Review of Cybersecurity Assessment Methods: Applicability Perspective - Publication - Bridge of Knowledge

Search

Review of Cybersecurity Assessment Methods: Applicability Perspective

Abstract

Cybersecurity assessments are crucial in building the assurance that vital cyberassets are effectively protected from threats. Multiple assessment methods have been proposed during the decades of the cybersecurity field. However, a systematic literature search described in this paper reveals that their reviews are practically missing. Thus, the primary objective of this research was to fulfil this gap by comprehensively identifying and analysing cybersecurity assessment methods described in the scientific literature. A structured research method and transparent criteria were applied for this purpose. As a result, thirty-two methods are presented in this paper. Particular attention is paid to the question of the methods’ applicability in realistic contexts and environments. In that regard, the challenges and limitations associated with the methods’ application as well as potential approaches to addressing them have been indicated. Besides, the paper systematises the terminology and indicates complementary studies which can be helpful during assessments. Finally, the areas that leave space for improvement and directions for further research and development are indicated. The intention is to support researchers and practitioners in choosing the method to be applied in their assessments and to indicate the areas that can be further explored.

Citations

  • 3 1

    CrossRef

  • 0

    Web of Science

  • 3 5

    Scopus

Cite as

Full text

download paper
downloaded 354 times
Publication version
Accepted or Published Version
License
Creative Commons: CC-BY-NC-ND open in new tab

Keywords

Details

Category:
Articles
Type:
artykuły w czasopismach
Published in:
COMPUTERS & SECURITY no. 108,
ISSN: 0167-4048
Language:
English
Publication year:
2021
Bibliographic description:
Leszczyna R.: Review of Cybersecurity Assessment Methods: Applicability Perspective// COMPUTERS & SECURITY -Vol. 108, (2021), s.102376-
DOI:
Digital Object Identifier (open in new tab) 10.1016/j.cose.2021.102376
Verified by:
Gdańsk University of Technology

seen 132 times

Recommended for you

Meta Tags