The CyberSecurity Audit Model (CSAM)

The CyberSecurity Audit Model (CSAM)

DOI: 10.4018/978-1-7998-4162-3.ch008
OnDemand PDF Download:
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This chapter presents the outcome of two empirical research studies that assess the implementation and validation of the cybersecurity audit model (CSAM), designed as a multiple-case study in two different Canadian higher education institution. CSAM can be applied for undertaking cybersecurity audits in any organization or nation state in order to evaluate and measure the cybersecurity assurance, maturity, and cyber readiness. The architecture of CSAM is explained in central sections. CSAM has been examined, implemented, and established under three research scenarios: (1) cybersecurity audit of all model domains, (2) cybersecurity audit of numerous domains, and (3) a single cybersecurity domain audit. The chapter concludes by showing how the implementation of the model permits one to report relevant information for future decision making in order to correct cybersecurity weaknesses or to improve cybersecurity domains and controls; thus, the model can be implemented and sufficiently tested at any organization.
Chapter Preview
Top

Background

This chapter look into an innovative model for creating, developing, planning, delivering and maintaining a CyberSecurity Audit (CSA) methodology or program that was corroborated in two different Canadian Higher Education organizations under unrelated projects and schedules. The implementations in both organizations were part of a multi-case study research along with the Cybersecurity Awareness TRAining Model (CATRAM); another innovative model to conduct and deliver cybersecurity awareness training.

Key Terms in this Chapter

Cybersecurity Maturity: Level of experience that an organization has implemented and acquired for cybersecurity practices.

Cybersecurity Audit: Audit to be conducted to verify cybersecurity controls.

Cybersecurity Domains: Cybersecurity areas that support a cybersecurity program in any organization.

Complete Chapter List

Search this Book:
Reset