Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
110 tokens/sec
GPT-4o
56 tokens/sec
Gemini 2.5 Pro Pro
44 tokens/sec
o3 Pro
6 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

How Do Organizations Seek Cyber Assurance? Investigations on the Adoption of the Common Criteria and Beyond (2203.01526v2)

Published 3 Mar 2022 in cs.CR

Abstract: Cyber assurance, which is the ability to operate under the onslaught of cyber attacks and other unexpected events, is essential for organizations facing inundating security threats on a daily basis. Organizations usually employ multiple strategies to conduct risk management to achieve cyber assurance. Utilizing cybersecurity standards and certifications can provide guidance for vendors to design and manufacture secure Information and Communication Technology (ICT) products as well as provide a level of assurance of the security functionality of the products for consumers. Hence, employing security standards and certifications is an effective strategy for risk management and cyber assurance. In this work, we begin with investigating the adoption of cybersecurity standards and certifications by surveying 258 participants from organizations across various countries and sectors. Specifically, we identify adoption barriers of the Common Criteria through the designed questionnaire. Taking into account the seven identified adoption barriers, we show the recommendations for promoting cybersecurity standards and certifications. Moreover, beyond cybersecurity standards and certifications, we shed light on other risk management strategies devised by our participants, which provides directions on cybersecurity approaches for enhancing cyber assurance in organizations.

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (6)
  1. Nan Sun (19 papers)
  2. Chang-Tsun Li (22 papers)
  3. Hin Chan (2 papers)
  4. Md Rafiqul Islam (19 papers)
  5. Warren Armstrong (4 papers)
  6. MD Zahidul Islam (32 papers)
Citations (8)

Summary

We haven't generated a summary for this paper yet.