-
Review of cybersecurity assessment methods [Elektronski vir] : applicability perspectiveLeszczyna, RafałCybersecurity assessments are crucial in building the assurance that vital cyberassets are effectively protected from threats. Multiple assessment methods have been proposed during the decades of the ... cybersecurity field. However, a systematic literature search described in this paper reveals that their reviews are practically missing. Thus, the primary objective of this research was to fulfil this gap by comprehensively identifying and analysing cybersecurity assessment methods described in the scientific literature. A structured research method and transparent criteria were applied for this purpose. As a result, thirty-two methods are presented in this paper. Particular attention is paid to the question of the methods’ applicability in realistic contexts and environments. In that regard,the challenges and limitations associated with the methods’ application as well as potential approaches to addressing them have been indicated. Besides, the paper systematises the terminology and indicates complementary studies which can be helpful during assessments. Finally, the areas that leave space for improvement and directions for further research and development are indicated. The intention is to support researchers and practitioners in choosing the method to be applied in their assessments and to indicate the areas that can be further explored.Source: Computers & Security [Elektronski vir]. - ISSN 1872-6208 (Vol. 108, 102376, Sep. 2021, 28 str.)Type of material - e-article ; adult, seriousPublish date - 2021Language - englishCOBISS.SI-ID - 180623107
Author
Leszczyna, Rafał
Topics
kibernetska varnost |
ocenjevanje |
metode |
uporabnost |
upravljanje |
računalniška varnost |
informacijska varnost |
ocena tveganja |
organizacijski management |
poslovni management |
cybersecurity |
assessment |
methods |
applicability |
usability |
management |
computer security |
information security |
risk assessment |
organisational management |
business management
Shelf entry
Permalink
- URL:
Impact factor
Access to the JCR database is permitted only to users from Slovenia. Your current IP address is not on the list of IP addresses with access permission, and authentication with the relevant AAI accout is required.
Year | Impact factor | Edition | Category | Classification | ||||
---|---|---|---|---|---|---|---|---|
JCR | SNIP | JCR | SNIP | JCR | SNIP | JCR | SNIP |
Select the library membership card:
DRS, in which the journal is indexed
Database name | Field | Year |
---|
Links to authors' personal bibliographies | Links to information on researchers in the SICRIS system |
---|---|
Leszczyna, Rafał |
Select pickup location:
Material pickup by post
Notification
Subject headings in COBISS General List of Subject Headings
Select pickup location
Pickup location | Material status | Reservation |
---|
Please wait a moment.