MASISCo—Methodological Approach for the Selection of Information Security Controls

Author:

Diéguez Mauricio,Cares Carlos,Cachero Cristina,Hochstetter JorgeORCID

Abstract

As cyber-attacks grow worldwide, companies have begun to realize the importance of being protected against malicious actions that seek to violate their systems and access their information assets. Faced with this scenario, organizations must carry out correct and efficient management of their information security, which implies that they must adopt a proactive attitude, implementing standards that allow them to reduce the risk of computer attacks. Unfortunately, the problem is not only implementing a standard but also determining the best way to do it, defining an implementation path that considers the particular objectives and conditions of the organization and its availability of resources. This paper proposes a methodological approach for selecting and planning security controls, standardizing and systematizing the process by modeling the situation (objectives and constraints), and applying optimization techniques. The work presents an evaluation of the proposal through a methodology adoption study. This study showed a tendency of the study subjects to adopt the proposal, perceiving it as a helpful element that adapts to their way of working. The main weakness of the proposal was centered on ease of use since the modeling and resolution of the problem require advanced knowledge of optimization techniques.

Funder

Universidad de La Frontera

Publisher

MDPI AG

Subject

Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science

Reference96 articles.

1. Internet of things: Information security challenges and solutions;Miloslavskaya;Clust. Comput.,2019

2. Mariano Díaz, R. (2020). La Ciberseguridad en Tiempos del COVID-19 y el Tránsito Hacia una Ciberinmunidad, CEPAL.

3. Cybersecurity: Risks, vulnerabilities and countermeasures to prevent social engineering attacks;Conteh;Int. J. Adv. Comput. Res.,2016

4. Information systems control: A review and framework for emerging information systems processes;Cram;J. Assoc. Inf. Syst.,2016

5. Sousa, V. (2019, January 16). A Review on Cyber Attacks and Its Preventive Measures. Proceedings of the Digital Privacy and Security Conference, Porto, Portugal.

Cited by 2 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Research on Network Accounting Information Security based on AES Algorithm;2023 Global Conference on Information Technologies and Communications (GCITC);2023-12-01

2. AIM Triad: A Prioritization Strategy for Public Institutions to Improve Information Security Maturity;Applied Sciences;2023-07-19

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3