2017
DOI: 10.1002/cpe.4289
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity compliance analysis as a service: Requirements specification and application scenarios

Abstract: Summary Cybersecurity compliance analysis is the process of assessing whether the behavior of an IT system or application conforms to the cybersecurity rules and regulations in force. This assessment can be offered as a service by exploiting available cloud technologies, and, indeed, it is one of the services classified by the Cloud Security Alliance (CSA) as part of the security information and event management (SIEM) category of the SecaaS (security as a service) domain. The definition and implementation of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 37 publications
0
2
0
Order By: Relevance
“…Unlike cybersecurity compliance analysis, which is methodologically structured (Furfaro et al, 2018), human compliance of cybersecurity polices is cognitive-based and depend on a range of behavioural factors. Vulnerabilities are multiplying too, thanks to increasingly interconnected people and businesses, as well as the expanding "Internet of Things" (Susskind, 2014).…”
Section: Discussionmentioning
confidence: 99%
“…Unlike cybersecurity compliance analysis, which is methodologically structured (Furfaro et al, 2018), human compliance of cybersecurity polices is cognitive-based and depend on a range of behavioural factors. Vulnerabilities are multiplying too, thanks to increasingly interconnected people and businesses, as well as the expanding "Internet of Things" (Susskind, 2014).…”
Section: Discussionmentioning
confidence: 99%
“…Privacy and security in cloud computing are among the most important issues that still need to be addressed especially for emerging IoT and big data applications. As a contribution in this field, Furfaro et al, in their article “ Cybersecurity Compliance Analysis as a Service: Requirements Specification and Application Scenarios ,” highlighted some specific requirements, which have to be taken into account when modeling a cloud service for cybersecurity compliance analysis (CCA). They have mainly adopted recently proposed requirements methodology, called GOReM (goal‐oriented requirements methodology), to support the conceptualization and subsequent implementation of CCA services.…”
Section: Themes Of This Special Issuementioning
confidence: 99%