Review of Cybersecurity Audit Management and Execution Approaches

Khairun Nisyak Zakaria, S. H. Othman, A. Zainal
{"title":"Review of Cybersecurity Audit Management and Execution Approaches","authors":"Khairun Nisyak Zakaria, S. H. Othman, A. Zainal","doi":"10.1109/ICRIIS48246.2019.9073641","DOIUrl":null,"url":null,"abstract":"The management and execution of good cybersecurity audits help organizations to strengthen their cybersecurity operations by detecting and mitigating cyberattacks and threats from attacking and destroying organizational assets based on the result of audit findings. However, the objectives of this audit cannot be fully achieved because of the various problems prevalent in audit management and execution. This paper aims to review issues that motivate the research of cybersecurity audit and the approaches to manage and execute it. Previous works in this area of interest are discussed by classifying and analyzing the current approaches. Models, scopes, strengths and limitations are studied and the most effective and accurate synthesis that can improve the quality of cybersecurity audits is highlighted. Various approaches to manage and execute cybersecurity audit with their objectives and advantages are classified. From this literature review, it is clear that cybersecurity audits can be improved by addressing the highlighted issues and create a well-rounded approach to improve the management and execution of auditing. Timeliness, accuracy and measurement in regards of cybersecurity auditing are not included in this review and shall be discussed in future study as they have significant impact on the audits.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICRIIS48246.2019.9073641","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

The management and execution of good cybersecurity audits help organizations to strengthen their cybersecurity operations by detecting and mitigating cyberattacks and threats from attacking and destroying organizational assets based on the result of audit findings. However, the objectives of this audit cannot be fully achieved because of the various problems prevalent in audit management and execution. This paper aims to review issues that motivate the research of cybersecurity audit and the approaches to manage and execute it. Previous works in this area of interest are discussed by classifying and analyzing the current approaches. Models, scopes, strengths and limitations are studied and the most effective and accurate synthesis that can improve the quality of cybersecurity audits is highlighted. Various approaches to manage and execute cybersecurity audit with their objectives and advantages are classified. From this literature review, it is clear that cybersecurity audits can be improved by addressing the highlighted issues and create a well-rounded approach to improve the management and execution of auditing. Timeliness, accuracy and measurement in regards of cybersecurity auditing are not included in this review and shall be discussed in future study as they have significant impact on the audits.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
网络安全审计管理和执行方法综述
良好的网络安全审计的管理和执行,可以根据审计发现的结果,通过检测和减轻网络攻击以及攻击和破坏组织资产的威胁,帮助组织加强网络安全运营。然而,由于审计管理和执行中普遍存在的各种问题,本次审计的目标不能完全实现。本文旨在回顾激励网络安全审计研究的问题以及管理和执行网络安全审计的方法。通过分类和分析当前的方法,讨论了该领域以前的工作。研究了模型、范围、优势和局限性,并强调了可以提高网络安全审计质量的最有效和最准确的综合。对管理和执行网络安全审计的各种方法及其目标和优势进行了分类。从这篇文献综述中,很明显,通过解决突出的问题,并创建一个全面的方法来改进审计的管理和执行,可以改进网络安全审计。网络安全审计的及时性、准确性和度量不包括在本次审查中,由于它们对审计有重大影响,应在未来的研究中讨论。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Tacit Knowledge in Software Testing: A Systematic Review A Review of Success/Failure Factors Influencing Healthcare Personnel for Telerehabilitation Augmented Reality Mobile Application for Museum: A Technology Acceptance Study Internet of Things-based Smart Facilities Management Services Successful Implementation Instrument Development, Validity, and Reliability GrouPro: Developing a Group-Formation System to Support Collaborative Learning in Group Projects
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1