Version 1
: Received: 23 April 2020 / Approved: 23 April 2020 / Online: 23 April 2020 (15:40:58 CEST)
Version 2
: Received: 8 May 2020 / Approved: 9 May 2020 / Online: 9 May 2020 (04:35:03 CEST)
How to cite:
Aliyu, A.; Maglaras, L.; He, Y.; Yevseyeva, I.; Boiten, E.; Cook, A.; Janicke, H. A Holistic Cybersecurity Maturity Assessment Framework for Higher Education Institutions in the United Kingdom. Preprints2020, 2020040420
Aliyu, A.; Maglaras, L.; He, Y.; Yevseyeva, I.; Boiten, E.; Cook, A.; Janicke, H. A Holistic Cybersecurity Maturity Assessment Framework for Higher Education Institutions in the United Kingdom. Preprints 2020, 2020040420
Aliyu, A.; Maglaras, L.; He, Y.; Yevseyeva, I.; Boiten, E.; Cook, A.; Janicke, H. A Holistic Cybersecurity Maturity Assessment Framework for Higher Education Institutions in the United Kingdom. Preprints2020, 2020040420
APA Style
Aliyu, A., Maglaras, L., He, Y., Yevseyeva, I., Boiten, E., Cook, A., & Janicke, H. (2020). A Holistic Cybersecurity Maturity Assessment Framework for Higher Education Institutions in the United Kingdom. Preprints. https://doi.org/
Chicago/Turabian Style
Aliyu, A., Allan Cook and Helge Janicke. 2020 "A Holistic Cybersecurity Maturity Assessment Framework for Higher Education Institutions in the United Kingdom" Preprints. https://doi.org/
Abstract
As organizations are vulnerable to cyber attacks, their protection becomes a significant issue. Capability Maturity Models can enable organizations to benchmark current maturity levels against best practices. Although many maturity models have been already proposed in the literature, a need for models that integrate several regulations exists. This article presents a light web-based model that can be used as a cybersecurity assessment tool for Higher Education Institutes (HEIs) of the UK. The novel Holistic Cybersecurity Maturity Assessment Framework incorporates all security and privacy regulations and best practices that HEIs must be compliant to and can be used as a self-assessment or a cybersecurity audit tool.
Computer Science and Mathematics, Security Systems
Copyright:
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Commenter: Leandros Maglaras
Commenter's Conflict of Interests: Author