Adopting security maturity model to the organizations’ capability model

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using a Capability Maturity Model to Derive Security Requirements

A security engineer is often assigned to a project that already has defined security objectives. But on occasion, the security engineer may be tasked with the initial definition of the objectives. While this assignment may be exciting because of the important role the security engineer is to play, it may also be somewhat daunting due to the large solution space. In order to guide one’s efforts ...

متن کامل

A Maturity Model for Measuring Organizations Escalation Capability of IT-related Security Incidents in Sweden

Managing IT-related security incidents are a growing important issue facing the organizations in IT security risk management. We have used design science approach to develop an artifact to measure different organizations capabilities and maturity to handle IT-related security incidents. In this paper, we present how we have tested and will test the artifact on several different Swedish organiza...

متن کامل

Social media, social commerce, maturity model, integrated capability maturity model (CMMI), Performance Evaluation

With the advent of technology and the need to do communications and transactions quickly, social commerce has become increasingly popular as a new way of doing business which has led to greater success for organizations. Despite the importance of social commerce and the use of social media in business, there is still no implementation roadmap that integrates the multiple dimensions of these ini...

متن کامل

Capability Maturity Model for Software

The iedas and findigs in tiis document shouid not be construed as an official DoD position. It is published in the interest of scientific and technical information exchange. 'L-z , ay it-sademarks in this document is not intended in any way to infringe on the rights of the trademark holder.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Egyptian Informatics Journal

سال: 2021

ISSN: 1110-8665

DOI: 10.1016/j.eij.2020.08.001