Cybersecurity-Framework (CSF) -based Conformance Checking Techniques and Tools
碩士 === 元智大學 === 資訊工程學系 === 105 === Cybersecurity is critical for governments, sectors, and enterprises. Thus, US NIST published “Cybersecurity Framework, CSF” as a baseline to help improve the cybersecurity risk management for these organizations. Moreover, President Trump signed cybersecurity execu...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2017
|
Online Access: | http://ndltd.ncl.edu.tw/handle/04491641738524082914 |
id |
ndltd-TW-105YZU05392043 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-105YZU053920432017-09-19T04:29:39Z http://ndltd.ncl.edu.tw/handle/04491641738524082914 Cybersecurity-Framework (CSF) -based Conformance Checking Techniques and Tools 網絡安全架構CSF為基礎之法規符合性檢查技術及工具 Chien-Ting Lin 林建廷 碩士 元智大學 資訊工程學系 105 Cybersecurity is critical for governments, sectors, and enterprises. Thus, US NIST published “Cybersecurity Framework, CSF” as a baseline to help improve the cybersecurity risk management for these organizations. Moreover, President Trump signed cybersecurity executive order on May 11, 2017 to require all federal agencies to adopt CSF. Thus, how to comply with CSF is becoming an important issue. However, CSF activities are detailed and not easy to follow. Furthermore, there are no clear relations between CSF tiers and core activities. Although it is not necessary to have 1-to-1 relation between tiers and core activities, a certain degree of relation makes it easier to adopt CSF. Thus, this thesis studies the methods to relate CSF tiers and core activities, as well as develops a computer-aided CSF conformance checking tool set. In relating CSF core activities with CSF tiers, we use the mapping results of C2M2 in connecting CSF tiers with C2M2, a cybersecurity maturity model of US energy department. Besides, we add extra core activities from mapping results of DHS’s CRR Q&A set with CSF. In the computer-aided tool, we first design a CSF ontology and present it in a tree view; the tool set provides such functions as CSF query, document markup, review, Q&A review, quantitative adjustment, self-assessment, and visual presentation of the resulting profile. The proposed techniques and conformance checking tools developed by our research enhance the effectiveness, objectiveness, transparency, and repeatability in the process of adopting CSF. Chin-Feng Fan 范金鳳 2017 學位論文 ; thesis 79 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 元智大學 === 資訊工程學系 === 105 === Cybersecurity is critical for governments, sectors, and enterprises. Thus, US NIST published “Cybersecurity Framework, CSF” as a baseline to help improve the cybersecurity risk management for these organizations. Moreover, President Trump signed cybersecurity executive order on May 11, 2017 to require all federal agencies to adopt CSF. Thus, how to comply with CSF is becoming an important issue. However, CSF activities are detailed and not easy to follow. Furthermore, there are no clear relations between CSF tiers and core activities. Although it is not necessary to have 1-to-1 relation between tiers and core activities, a certain degree of relation makes it easier to adopt CSF. Thus, this thesis studies the methods to relate CSF tiers and core activities, as well as develops a computer-aided CSF conformance checking tool set.
In relating CSF core activities with CSF tiers, we use the mapping results of C2M2 in connecting CSF tiers with C2M2, a cybersecurity maturity model of US energy department. Besides, we add extra core activities from mapping results of DHS’s CRR Q&A set with CSF. In the computer-aided tool, we first design a CSF ontology and present it in a tree view; the tool set provides such functions as CSF query, document markup, review, Q&A review, quantitative adjustment, self-assessment, and visual presentation of the resulting profile. The proposed techniques and conformance checking tools developed by our research enhance the effectiveness, objectiveness, transparency, and repeatability in the process of adopting CSF.
|
author2 |
Chin-Feng Fan |
author_facet |
Chin-Feng Fan Chien-Ting Lin 林建廷 |
author |
Chien-Ting Lin 林建廷 |
spellingShingle |
Chien-Ting Lin 林建廷 Cybersecurity-Framework (CSF) -based Conformance Checking Techniques and Tools |
author_sort |
Chien-Ting Lin |
title |
Cybersecurity-Framework (CSF) -based Conformance Checking Techniques and Tools |
title_short |
Cybersecurity-Framework (CSF) -based Conformance Checking Techniques and Tools |
title_full |
Cybersecurity-Framework (CSF) -based Conformance Checking Techniques and Tools |
title_fullStr |
Cybersecurity-Framework (CSF) -based Conformance Checking Techniques and Tools |
title_full_unstemmed |
Cybersecurity-Framework (CSF) -based Conformance Checking Techniques and Tools |
title_sort |
cybersecurity-framework (csf) -based conformance checking techniques and tools |
publishDate |
2017 |
url |
http://ndltd.ncl.edu.tw/handle/04491641738524082914 |
work_keys_str_mv |
AT chientinglin cybersecurityframeworkcsfbasedconformancecheckingtechniquesandtools AT línjiàntíng cybersecurityframeworkcsfbasedconformancecheckingtechniquesandtools AT chientinglin wǎngluòānquánjiàgòucsfwèijīchǔzhīfǎguīfúhéxìngjiǎnchájìshùjígōngjù AT línjiàntíng wǎngluòānquánjiàgòucsfwèijīchǔzhīfǎguīfúhéxìngjiǎnchájìshùjígōngjù |
_version_ |
1718538370127233024 |