A comprehensive study of the IoT cybersecurity in smart cities

RO Andrade, SG Yoo, L Tello-Oquendo… - IEEE …, 2020 - ieeexplore.ieee.org
Smart cities exploit emerging technologies such as Big Data, the Internet of Things (IoT),
Cloud Computing, and Artificial Intelligence (AI) to enhance public services management …

Secure software development methodologies: a multivocal literature review

A Kudriavtseva, O Gadyatskaya - arXiv preprint arXiv:2211.16987, 2022 - arxiv.org
In recent years, the number of cyber attacks has grown rapidly. An effective way to reduce
the attack surface and protect software is adoption of methodologies that apply security at …

Cybersecurity for railways–A maturity model

R Kour, R Karim, A Thaduri - … , Part F: Journal of Rail and …, 2020 - journals.sagepub.com
With the advancements in and widespread adoption of information and communication
technologies in infrastructures, cyber-attacks are becoming more frequent and more severe …

Comparative study of cybersecurity capability maturity models

AM Rea-Guaman, T San Feliu… - … , SPICE 2017, Palma de …, 2017 - Springer
According to ESET, cybersecurity can be defined as the protection of information assets,
through the treatment of threats that put at risk the information that is processed, stored and …

AVARCIBER: a framework for assessing cybersecurity risks

AM Rea-Guaman, J Mejía, T San Feliu… - Cluster …, 2020 - Springer
The identification and assessment of risks are a fundamental part of cybersecurity.
Determining the elements that participate in this field is difficult because there is no …

[HTML][HTML] On Data Leakage Prevention Maturity: Adapting the C2M2 Framework

J Domnik, A Holland - Journal of Cybersecurity and Privacy, 2024 - mdpi.com
In an evolving cybersecurity landscape marked by escalating data breaches and regulatory
demands, data leakage prevention (DLP) has emerged as one of several defense …

A nis directive compliant cybersecurity maturity assessment framework

G Drivas, A Chatzopoulou, L Maglaras… - 2020 IEEE 44th …, 2020 - ieeexplore.ieee.org
The EU NIS Directive introduces obligations related to the security of the network and
information systems for Operators of Essential Services and for Digital Service Providers …

[HTML][HTML] AIM Triad: A Prioritization Strategy for Public Institutions to Improve Information Security Maturity

J Hochstetter-Diez, M Diéguez-Rebolledo… - Applied Sciences, 2023 - mdpi.com
In today's world, private and government organizations are legally obligated to prioritize their
information security. They need to provide proof that they are continually improving their …

An analysis of assessment approaches and maturity scales used for evaluation of information security and cybersecurity user awareness and training programs: A …

K Muronga, M Herselman, A Botha… - 2019 conference on …, 2019 - ieeexplore.ieee.org
This study aimed to ascertain the types of approaches that are applied in the assessments of
information security and cybersecurity user awareness and training programs. The study …

[HTML][HTML] Create your own MUSE: A method for updating security level evaluation instruments

M Seeba, AO Affia, S Mäses, R Matulevičius - Computer Standards & …, 2024 - Elsevier
Abstract Number of security evaluation instruments and security maturity models have been
developed to evaluate the security level of organizations. These instruments provide results …