Abstract

As organisations are vulnerable to cyberattacks, their protection becomes a significant issue. Capability Maturity Models can enable organisations to benchmark current maturity levels against best practices. Although many maturity models have been already proposed in the literature, a need for models that integrate several regulations exists. This article presents a light, web-based model that can be used as a cybersecurity assessment tool for Higher Education Institutes (HEIs) of the United Kingdom. The novel Holistic Cybersecurity Maturity Assessment Framework incorporates all security regulations, privacy regulations, and best practices that HEIs must be compliant to, and can be used as a self assessment or a cybersecurity audit tool.

Highlights

  • In an age of information growth, technology plays a key role in shaping all aspects of human life

  • The validation authenticates the contribution of the proposed maturity model, Holistic Cybersecurity Maturity Assessment Framework (HCYMAF), as well as its usefulness, value, capability, and operational characteristics

  • Security Officers) in order to identify the different regulations that the Higher Education Institutes (HEIs) must be compliant with, the best practices that they follow, how do organisations manage the overlap between cybersecurity and data protection (GDPR), the integration of Risk Management and the Privacy

Read more

Summary

Introduction

In an age of information growth, technology plays a key role in shaping all aspects of human life. Teachers and students can make use of the ever-expanding resources available, creating a diverse learning experience that caters for many teaching and learning styles. With this adoption of technology, Higher Education Institutions (HEIs) are finding themselves the targets of malicious cyberactivities, with a recent JISC report [1] reaffirming that. UHEIs in the UK are not well prepared to defend against, or recover from cyberattacks Due to their nature, HEIs hold a significant amount of information and accumulated knowledge. HEIs hold a significant amount of information and accumulated knowledge As a result, they are attractive to threat actors who target research findings, financial data, and computing resources. Katz [2] identified that HEIs are under continual risk of cyberattacks

Results
Discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.