Author:
Gomez Brignith,Vargas Saul,Mansilla Juan-Pablo
Publisher
Springer Nature Switzerland
Reference34 articles.
1. Abazi, B., Kő, A.: A framework for semiautomatic risk assessment and a security maturity model based on ISO 27001. J. Comput. Inform. Syst. 59(3), 264–274 (2019). https://doi.org/10.1080/08874417.2018.1536542
2. Carver, C., Puhakainen, P.: A five-level model for cybersecurity. J. Inform. Sec. Appl. 46, 195–209 (2019). https://doi.org/10.1016/j.jisa.2019.02.008
3. Chuquilla, A., Guarda, T., Quiña, G.N.: Ransomware-wannacry security is everyone’s. In: 2019 14th Iberian Conference on Information Systems and Technologies (CISTI), pp. 1–4. IEEE (2019). https://doi.org/10.23919/CISTI.2019.8760749
4. CISA. Ransomware Guide. Cybersecurity and Infrastructure Security Agency (2021). https://www.cisa.gov/publication/ransomware-guide
5. Computer security maturity: 5 steps to excellence. GB Advisors (2018). https://www.gb-advisors.com/computer-security-maturity/