The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Incorporating Other Models and Technology Into the CCSMM
Abstract
One thing about the nature of computer science in general and cybersecurity in particular is that they are both fields that are constantly changing. Whether it is because of a new version of an operating system being released, new technology that has been introduced, or a disclosure of a newly discovered vulnerability, the field is continually changing. Some changes will not have any impact on the CCSMM. Others may necessitate a change in some aspect at one or more levels. The model itself is extremely flexible and frequently does not specify the precise items that need to be covered but rather the more abstract concept that must be considered. This is true for not just changes in technology but also the introduction of new government guidance or regulations as well as the creation of other maturity models that are focused on some other aspect of cybersecurity. This chapter explores incorporating other models and technology into the CCSMM.
Related Content
Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini.
© 2024.
14 pages.
|
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim.
© 2024.
30 pages.
|
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan.
© 2024.
19 pages.
|
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi.
© 2024.
14 pages.
|
Meryeme Bououchma, Brahim Herrou.
© 2024.
14 pages.
|
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim.
© 2024.
16 pages.
|
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly.
© 2024.
10 pages.
|
|
|