{"title":"The Community Cybersecurity Maturity Model (CCSMM)","authors":"","doi":"10.4018/978-1-7998-4471-6.ch001","DOIUrl":"https://doi.org/10.4018/978-1-7998-4471-6.ch001","url":null,"abstract":"Lessons learned from the community cyber security exercises showed common threads each community needed to focus on in order to improve the community's cyber security posture. These similarities were grouped into four areas of improvement called dimensions. The dimensions are awareness, information sharing, policies, and planning. The methods in which communities can implement improvement are called implementation mechanisms. These mechanisms are common approaches used every day such as establishing metrics, implementing technologies, creating processes and procedures, and conducting training and assessments.","PeriodicalId":360441,"journal":{"name":"Establishing Cyber Security Programs Through the Community Cyber Security Maturity Model (CCSMM)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116268710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Incorporating Other Models and Technology Into the CCSMM","authors":"","doi":"10.4018/978-1-7998-4471-6.ch010","DOIUrl":"https://doi.org/10.4018/978-1-7998-4471-6.ch010","url":null,"abstract":"One thing about the nature of computer science in general and cybersecurity in particular is that they are both fields that are constantly changing. Whether it is because of a new version of an operating system being released, new technology that has been introduced, or a disclosure of a newly discovered vulnerability, the field is continually changing. Some changes will not have any impact on the CCSMM. Others may necessitate a change in some aspect at one or more levels. The model itself is extremely flexible and frequently does not specify the precise items that need to be covered but rather the more abstract concept that must be considered. This is true for not just changes in technology but also the introduction of new government guidance or regulations as well as the creation of other maturity models that are focused on some other aspect of cybersecurity. This chapter explores incorporating other models and technology into the CCSMM.","PeriodicalId":360441,"journal":{"name":"Establishing Cyber Security Programs Through the Community Cyber Security Maturity Model (CCSMM)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128259311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Building Your Community Cybersecurity Program","authors":"","doi":"10.4018/978-1-7998-4471-6.ch009","DOIUrl":"https://doi.org/10.4018/978-1-7998-4471-6.ch009","url":null,"abstract":"Communities and states are targets of cyber-attacks. Cities are popular because of generally lax cybersecurity postures and the fact that they have money. States and communities also have personal information on citizens, which can be used for identity theft. With the realization they are becoming frequent targets, communities are looking to enhance their cybersecurity programs, but many do not know where or how to start. The community cyber security maturity model is designed for this purpose – to help states and communities to develop their own viable and sustainable cybersecurity programs. There has also been considerable media attention on the NIST Cyber Security Framework. This is a program designed for organizations, and it contains a lot of good information organizations can use to enhance their cybersecurity posture. From a whole community perspective, however, it is not as useful though there are parts of it that are applicable to a community.","PeriodicalId":360441,"journal":{"name":"Establishing Cyber Security Programs Through the Community Cyber Security Maturity Model (CCSMM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128983265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The NIST Cybersecurity Framework","authors":"G. White, Natalie Sjelin","doi":"10.4018/978-1-7998-4471-6.ch008","DOIUrl":"https://doi.org/10.4018/978-1-7998-4471-6.ch008","url":null,"abstract":"With the increase in cybercrimes over the last few years, a growing realization for the need for cybersecurity has begun to be recognized by the nation. Unfortunately, being aware that cybersecurity is something you need to worry about and knowing what steps to take are two different things entirely. In the United States, the National Institute of Standards and Technology (NIST) developed the Cyber Security Framework (CSF) to assist critical infrastructures in determining what they need in order to secure their computer systems and networks. While aimed at organizations, much of the guidance provided by the CSF, especially the basic functions it identifies, are also valuable for communities attempting to put together a community cybersecurity program.","PeriodicalId":360441,"journal":{"name":"Establishing Cyber Security Programs Through the Community Cyber Security Maturity Model (CCSMM)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121207415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Three-Dimensional Model for a Community","authors":"G. White, Natalie Sjelin","doi":"10.4018/978-1-7998-4471-6.ch003","DOIUrl":"https://doi.org/10.4018/978-1-7998-4471-6.ch003","url":null,"abstract":"The community cyber security maturity model (CCSMM) was designed and developed to provide communities with an action plan to build a viable and sustainable cybersecurity program focused on improving their overall cybersecurity capability. Not long after the initial development of the model, it was realized that there are intertwined relationships that needed to be addressed. This drove the creation of the three-dimensional model broadening the scope to include individuals, organizations, communities, states, and the nation. This chapter will provide an overview of the development and importance of the 3-D model and will describe the scope areas that were included.","PeriodicalId":360441,"journal":{"name":"Establishing Cyber Security Programs Through the Community Cyber Security Maturity Model (CCSMM)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123812367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Two-Dimensional CCSMM","authors":"G. White, Natalie Sjelin","doi":"10.4018/978-1-7998-4471-6.ch002","DOIUrl":"https://doi.org/10.4018/978-1-7998-4471-6.ch002","url":null,"abstract":"The community cyber security maturity model (CCSMM) defines four dimensions and five implementation mechanisms in describing the relative maturity of an organization or an SLTT's cybersecurity program. These are used in defining levels of maturity and the cybersecurity characteristics of an organization or SLTT at each level. In order to progress from one level to the next, a variety of activities should take place, and these are defined in terms of five different mechanisms. In between two levels are a variety of activities that should take place to help the entity to advance from one level to the next. These groups of activities describe four phases, each of which takes place between two levels. Thus, Phase 1 defines the activities that should occur for an entity to advance from Level 1 to Level 2.","PeriodicalId":360441,"journal":{"name":"Establishing Cyber Security Programs Through the Community Cyber Security Maturity Model (CCSMM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133447804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}