Solo Metadatos

A comprehensive cybersecurity audit model to improve cybersecurity assurance: The cybersecurity audit model (CSAM)

Título de la revista
Sabillon R.
Serra-Ruiz J.
Cavaller V.
Cano J.



ISSN de la revista
Título del volumen
Institute of Electrical and Electronics Engineers Inc.


Métricas alternativas

Nowadays, private corporations and public institutions are dealing with constant and sophisticated cyberthreats and cyberattacks. As a general warning, organizations must build and develop a cybersecurity culture and awareness in order to defend against cybercriminals. Information Technology (IT) and Information Security (InfoSec) audits that were efficient in the past, are trying to converge into cybersecurity audits to address cyber threats, cyber risks and cyberattacks that evolve in an aggressive cyber landscape. However, the increase in number and complexity of cyberattacks and the convoluted cyberthreat landscape is challenging the running cybersecurity audit models and putting in evidence the critical need for a new cybersecurity audit model. This article reviews the best practices and methodologies of global leaders in the cybersecurity assurance and audit arena. By means of the analysis of the current approaches and theoretical background, their real scope, strengths and weaknesses are highlighted looking forward a most efficient and cohesive synthesis. As a resut, this article presents an original and comprehensive cybersecurity audit model as a proposal to be utilized for conducting cybersecurity audits in organizations and Nation States. The CyberSecurity Audit Model (CSAM) evaluates and validates audit, preventive, forensic and detective controls for all organizational functional areas. CSAM has been tested, implemented and validated along with the Cybersecurity Awareness TRAining Model (CATRAM) in a Canadian higher education institution. A research case study is being conducted to validate both models and the findings will be published accordingly. © 2017 IEEE.
Palabras clave
Information use , Network security , Audit models , Cyber security , Cybercriminals , Functional areas , Higher education institutions , Private corporation , Public institution , Training model , Information systems , Cybersecurity , Cybersecurity assurance , Cybersecurity audit , Cybersecurity audit model , Cybersecurity controls , Cybersecurity domains