EconPapers    
Economics at your fingertips  
 

Leveraging Taxonomical Engineering for Security Baseline Compliance in International Regulatory Frameworks

Šarūnas Grigaliūnas (), Michael Schmidt, Rasa Brūzgienė, Panayiota Smyrli and Vladislav Bidikov
Additional contact information
Šarūnas Grigaliūnas: Department of Computer Sciences, Kaunas University of Technology, Studentu Str. 50, 51368 Kaunas, Lithuania
Michael Schmidt: Leibniz Supercomputing Centre, Boltzmann Str. 1, 85748 Garching, Germany
Rasa Brūzgienė: Department of Computer Sciences, Kaunas University of Technology, Studentu Str. 50, 51368 Kaunas, Lithuania
Panayiota Smyrli: Cyprus Research & Academic Network, 33 Neas Egkomis, Egkomi, Nicosia 2409, Cyprus
Vladislav Bidikov: Faculty of Computer Science and Engineering, Ss. Cyril and Methodius University in Skopje, “Rugjer Boshkovikj” 16, P.O. Box 393, 1000 Skopje, North Macedonia

Future Internet, 2023, vol. 15, issue 10, 1-37

Abstract: A surge in successful Information Security (IS) breaches targeting Research and Education (R&E) institutions highlights a pressing need for enhanced protection. Addressing this, a consortium of European National Research and Education Network (NREN) organizations has developed a unified IS framework. This paper aims to introduce the Security Baseline for NRENs and a security maturity model tailored for R&E entities, derived from established security best practices to meet the specific needs of NRENs, universities, and various research institutions. The models currently in existence do not possess a system to smoothly correlate varying requirement tiers with distinct user groups or scenarios, baseline standards, and existing legislative actions. This segmentation poses a significant hurdle to the community’s capacity to guarantee consistency, congruency, and thorough compliance with a cohesive array of security standards and regulations. By employing taxonomical engineering principles, a mapping of baseline requirements to other security frameworks and regulations has been established. This reveals a correlation across most regulations impacting R&E institutions and uncovers an overlap in the high-level requirements, which is beneficial for the implementation of multiple standards. Consequently, organizations can systematically compare diverse security requirements, pinpoint gaps in their strategy, and formulate a roadmap to bolster their security initiatives.

Keywords: information security management; security maturity model; research and education; taxonomy; security baseline (search for similar items in EconPapers)
JEL-codes: O3 (search for similar items in EconPapers)
Date: 2023
References: View complete reference list from CitEc
Citations:

Downloads: (external link)
https://www.mdpi.com/1999-5903/15/10/330/pdf (application/pdf)
https://www.mdpi.com/1999-5903/15/10/330/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jftint:v:15:y:2023:i:10:p:330-:d:1254900

Access Statistics for this article

Future Internet is currently edited by Ms. Grace You

More articles in Future Internet from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-03-19
Handle: RePEc:gam:jftint:v:15:y:2023:i:10:p:330-:d:1254900