Skip navigation
Please use this identifier to cite or link to this item: http://repositorio2.unb.br/jspui/handle/10482/43687
Files in This Item:
File Description SizeFormat 
ARTIGO_EvaluatingPerformanceNISTs.pdf6,87 MBAdobe PDFView/Open
Title: Evaluating the performance of NIST’s framework cybersecurity controls through a constructivist multicriteria methodology
Authors: Moreira, Fernando Rocha
Silva Filho, Demétrio Antônio da
Amvame-Nze, Georges Daniel
Sousa Júnior, Rafael Timóteo de
Nunes, Rafael Rabelo
metadata.dc.identifier.orcid: https://orcid.org/ 0000-0003-3100-7128
https://orcid.org/ 0000-0002-7103-4780
https://orcid.org/ 0000-0001-5271-5540
https://orcid.org/ 0000-0003-1101-3029
https://orcid.org/ 0000-0002-1538-4276
Assunto:: Segurança de dados
Gestão de riscos
Processo decisório
Segurança da informação
Issue Date: 21-Sep-2021
Publisher: IEEE
Citation: MOREIRA, Fernando Rocha et al. Evaluating the performance of NIST’s framework cybersecurity controls through a constructivist multicriteria methodology. IEEE Access, v. 9, p. 129605-129618, 2021. DOI: 10.1109/ACCESS.2021.3113178. Disponível em: https://ieeexplore.ieee.org/document/9540950. Acesso em: 12 maio 2022.
Abstract: This paper aims to show how creating a risk plan can be solved with the help of the constructivist multicriteria method. A case study using Multicriteria Decision Aid Constructivist (MCDA-C) was applied, with cybersecurity framework’s controls as a reference. The study was conducted in a large Brazilian bank in Brazil. The relevance of this work is the need to show that the application of multicriteria methods can be applied in the context of information security, which recommends the use of such methods to assist in risk analysis. The methodology used in this study was both quantitative and qualitative, obtaining primary data through brainstorming with decision-makers and forms answered by experts. The secondary data were obtained through the Framework for Improving Critical Infrastructure Cybersecurity, created by NIST - the National Institute of Standards and Technology of the United States. The problem was structured according to the constructivist method, and the data collected were processed and calculated. The study concluded that the category of Security Continuous Monitoring controls stood out compared to other categories. It also shows the importance of applying the constructivist method for the management of cyber risks by unravelling a problem and providing a basis for decision making. Our work contributes to a better understanding of risk management, encouraging the adoption of the constructivist method as a form of risk management best practice.
Licença:: This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
DOI: 10.1109/ACCESS.2021.3113178
Appears in Collections:Artigos publicados em periódicos e afins

Show full item record " class="statisticsLink btn btn-primary" href="/jspui/handle/10482/43687/statistics">



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.