Campo DC | Valor | Idioma |
dc.contributor.author | Moreira, Fernando Rocha | - |
dc.contributor.author | Silva Filho, Demétrio Antônio da | - |
dc.contributor.author | Amvame-Nze, Georges Daniel | - |
dc.contributor.author | Sousa Júnior, Rafael Timóteo de | - |
dc.contributor.author | Nunes, Rafael Rabelo | - |
dc.date.accessioned | 2022-05-12T15:06:56Z | - |
dc.date.available | 2022-05-12T15:06:56Z | - |
dc.date.issued | 2021-09-21 | - |
dc.identifier.citation | MOREIRA, Fernando Rocha et al. Evaluating the performance of NIST’s framework cybersecurity controls through a constructivist multicriteria methodology. IEEE Access, v. 9, p. 129605-129618, 2021. DOI: 10.1109/ACCESS.2021.3113178. Disponível em: https://ieeexplore.ieee.org/document/9540950. Acesso em: 12 maio 2022. | pt_BR |
dc.identifier.uri | https://repositorio.unb.br/handle/10482/43687 | - |
dc.language.iso | Inglês | pt_BR |
dc.publisher | IEEE | pt_BR |
dc.rights | Acesso Aberto | pt_BR |
dc.title | Evaluating the performance of NIST’s framework cybersecurity controls through a constructivist multicriteria methodology | pt_BR |
dc.type | Artigo | pt_BR |
dc.subject.keyword | Segurança de dados | pt_BR |
dc.subject.keyword | Gestão de riscos | pt_BR |
dc.subject.keyword | Processo decisório | pt_BR |
dc.subject.keyword | Segurança da informação | pt_BR |
dc.rights.license | This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/ | pt_BR |
dc.identifier.doi | 10.1109/ACCESS.2021.3113178 | pt_BR |
dc.description.abstract1 | This paper aims to show how creating a risk plan can be solved with the help of the constructivist multicriteria method. A case study using Multicriteria Decision Aid Constructivist (MCDA-C) was applied, with cybersecurity framework’s controls as a reference. The study was conducted in a large Brazilian bank in Brazil. The relevance of this work is the need to show that the application of multicriteria methods can be applied in the context of information security, which recommends the use of such methods to assist in risk analysis. The methodology used in this study was both quantitative and qualitative, obtaining primary data through brainstorming with decision-makers and forms answered by experts. The secondary data were obtained through the Framework for Improving Critical Infrastructure Cybersecurity, created by NIST - the National Institute of Standards and Technology of the United States. The problem was structured according to the constructivist method, and the data collected were processed and calculated. The study concluded that the category of Security Continuous Monitoring controls stood
out compared to other categories. It also shows the importance of applying the constructivist method for the management of cyber risks by unravelling a problem and providing a basis for decision making. Our work contributes to a better understanding of risk management, encouraging the adoption of the constructivist method as a form of risk management best practice. | pt_BR |
dc.identifier.orcid | https://orcid.org/ 0000-0003-3100-7128 | pt_BR |
dc.identifier.orcid | https://orcid.org/ 0000-0002-7103-4780 | pt_BR |
dc.identifier.orcid | https://orcid.org/ 0000-0001-5271-5540 | pt_BR |
dc.identifier.orcid | https://orcid.org/ 0000-0003-1101-3029 | pt_BR |
dc.identifier.orcid | https://orcid.org/ 0000-0002-1538-4276 | pt_BR |
Aparece nas coleções: | Artigos publicados em periódicos e afins
|