Cybersecurity Assessment Methods—Why Aren't They Used?

Rafał Leszczyna
DOI: https://doi.org/10.1109/mitp.2024.3392415
2024-09-27
IT Professional
Abstract:A recent survey of cybersecurity assessment methods proposed in academic and research environments revealed that their adoption in operational settings was extremely scarce. At the same time, the frameworks developed by industrial communities have been met with broad reception. The question arises of what contributed to the success of the methods. To answer it, three-part research that employed evaluation criteria, qualitative metrics, and continuity of support assessment was conducted. Among other findings, it shows that the continuity of support plays an important role in the adoption of a method. This, in turn, is connected to a sound funding model and a well-developed and active community of supporters.
computer science, information systems,telecommunications, software engineering
What problem does this paper attempt to address?