http://repositorio.unb.br/handle/10482/43687
File | Description | Size | Format | |
---|---|---|---|---|
ARTIGO_EvaluatingPerformanceNISTs.pdf | 6,87 MB | Adobe PDF | View/Open |
Title: | Evaluating the performance of NIST’s framework cybersecurity controls through a constructivist multicriteria methodology |
Authors: | Moreira, Fernando Rocha Silva Filho, Demétrio Antônio da Amvame-Nze, Georges Daniel Sousa Júnior, Rafael Timóteo de Nunes, Rafael Rabelo |
metadata.dc.identifier.orcid: | https://orcid.org/ 0000-0003-3100-7128 https://orcid.org/ 0000-0002-7103-4780 https://orcid.org/ 0000-0001-5271-5540 https://orcid.org/ 0000-0003-1101-3029 https://orcid.org/ 0000-0002-1538-4276 |
Assunto:: | Segurança de dados Gestão de riscos Processo decisório Segurança da informação |
Issue Date: | 21-Sep-2021 |
Publisher: | IEEE |
Citation: | MOREIRA, Fernando Rocha et al. Evaluating the performance of NIST’s framework cybersecurity controls through a constructivist multicriteria methodology. IEEE Access, v. 9, p. 129605-129618, 2021. DOI: 10.1109/ACCESS.2021.3113178. Disponível em: https://ieeexplore.ieee.org/document/9540950. Acesso em: 12 maio 2022. |
Abstract: | This paper aims to show how creating a risk plan can be solved with the help of the constructivist multicriteria method. A case study using Multicriteria Decision Aid Constructivist (MCDA-C) was applied, with cybersecurity framework’s controls as a reference. The study was conducted in a large Brazilian bank in Brazil. The relevance of this work is the need to show that the application of multicriteria methods can be applied in the context of information security, which recommends the use of such methods to assist in risk analysis. The methodology used in this study was both quantitative and qualitative, obtaining primary data through brainstorming with decision-makers and forms answered by experts. The secondary data were obtained through the Framework for Improving Critical Infrastructure Cybersecurity, created by NIST - the National Institute of Standards and Technology of the United States. The problem was structured according to the constructivist method, and the data collected were processed and calculated. The study concluded that the category of Security Continuous Monitoring controls stood out compared to other categories. It also shows the importance of applying the constructivist method for the management of cyber risks by unravelling a problem and providing a basis for decision making. Our work contributes to a better understanding of risk management, encouraging the adoption of the constructivist method as a form of risk management best practice. |
Licença:: | This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/ |
DOI: | 10.1109/ACCESS.2021.3113178 |
Appears in Collections: | Artigos publicados em periódicos e afins |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.