Evaluating Cybersecurity Patch Management through QA Performance Indicators

Authors

  • Mojisola Aderonke Ojuri Quality assurance analyst and Cybersecurity analyst, Independent researcher, USA Author

DOI:

https://doi.org/10.21590/

Keywords:

Cybersecurity, Patch Management, Quality Assurance, QA Metrics, Vulnerability Management, System Reliability, Risk Mitigation

Abstract

Effective patch management is a cornerstone of modern cybersecurity, yet many organizations struggle to measure the success of their patching processes in a structured and objective manner. This research evaluates cybersecurity patch management through the lens of Quality Assurance (QA) performance indicators, providing a data-driven approach to assess and improve security posture. Key QA metrics, including patch success rate, mean time to deploy (MTTD), rollback frequency, and vulnerability exposure window, are analyzed to determine their impact on system reliability and risk mitigation. The study highlights how integrating QA principles into patch management enables continuous monitoring, early detection of process inefficiencies, and faster remediation of vulnerabilities. Findings suggest that a standardized set of QA-based indicators can help security teams optimize patch deployment strategies, reduce operational risk, and enhance compliance with cybersecurity frameworks. This approach provides a repeatable, measurable pathway to improving organizational resilience against evolving cyber threats.

References

1. Baskerville, R., & Vaishnavi, V. (2020). A Novel Approach to Collectively Determine Cybersecurity Performance Benchmark Data: Aiding Organizational Cybersecurity Assessment. In Design Science Research. Cases (pp. 17-41). Cham: Springer International Publishing. 2. Bodeau, D. J., Graubart, R. D., McQuaid, R. M., & Woodill, J. (2018). Cyber resiliency metrics, measures of effectiveness, and scoring: Enabling systems engineers and program managers to select the most useful assessment methods (No. MTR180314). 3. Sundararajan, A., Khan, T., Moghadasi, A., & Sarwat, A. I. (2019). Survey on synchrophasor data quality and cybersecurity challenges, and evaluation of their interdependencies. Journal of Modern Power Systems and Clean Energy, 7(3), 449-467. 4. Staheli, D., Yu, T., Crouser, R. J., Damodaran, S., Nam, K., O'Gwynn, D., ... & Harrison, L. (2014, November). Visualization evaluation for cyber security: Trends and future directions. In Proceedings of the Eleventh Workshop on Visualization for Cyber Security (pp. 49-56). 5. Matheu-García, S. N., Hernández-Ramos, J. L., Skarmeta, A. F., & Baldini, G. (2019). Risk-based automated assessment and testing for the cybersecurity certification and labelling of IoT devices. Computer Standards & Interfaces, 62, 64-83. 6. Luh, R., Temper, M., Tjoa, S., Schrittwieser, S., & Janicke, H. (2020). PenQuest: a gamified attacker/defender meta model for cyber security assessment and education. Journal of Computer Virology and Hacking Techniques, 16(1), 19-61. 7. Cheng, Y., Deng, J., Li, J., DeLoach, S. A., Singhal, A., & Ou, X. (2014). Metrics of security. In Cyber defense and situational awareness (pp. 263-295). Cham: Springer International Publishing. 8. Armstrong, M. E., Jones, K. S., Namin, A. S., & Newton, D. C. (2018, September). The knowledge, skills, and abilities used by penetration testers: Results of interviews with cybersecurity professionals in vulnerability assessment and management. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting (Vol. 62, No. 1, pp. 709-713). Sage CA: Los Angeles, CA: SAGE Publications. 9. Gasmi, H., Laval, J., & Bouras, A. (2019). Information extraction of cybersecurity concepts: An LSTM approach. Applied Sciences, 9(19), 3945. 10. Ani, U. D., He, H., & Tiwari, A. (2019). Human factor security: evaluating the cybersecurity capacity of the industrial workforce. Journal of Systems and Information Technology, 21(1), 2-35. 11. Krumay, B., Bernroider, E. W., & Walser, R. (2018). Evaluation of cybersecurity management controls and metrics of critical infrastructures: A literature review considering the NIST cybersecurity framework. In Nordic Conference on Secure IT Systems (pp. 369-384). Springer, Cham. 12. Sun, C. C., Cardenas, D. J. S., Hahn, A., & Liu, C. C. (2020). Intrusion detection for cybersecurity of smart meters. IEEE Transactions on Smart Grid, 12(1), 612-622. 13. Ahmed, Y., Naqvi, S., & Josephs, M. (2019, May). Cybersecurity metrics for enhanced protection of healthcare IT systems. In 2019 13th International Symposium on Medical Information and Communication Technology (ISMICT) (pp. 1-9). IEEE. 14. Joshua, Olatunde & Ovuchi, Blessing & Nkansah, Christopher & Akomolafe, Oluwabunmi & Adebayo, Ismail Akanmu & Godson, Osagwu & Clifford, Okotie. (2018). Optimizing Energy Efficiency in Industrial Processes: A Multi-Disciplinary Approach to Reducing Consumption in Manufacturing and Petroleum Operations across West Africa. 15. Nkansah, Christopher. (2021). Geomechanical Modeling and Wellbore Stability Analysis for Challenging Formations in the Tano Basin, Ghana. 16. Adebayo, Ismail Akanmu. (2022). ASSESSMENT OF PERFORMANCE OF FERROCENE NANOPARTICLE -HIBISCUS CANNABINUS BIODIESEL ADMIXED FUEL BLENDED WITH HYDROGEN IN DIRECT INJECTION (DI) ENGINE. Transactions of Tianjin University. 55. 10.5281/zenodo.16931428. 17. Adebayo, I. A., Olagunju, O. J., Nkansah, C., Akomolafe, O., Godson, O., Blessing, O., & Clifford, O. (2019). Water-Energy-Food Nexus in Sub-Saharan Africa: Engineering Solutions for Sustainable Resource Management in Densely Populated Regions of West Africa. 18. Nkansah, Christopher. (2022). Evaluation of Sustainable Solutions for Associated Gas Flaring Reduction in Ghana's Offshore Operations. 10.13140/RG.2.2.20853.49122. 19. Vethachalam, S., & Okafor, C. Architecting Scalable Enterprise API Security Using OWASP and NIST Protocols in Multinational Environments For (2020). 20. Adebayo, I. A., Olagunju, O. J., Nkansah, C., Akomolafe, O., Godson, O., Blessing, O., & Clifford, O. (2020). Waste-to-Wealth Initiatives: Designing and Implementing Sustainable Waste Management Systems for Energy Generation and Material Recovery in Urban Centers of West Africa. 21. Satish Kumar Nalluri, Venkata Krishna Bharadwaj Parasaram. (2019). Software-Centric Automation Frameworks Integrating AI and Cybersecurity Principles. International Journal of Engineering Science & Humanities, 9(1), 30–40. Retrieved from https://www.ijesh.com/j/article/view/539 22. Kumar, K. (2020). Innovations in Long/Short Equity Strategies for Small-and Mid-Cap Markets. International Journal of Technology, Management and Humanities, 6(03-04), 22-40. 23. Vethachalam, S., & Okafor, C. Accelerating CI/CD Pipelines Using .NET and Azure Microservices: Lessons from Pearson's Global Education Infrastructure For (2020). 24. Aramide, O. (2019). Decentralized identity for secure network access: A blockchain-based approach to user-centric authentication. World Journal of Advanced Research and Reviews, 3, 143-155. 25. Vethachalam, S. (2021). DevSecOps Integration in Cruise Industry Systems: A Framework for Reducing Cybersecurity Incidents. SAMRIDDHI: A Journal of Physical Sciences, Engineering and Technology, 13(02), 158-167.

Downloads

Published

2021-11-26

How to Cite

Ojuri, M. A. (2021). Evaluating Cybersecurity Patch Management through QA Performance Indicators. International Journal of Technology, Management and Humanities, 7(04), 30-40. https://doi.org/10.21590/

Similar Articles

1-10 of 204

You may also start an advanced similarity search for this article.