Hyppää sisältöön
    • Suomeksi
    • In English
Trepo
  • Suomeksi
  • In English
  • Kirjaudu
Näytä viite 
  •   Etusivu
  • Trepo
  • Opinnäytteet - ylempi korkeakoulututkinto
  • Näytä viite
  •   Etusivu
  • Trepo
  • Opinnäytteet - ylempi korkeakoulututkinto
  • Näytä viite
JavaScript is disabled for your browser. Some features of this site may not work without it.

A Comparative and Effectiveness Analysis of International and Regional Information Security Standards, Frameworks, and Legislation

Mirza, Muhammad Zubair (2025)

 
Avaa tiedosto
MirzaMuhammadZubair.pdf (553.3Kt)
Appendix_A_Comparative_Matrix.pdf (302.1Kt)
Appendix_B_Criticality_Survey.pdf (79.05Kt)
Appendix_B_Effectiveness_Survey.pdf (79.56Kt)
Cyber Security Controls Effectiveness Analysis(1-11).pdf (356.0Kt)
Effectiveness Survey Response Data_PDFA.pdf (268.5Kt)
Criticality Survey Response Data.pdf (749.6Kt)
Lataukset: 



Mirza, Muhammad Zubair
2025

Tietotekniikan DI-ohjelma - Master's Programme in Information Technology
Informaatioteknologian ja viestinnän tiedekunta - Faculty of Information Technology and Communication Sciences
Hyväksymispäivämäärä
2025-12-18
Näytä kaikki kuvailutiedot
Julkaisun pysyvä osoite on
https://urn.fi/URN:NBN:fi:tuni-2025121711829
Tiivistelmä
The escalation of cyber threats has been growing at an unprecedented pace, and that has caused a corresponding increase in the field of information security. Information security has, therefore, been increasingly acknowledged as a strategic priority of both enterprises and regulatory bodies alike, all across the globe. Over the last decade, an increasing number of international and regional standards, frameworks, and legislation instruments have been issued to provide guidance for securing information and technological resources. Nevertheless, these documents vary greatly in scope, emphasis, and granularity of their implementation requirements. This thesis takes on the task of conducting a systematic inquiry into the extent to which these standards, frameworks, and statutes are coherent and where they are not, and to what extent they accomplish their intended protective outcomes in operational settings.

A mixed-methods research design was used, consisting of two phases with a time gap. The first phase was a criticality assessment aimed at identifying information security sub-domains that security practitioners consider to be of "Extremely" or "Highly" critical importance to maintaining a strong security posture. The following phase aimed to investigate the implementation maturity and effectiveness of the identified critical sub-domains using a CMMI-based maturity model. Data were gathered using structured survey instruments that were distributed to information security professionals in a range of diverse sectors and geographical locations.

Preliminary empirical results indicate that some areas are considered extremely and highly critical: cybersecurity strategy, risk management, incident response, data and information protection, business continuity management, and third-party cyber risk. The subsequent assessment of maturity provides an insight into the degree of implementation of these domains according to different standards, frameworks, and legislation, and hence reveals the differential efficacy of the current protective measures
Kokoelmat
  • Opinnäytteet - ylempi korkeakoulututkinto [42034]
Kalevantie 5
PL 617
33014 Tampereen yliopisto
oa[@]tuni.fi | Tietosuoja | Saavutettavuusseloste
 

 

Selaa kokoelmaa

TekijätNimekkeetTiedekunta (2019 -)Tiedekunta (- 2018)Tutkinto-ohjelmat ja opintosuunnatAvainsanatJulkaisuajatKokoelmat

Omat tiedot

Kirjaudu sisäänRekisteröidy
Kalevantie 5
PL 617
33014 Tampereen yliopisto
oa[@]tuni.fi | Tietosuoja | Saavutettavuusseloste