عنوان مقاله [English]
the need for a cyber security maturity model of telecom operators will be inevitable. In this regard, Firstly, 350 indicators were extracted from about 100 theoretical literatures. Secondly, all components of 17 security maturity models like: C2M2, CySAFE, COBIT-IS, Forrester, etc were studied and 16 common components of those are ranked.The 350 extracted indicators were then mapped in the 16 components. About 40 indicators were not included in these components. So 5 new components (as innovation of proposed model), were added and the remaining 40 indicators located in those, as follows: Architecture and process, emerging technologies, stakeholder management, life cycle management, uncertainty.
Thirdly, 4 widely used security maturity models in ICT businesses were selected. Then, component / indicators of the proposed maturity model were mapped on the 4 selected models to be sure the correspondence of each of the components/ indicators of the proposed model with 4 selected maturity models ones. In addition, by reviewing the theoretical literature and field and library studies, 4 dimensions include: human, process, technology, and data, and 5 maturity levels were selected for proposed model. Finally, a total of 4 dimensions, 18 components, 99 indicators, and 5 maturity levels were obtained as proposed model.
فهرست منابع و مآخذ