A Systematic Study of Asset Management using Hybrid Cyber Security Maturity Model
Sai Sireesha Veerapaneni1, K. Raja Sekhar2
1Sai Sireesha Veerapaneni, M.Tech Student, Department of Computer Science and Engineering, Koneru Lakshmaiah Educational Foundation, Vaddeswaram, Guntur (Andhra Pradesh), India.
2Dr. K. Raja Sekhar, Professor, Department of Computer Science and Engineering, Koneru Lakshmaiah Educational Foundation, Vaddeswaram, Guntur (Andhra Pradesh), India.
Manuscript received on 23 April 2019 | Revised Manuscript received on 05 May 2019 | Manuscript Published on 17 May 2019 | PP: 140-145 | Volume-7 Issue-6S4 April 2019 | Retrieval Number: F10270476S419/2019©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: There are persistent cyber security attacks which leads unauthorized access to internal corporate networks and other critical confidential information. It is essential to build security solutions by adopting a Security Framework for any organization to find solutions for majority of vulnerabilities and flaws. The proposed work provides a platform to study methodical, controlled and repeatable approach to assess an organization’s cyber security posture especially for asset management. The study helps organization’s owners to assess their operational and information system’s cybersecurity practices by querying a set of comprehensive questions about cyber security assets like Authentication, Authorization, Access controls, Database, Email security, Removable media, Backup &, Firewalls, Incident management etc. The proposed model improves the cyber security posture of the organization and escalate the chances of mitigating cyber security risks.
Keywords: Cyber Security, Cyber Security Evaluation, Cyberattacks, Cyber Security Assets, Maturity Assessment.
Scope of the Article: Large-Scale Cyber Systems