4.7 Article

Cybersecurity Standards in the Context of Operating System: Practical Aspects, Analysis, and Comparisons

期刊

ACM COMPUTING SURVEYS
卷 54, 期 3, 页码 -

出版社

ASSOC COMPUTING MACHINERY
DOI: 10.1145/3442480

关键词

Cybersecurity; security standards; OS vulnerabilities; NIST; FIPS; CC; ISO

资金

  1. Higher Education Commission (HEC), Pakistan through its initiative of National Center for Cyber Security for the affiliated lab National Cyber Security Auditing and Evaluation Lab (NCSAEL) [2(1078)/HEC/ME/2018/707]

向作者/读者索取更多资源

In recent years, there has been a significant increase in cyber threats, highlighting the need to strengthen digital infrastructure security. This article presents a detailed analysis of various cybersecurity standards and provides a comparison of frameworks, tools, and software for OS compliance testing. It also explores common software solutions that ensure compliance with cybersecurity standards. The article concludes by proposing a comprehensive set of minimum requirements for OS hardening based on the considered cybersecurity standards and discussing open research challenges.
Cyber threats have been growing tremendously in recent years. There are significant advancements in the threat space that have led towards an essential need for the strengthening of digital infrastructure security. Better security can be achieved by fine-tuning system parameters to the best and optimized security levels. For the protection of infrastructure and information systems, several guidelines have been provided by wellknown organizations in the form of cybersecurity standards. Since security vulnerabilities incur a very high degree of financial, reputational, informational, and organizational security compromise, it is imperative that a baseline for standard compliance be established. The selection of security standards and extracting requirements from those standards in an organizational context is a tedious task. This article presents a detailed literature review, a comprehensive analysis of various cybersecurity standards, and statistics of cyber-attacks related to operating systems (OS). In addition to that, an explicit comparison between the frameworks, tools, and software available for OS compliance testing is provided. An in-depth analysis of the most common software solutions ensuring compliance with certain cybersecurity standards is also presented. Finally, based on the cybersecurity standards under consideration, a comprehensive set of minimum requirements is proposed for OS hardening and a few open research challenges are discussed.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据