A Formal Intelligent Metric System for Measuring Cyber Security Maturity
Închide
Articolul precedent
Articolul urmator
91 0
SM ISO690:2012
BUZDUGAN, Aurelian, CĂPĂŢÂNĂ, Gheorghe. A Formal Intelligent Metric System for Measuring Cyber Security Maturity. In: Smart Innovation, Systems and Technologies, Ed. 1, 23-26 mai 2023, București. Berlin: Springer Science and Business Media Deutschland GmbH, 2024, Vol. 367, pp. 249-258. ISBN 978-981996959-3. ISSN 21903018. DOI: https://doi.org/10.1007/978-981-99-6529-8_21
EXPORT metadate:
Google Scholar
Crossref
CERIF

DataCite
Dublin Core
Smart Innovation, Systems and Technologies
Vol. 367, 2024
Conferința "Smart Innovation, Systems and Technologies"
1, București, Romania, 23-26 mai 2023

A Formal Intelligent Metric System for Measuring Cyber Security Maturity

DOI:https://doi.org/10.1007/978-981-99-6529-8_21

Pag. 249-258

Buzdugan Aurelian, Căpăţână Gheorghe
 
Moldova State University
 
 
Disponibil în IBN: 2 martie 2024


Rezumat

This paper presents an innovative solution for enhancing cyber-security in critical infrastructures. The proposed approach focuses on measuring cyber-security maturity and identifying key risk areas through the use of a formal intelligent metric system. The system aims to assist the cyber-security assessment process by comparing the level of maturity against good practices or national requirements of critical infrastructure entities. The knowledge base of the formal intelligent metric system contains five maturity levels, which cover both technological and human dimension criteria. The system is universal for the field of critical infrastructure and helps increase the level of cyber-security maturity while minimizing risks. The system can be used as a standalone solution or complement previously proposed decision support systems. Furthermore, it can be adapted to any type of critical infrastructure, depending on the context and requirements. This paper provides an overview and description of the formal intelligent metric system, discusses its potential use cases in the critical infrastructure domain, and highlights possible adaptations given the context of each entity.