defense (DoD) to adopt a supply chain framework to address cybersecurity threats in space. This paper presents a satellite supply chain framework, the Cybersecurity Supply Chain (CSSC) Framework, for the DoD in the evaluation and selection of commercial satellite contracts. The proposed strategy is informed by research on cybersecurity threats to commercial satellites, national security concerns, current DoD policy, and previous cybersecurity frameworks. This paper aims to provid
APA, Harvard, Vancouver, ISO, and other styles
33

Levy, Yair, and Ruti Gafni. "Towards the quantification of cybersecurity footprint for SMBs using the CMMC 2.0." Online Journal of Applied Knowledge Management 10, no. 1 (2022): 43–61. http://dx.doi.org/10.36965/ojakm.2022.10(1)43-61.

Full text
Abstract:
Organizations, small and big, are faced with major cybersecurity challenges over the past several decades, as the proliferation of information systems and mobile devices expand. While larger organizations invest significant efforts in developing approaches to deal with cybersecurity incidents, Small and Medium Businesses (SMBs) are still struggling with ways to both keep their businesses alive and secure their systems to the best of their abilities. When it comes to critical systems, such as defense industries, the interconnectivities of organizations in the supply-chain have demonstrated to b
APA, Harvard, Vancouver, ISO, and other styles
34

Гузенко, Н. В. "Цифровая зрелость транспортной инфраструктуры как стратегический ресурс пространственного развития регионов". Vestnik of Rostov state University (RINH) 32, № 2 (2025): 21–34. https://doi.org/10.54220/v.rsue.1991-0533.2025.90.2.002.

Full text
Abstract:
Введение. В условиях цифровой трансформации транспортная инфраструктура приобретает новое стратегическое значение для пространственного развития регионов. Цель исследования – формализация модели оценки цифровой зрелости инфраструктуры с учетом отраслевой специфики и межрегиональных различий. Материалы и методы. Исследование основано на контент-анализе отечественных и зарубежных научных публикаций, сравнении зрелостных моделей, а также систематизации критериев цифровой трансформации транспортной инфраструктуры. Использованы методы системного анализа, сопоставления и концептуального моделировани
APA, Harvard, Vancouver, ISO, and other styles
35

Tabim, Verônica Maurer, Cíntia Wilke Franco, and João Pedro Hoerde. "Digital transformation in e-commerce logistics." Brazilian Journal of Operations & Production Management 21, no. 1 (2024): 1641. http://dx.doi.org/10.14488/bjopm.1641.2024.

Full text
Abstract:
Highlights: This article addresses the diagnosis of digital maturity in e-commerce logistics, specifically the final delivery stage, known as the last-mile. The last-mile has greater digitization demand than traditional logistics due to the extreme speed of the virtual world during shopping, where customers transfer these same expectations to delivery services. Goal: The main objective of this work is to evaluate the digital maturity of the last-mile area of operation of an e-commerce logistics company. Methodology: This study evaluates the maturity model in a case study with the company E-com
APA, Harvard, Vancouver, ISO, and other styles
36

Malik, Anum, Kaleem Arshid, Nooruddin Noonari, and Rizwan Munir. "Artificial Intelligence-Driven Cybersecurity Framework Using Machine Learning for Advanced Threat Detection and Prevention." Scholars Journal of Engineering and Technology 13, no. 06 (2025): 401–23. https://doi.org/10.36347/sjet.2025.v13i06.005.

Full text
Abstract:
The escalating complexity, frequency, and diversity of cyber threats in today's hyper-connected digital landscape have rendered traditional security frameworks insufficient. In response, this research introduces a comprehensive, Al-driven cybersecurity architecture underpinned by state-of-the-art machine learning (ML) algorithms and the Artificial Neural Network-Interpretive Structural Modeling (ANN-ISM) paradigm. The proposed system is engineered to deliver real-time threat detection, advanced vulnerability assessment, intelligent risk response, and scalable threat mitigation capabilities. Th
APA, Harvard, Vancouver, ISO, and other styles
37

Amanda, Delpia, Nurul Mutiah, and Syahru Rahmayudha. "Analisis Tingkat Kematangan Keamanan Informasi Menggunakan NIST Cybersecurity Framework dan CMMI." Coding Jurnal Komputer dan Aplikasi 11, no. 2 (2023): 291. http://dx.doi.org/10.26418/coding.v11i2.65088.

Full text
Abstract:
Pemanfaatan teknologi informasi di lingkungan perguruan tinggi, khususnya Universitas Tanjungpura (Untan), telah membawa berbagai kemudahan, salah satunya adalah akses informasi yang efisien. Untan menggunakan Sistem Informasi Akademik (SIAKAD) untuk mengelola data akademik dari semua fakultas. Walaupun SIAKAD memberikan manfaat besar, penggunaan teknologi ini juga membawa risiko keamanan data yang perlu diperhatikan. Ketika data dan informasi semakin banyak disimpan dan dikelola, risiko kerusakan, kehilangan, atau tereksposnya data kepada pihak tak berwenang juga semakin meningkat. Oleh karen
APA, Harvard, Vancouver, ISO, and other styles
38

Fajri, Khafidh Sunny Al, and Ruki Harwahyu. "Information Security Management System Assessment Model by Integrating ISO 27002 and 27004." MALCOM: Indonesian Journal of Machine Learning and Computer Science 4, no. 2 (2024): 498–506. http://dx.doi.org/10.57152/malcom.v4i2.1245.

Full text
Abstract:
The rapid development of information and communication technology has also led to a significant increase in cybercrime activities. According to the Annual Cybersecurity Monitoring Report by the National Cyber and Cryptography Agency, there were 495 million instances of traffic anomalies or attempted attacks in 2020, which rose to 1.6 billion in 2021 in Indonesia. Implementing the ISO 27001 standard for information security management system (ISMS) can help mitigate these cyber-attack attempts. However, with various levels of resources and organizational commitment, different levels of ISMS mat
APA, Harvard, Vancouver, ISO, and other styles
39

Kvint, V. L., A. V. Babkin, and E. V. Shkarupeta. "Strategizing of forming a platform operating model to increase the level of digital maturity of industrial systems." Russian Journal of Industrial Economics 15, no. 3 (2022): 249–61. http://dx.doi.org/10.17073/2072-1633-2022-3-249-261.

Full text
Abstract:
The authors of the article suggest the strategy of forming a platform operating model to increase the level of digital maturity of industrial systems in the changing conditions of reality. They have analyzed the current situation on adapting industrial systems to the changing conditions of reality of 2022: the sanctions restrictions and the COVID-19 pandemic crisis. In analogy with the bionics companies concept the authors introduce the term of «bionic industrial systems» as the aggregate of economic entities which form the closed cycle of producing artificial products by machine and combine n
APA, Harvard, Vancouver, ISO, and other styles
40

Aibueva, Rayana A. M., and Hamid Sh Nasurov. "CYBERSECURITY OF COMPANIES: THE IMPORTANCE OF TRAINING EMPLOYEES IN DIGITAL LITERACY TO PROTECT CORPORATE DATA." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 2/15, no. 155 (2025): 5–11. https://doi.org/10.36871/ek.up.p.r.2025.02.15.001.

Full text
Abstract:
The article discusses the critical role of digital literacy of employees as a key element of the cybersecurity strategy in the corporate environment. Against the backdrop of the growing number of targeted attacks, social engineering and data leaks caused by the human factor, special attention is paid to the theoretical and methodological foundations of the formation of secure behavior. The analytical framework is a synthesis of the technology acceptance model (TAM) and the theory of planned behavior (TPB), which allows for a comprehensive assessment of the cognitive, normative and behavioral d
APA, Harvard, Vancouver, ISO, and other styles
41

ANNA, ANGELOGIANNI, POLITIS ILIAS, MOHAMMADI FARNAZ, and XENAKIS CHRISTOS. "On Identifying Threats and Quantifying Cybersecurity Risks of Mnos Deploying Heterogeneous Rats." IEEE ACCESS 8 (December 16, 2020): 224677–701. https://doi.org/10.1109/ACCESS.2020.3045322.

Full text
Abstract:
Wireless networks constitute a significant attack vector for adversaries due to their wide usage in our everyday life. As the fifth generation of wireless networks reaches maturity, several vulnerabilities affecting earlier generations have been resolved. Nevertheless the coexistence of legacy wireless technologies is giving rise to the risk of allowing adversaries to perform downgrade attacks, thus bypassing the improved security of the state-of-the-art communication networks. Vulnerabilities due to the trade-off between security and usability could also exist in the latest wireless networkin
APA, Harvard, Vancouver, ISO, and other styles
42

CHISOM ELIZABETH ALOZIE and UZOAMAKA OKAFOR. "Balancing efficiency and security: The role of voluntary standards and emerging technologies in cyber risk management framework in the global space." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 2411–33. https://doi.org/10.30574/wjarr.2025.26.2.1896.

Full text
Abstract:
This research investigates the evolving balance between operational efficiency and security controls in global cyber risk management frameworks. Through a mixed-methods approach combining quantitative survey data from 183 organizations across 27 countries and qualitative insights from 42 in-depth interviews with cybersecurity leaders, the study examines how voluntary standards and emerging technologies shape contemporary risk management practices. Findings reveal that organizations achieving optimal security-efficiency balance demonstrate three key characteristics: integrated risk governance s
APA, Harvard, Vancouver, ISO, and other styles
43

Prasanna Kumar Kandregula. "Building secure projects: Cybersecurity principles for every stage." International Journal of Science and Research Archive 15, no. 2 (2025): 723–32. https://doi.org/10.30574/ijsra.2025.15.2.1460.

Full text
Abstract:
The scale and sophistication of threats in the world of cybersecurity are steadily increasing and they thus become increasingly delimitative toward organizations of whichever industry. Many projects are failing to incorporate maintainable practices of cybersecurity since its earlier concept phase to delivery, due to which the practical linkage culminating in a plethora of data breaches, financial losses resounding in cost, and reputation, and having grievous regulatory penalties. Our assertion also surmises keeping security as a parallel activity or as an afterthought that must systematically
APA, Harvard, Vancouver, ISO, and other styles
44

Yarovenko, Hanna, Olha Horbachova, Roman Bylbas, and Dmytro Latysh. "Digitalization As a Socio-Economic Challenge: Modeling the Impact On the Level of Cybercrime Considering Socio-Economic, Technological and Institutional Factors." SocioEconomic Challenges 9, no. 2 (2025): 282–315. https://doi.org/10.61093/sec.9(2).282-315.2025.

Full text
Abstract:
Today, digital technologies are not just changing reality – they are closely intertwined, forming a new ecosystem. This process brings numerous benefits: fast decision-making, automation of routine tasks, and access to information in one click. At the same time, along with new opportunities, new socio-economic challenges arise – cybercrime is rapidly evolving, acquiring complex forms, prevalence and danger. Hacker attacks, data leaks, and digital fraud have become real challenges that affect not only individual users, but also businesses, state institutions and national security. The digital w
APA, Harvard, Vancouver, ISO, and other styles
45

Khavanov, Artem. "DEVELOPMENT AND IMPLEMENTATION OF COMPLIANCE INDICATORS TO ASSESS THE MATURITY LEVEL OF THE ECONOMIC SECURITY SYSTEM OF ENTERPRISES." Economic scope, no. 201 (June 10, 2025): 230–33. https://doi.org/10.30838/ep.201.230-233.

Full text
Abstract:
The article substantiates the theoretical and practical foundations for the development of compliance indicators designed to assess the maturity level of an enterprise’s economic security system. Recognizing that modern enterprises operate in increasingly complex and risk-laden environments, the study emphasizes the need for systematic tools to objectively evaluate the effectiveness and integration of compliance functions. Through a detailed analysis of internationally recognized frameworks—including those of the OECD, ISO 37301, and the UN Global Compact—and a review of best practices from co
APA, Harvard, Vancouver, ISO, and other styles
46

Khudyntsev, Mykola M., and Igor L. Palazhchenko. "Cybersecurity maturity models for cybersecurity assessment in critical infrastructure." Environmental safety and natural resources 52, no. 4 (2024): 122–34. https://doi.org/10.32347/2411-4049.2024.4.122-134.

Full text
Abstract:
The paper includes a list of existing maturity models (cybersecurity maturity) and an analysis of the application of these models for assessing cybersecurity, the level, and maturity of cyber security, the maturity of systems and processes for ensuring cybersecurity in critical infrastructure sectors, in the national cybersecurity system, the development of indicators and indices of the state of security (network, information security, cybersecurity).The paper substantiates and proposes a hierarchy of models for assessing the maturity of cyber security in the national cyber security ecosystem
APA, Harvard, Vancouver, ISO, and other styles
47

Ascue, Olga, Omar Valle, and José Santisteban. "BLOCKSAGE: Blockchain-Based Cloud Architecture for Sensitive Data Management in SMEs." Sustainability 17, no. 4 (2025): 1352. https://doi.org/10.3390/su17041352.

Full text
Abstract:
Small and medium-sized enterprises (SMEs) face significant challenges from security breaches, which can jeopardize their operational sustainability. This study presents the BLOCKSAGE SME system, a model designed to enhance the security of sensitive data storage and transfer. The system integrates customizable cloud infrastructure, private blockchain networks, Zero Trust architecture, a scalable API, and IPFS encryption, ensuring data privacy and business continuity. Based on a comprehensive literature review of blockchain-based solutions for SMEs, a web-based file-sharing prototype was develop
APA, Harvard, Vancouver, ISO, and other styles
48

Muttaqin, Hidayatul, and Kalamullah Ramli. "Designing An Information Security Framework For The Indonesia Water Industry Sector." Cakrawala Repositori IMWI 6, no. 3 (2023): 771–80. http://dx.doi.org/10.52851/cakrawala.v6i3.352.

Full text
Abstract:
The majority of Indonesia's water industry sectors have implemented smart water management systems as part of their business development, which has an indirect impact on enterprise information security. However, in general, water sector enterprises continue to place a low priority on information security, and the development of information system frameworks is based on generic norms employed by financial firms. There has been no research on information security frameworks especially built for water firms in Indonesia that use information security standards in the utilities sector. This article
APA, Harvard, Vancouver, ISO, and other styles
49

Garba, Adamu Abdullahi, Maheyzah Muhamad Siraj, and Siti Hajar Othman. "An Explanatory Review on Cybersecurity Capability Maturity Models." Advances in Science, Technology and Engineering Systems Journal 5, no. 4 (2020): 762–69. http://dx.doi.org/10.25046/aj050490.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Tolkachov, Maksym, Nataliia Dzheniuk, Serhii Yevseiev, et al. "Development of a method for protecting information resources in a corporate network by segmenting traffic." Eastern-European Journal of Enterprise Technologies 5, no. 9 (131) (2024): 63–78. http://dx.doi.org/10.15587/1729-4061.2024.313158.

Full text
Abstract:
The object of the study is a corporate network with a dynamic structure and centralized management. The subject of the research is the processes of ensuring the protection of information resources in the corporate network. The goal is to develop a method of protecting information in the corporate network. The development is based on the Zero Trust Security strategy, according to which access to the network is allowed only after verification and identification of information. The task is to develop an effective method of protecting information resources and managing cyber security in the corpor
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!