SciELO - Scientific Electronic Library Online

 
vol.9 número1Posicionamiento en espacios interiores con Android, Bluetooth y RSSIAcometer contra un ERP con Software Libre índice de autoresíndice de materiabúsqueda de artículos
Home Pagelista alfabética de revistas  

Servicios Personalizados

Revista

Articulo

Indicadores

Links relacionados

  • No hay articulos similaresSimilares en SciELO

Compartir


Enfoque UTE

versión On-line ISSN 1390-6542versión impresa ISSN 1390-9363

Resumen

SABILLON, Regner. A Practical Model to Perform Comprehensive Cybersecurity Audits. Enfoque UTE [online]. 2018, vol.9, n.1, pp.127-137. ISSN 1390-6542.  https://doi.org/10.29019/enfoqueute.v9n1.214.

These days organizations are continually facing being targets of cyberattacks and cyberthreats; the sophistication and complexity of modern cyberattacks and the modus operandi of cybercriminals including Techniques, Tactics and Procedures (TTP) keep growing at unprecedented rates. Cybercriminals are always adopting new strategies to plan and launch cyberattacks based on existing cybersecurity vulnerabilities and exploiting end users by using social engineering techniques. Cybersecurity audits are extremely important to verify that information security controls are in place and to detect weaknesses of inexistent cybersecurity or obsolete controls. This article presents an innovative and comprehensive cybersecurity audit model. The CyberSecurity Audit Model (CSAM) can be implemented to perform internal or external cybersecurity audits. This model can be used to perform single cybersecurity audits or can be part of any corporate audit program to improve cybersecurity controls. Any information security or cybersecurity audit team has either the options to perform a full audit for all cybersecurity domains or by selecting specific domains to audit certain areas that need control verification and hardening. The CSAM has 18 domains; Domain 1 is specific for Nation States and Domains 2-18 can be implemented at any organization. The organization can be any small, medium or large enterprise, the model is also applicable to any Non-Profit Organization (NPO).

Palabras clave : cybersecurity; cybersecurity audit; cybersecurity audit model; cybersecurity assurance; cybersecurity controls..

        · resumen en Español     · texto en Inglés     · Inglés ( pdf )