info:eu-repo/semantics/article
A Practical Model to Perform Comprehensive Cybersecurity Audits
Autor
Sabillon,Regner
Institución
Resumen
Abstract: These days organizations are continually facing being targets of cyberattacks and cyberthreats; the sophistication and complexity of modern cyberattacks and the modus operandi of cybercriminals including Techniques, Tactics and Procedures (TTP) keep growing at unprecedented rates. Cybercriminals are always adopting new strategies to plan and launch cyberattacks based on existing cybersecurity vulnerabilities and exploiting end users by using social engineering techniques. Cybersecurity audits are extremely important to verify that information security controls are in place and to detect weaknesses of inexistent cybersecurity or obsolete controls. This article presents an innovative and comprehensive cybersecurity audit model. The CyberSecurity Audit Model (CSAM) can be implemented to perform internal or external cybersecurity audits. This model can be used to perform single cybersecurity audits or can be part of any corporate audit program to improve cybersecurity controls. Any information security or cybersecurity audit team has either the options to perform a full audit for all cybersecurity domains or by selecting specific domains to audit certain areas that need control verification and hardening. The CSAM has 18 domains; Domain 1 is specific for Nation States and Domains 2-18 can be implemented at any organization. The organization can be any small, medium or large enterprise, the model is also applicable to any Non-Profit Organization (NPO).
Ítems relacionados
Mostrando ítems relacionados por Título, autor o materia.
-
Cybersecurity and International Arbitration: ICCA — NYC Bar — CPR Protocol on Cybersecurity in International Arbitration (2020 Edition)
Fernández-Samaniego, Javier; Hierro Viéitez, Gonzalo; Araque Moreno, Yaiza -
Constructing an architecture-based cybersecurity solution for a system
Mora Castro, Alejandro; González Herrera, Andrés; Villalón Fonseca, Ricardo (2023-01-19)Cybersecurity can be effectively managed with an architecture-based approach, composed with three viewpoints, namely system, security and process. Using models for describing a system and its security objectives enables a ... -
Cibercrimen, ciberterrorismo y ciberguerra: los nuevos desafíos del s. XXI
Sánchez Medero, Gema