• Complain

Cynthia Brumfield - Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework

Here you can read online Cynthia Brumfield - Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2022, publisher: Wiley, genre: Business. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Cynthia Brumfield Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework
  • Book:
    Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework
  • Author:
  • Publisher:
    Wiley
  • Genre:
  • Year:
    2022
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Cybersecurity Risk Management

In Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, veteran technology analyst Cynthia Brumfield, with contributions from cybersecurity expert Brian Haugli, delivers a straightforward and up-to-date exploration of the fundamentals of cybersecurity risk planning and management. The book offers readers easy-to-understand overviews of cybersecurity risk management principles, user, and network infrastructure planning, as well as the tools and techniques for detecting cyberattacks. The book also provides a roadmap to the development of a continuity of operations plan in the event of a cyberattack.

With incisive insights into the Framework for Improving Cybersecurity of Critical Infrastructure produced by the United States National Institute of Standards and Technology (NIST), Cybersecurity Risk Management presents the gold standard in practical guidance for the implementation of risk management best practices.

Filled with clear and easy-to-follow advice, this book also offers readers:

  • A concise introduction to the principles of cybersecurity risk management and the steps necessary to manage digital risk to systems, assets, data, and capabilities
  • A valuable exploration of modern tools that can improve an organizations network infrastructure protection
  • A practical discussion of the challenges involved in detecting and responding to a cyberattack and the importance of continuous security monitoring
  • A helpful examination of the recovery from cybersecurity incidents

Perfect for undergraduate and graduate students studying cybersecurity, Cybersecurity Risk Management is also an ideal resource for IT professionals working in private sector and government organizations worldwide who are considering implementing, or who may be required to implement, the NIST Framework at their organization.

Cynthia Brumfield: author's other books


Who wrote Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework? Find out the surname, the name of the author of the book and a list of all author's works by series.

Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Appendix A Helpful Advice for Small Organizations Seeking to Implement Some of - photo 1
Appendix A: Helpful Advice for Small Organizations Seeking to Implement Some of the Books Recommendations

Many, if not most, of the principles and practices of sound cybersecurity presented throughout this book are admittedly complex. They are also far easier to grasp and implement for large organizations, which typically have bigger budgets and multiple personnel to devote to IT, technology, security tasks, and training.

Numerous resources offer guidance to small and medium-sized businesses when implementing the NIST Cybersecurity Framework and adopting critical practices to protecting systems and information. Three in particular that are worth reviewing and keeping on hand are:

  1. NISTIR 7621, Revision 1 Small Business Information Security: The Fundamentals, November 2016 at https://nvlpubs.nist.gov/nistpubs/ir/2016/NIST.IR.7621r1.pdf.
  2. NIST Small Business Cybersecurity Corner at https://www.nist.gov/itl/smallbusinesscyber.
  3. Cybersecurity Risk Management and Best Practices (CSRIC IV WG4 Final Report), Section 9.9 Small and Medium Business (370397) at https://transition.fcc.gov/pshs/advisory/csric4/CSRIC_IV_WG4_Final_Report_031815.pdf.

However, even these guides detail, albeit more simply, the same basic cybersecurity steps that are highlighted in this book developing risk assessments, mapping out and planning infrastructure protections, implementing intrusion detection systems, and so forth.

What this means, in short, is that there is no easy way to ensure systems and assets remain safe other than completing the complex, often tedious, and usually laborious, repetitive, and ongoing steps that are designed to provide protective layers and recovery processes for your organization.

With this caveat in mind, there are a few steps you can take as a small organization to move closer to the full range of cybersecurity practices needed as the complexity of protecting digital assets grows. Here are a few recommendations:

  1. 1. Trusted Personnel Should Wear Multiple Hats: If your organization consists of only a small number of personnel, adapt some of the strategies listed below and in the other chapters so that a handful of trusted personnel can carry them out. You can assign the roles and responsibilities that are usually delegated across personnel in larger organizations to however many personnel you trust. For example, in devising an incident response team, which in a larger organization might rely on human resources, legal, public relations, and IT personnel, brainstorm how the discrete responsibilities of all those functions might be handled by a systems administrator and an office manager, for example.
  2. 2. Focus on the Basics First: Perform a risk assessment to determine what controls and capabilities you have in place. Once gaps are identified, start remediating deficiencies. This assessment should cover basic cyber hygiene such as multi-factor authentication, separate administrative credentials, e-mail security, scheduled patching programs, firewall/perimeter controls, and host-based detection and response software. These foundational controls address the highest likelihood vulnerabilities that small organizations will have.
  3. 3. Bring in Outside Help: When budgeting for IT and technical resources, advocate for funds that you can use to bring in outside help when needed. External cybersecurity consultants can help your organization figure out how to make changes that improve your security posture or assist in a crisis when all employees are overtaxed. Good cybersecurity consultants can help you establish practices ahead of time that can save you grief when an incident does occur and can also help you select your cybersecurity configuration so that the impact of security incidents can be lessened. Fees for external consultants can range from modest amounts to significant financial outlays if you wait to hire the consultants during a crisis.
  4. 4. Gather Evidence and Materials to Advocate for More Security Resources: Make it a habit of staying on top of the adverse cybersecurity experiences of other organizations so that you can develop a cybersecurity resource arsenal to fight for more resources, whether personnel resources or funds for outside consultants. Network with your peers to find out what theyre doing to gather your evidence to advocate for more security resources.
Appendix B: Critical Security Controls Version 8.0 Mapped to NIST CSF v1.1

There are several control frameworks available to address the more tactical elements of cybersecurity. One industry-recognized framework is the Center for Internet Security (CIS) Controls, formerly known as the SANS Top 20. This mapping demonstrates connections between NIST Cybersecurity Framework (CSF) and the CIS Controls Version 8.0. The CIS Controls provide security best practices to help organizations defend assets in cyberspace.

Use this mapping to help identify specific technical implementations, modifications, or best practices that can aid in meeting a respective NIST CSF Subcategory Control. (Please note that not all CIS elements map directly to the NIST Framework.)

CIS Sub-ControlCIS ControlNIST CSF
Inventory and Control of Hardware Assets
1.1Establish and Maintain Detailed Asset Inventory

ID.AM-1

PR.DS-3

1.2Address Unauthorized Assets
1.3Utilize an Active Discovery ToolDE.CM-7
1.4Use Dynamic Host Configuration Protocol (DHCP) Logging to Update Enterprise Asset InventoryDE.CM-7
1.5Use a Passive Asset Discovery ToolDE.CM-7
Inventory and Control of Software Assets
2.1Establish and Maintain a Software InventoryID.AM-2
2.2Ensure Authorized Software is Currently SupportedID.AM-2
2.3Address Unauthorized SoftwareDE.CM-7
2.4Utilize Automated Software Inventory ToolsDE.CM-7
2.5Allowlist Authorized SoftwareDE.CM-7
2.6Allowlist Authorized LibrariesDE.CM-7
2.7Allowlist Authorized Scripts

PR.IP-1

PR.PT-3

Data Protection
3.1Establish and Maintain a Data Management ProcessPR.IP-6
3.2Establish and Maintain a Data InventoryID.AM-5
3.3Configure Data Access Control ListsPR.AC-4
3.4Enforce Data Retention
3.5Securely Dispose of Data

PR.DS-3

PR.IP-6

3.6Encrypt Data on End-User Devices
3.7Establish and Maintain a Data Classification Scheme

ID.AM-5

ID.RA-5

3.8Document Data Flows

DE.AE-1

ID.AM-3

3.9Encrypt Data on Removable MediaPR.PT-2
3.10Encrypt Sensitive Data in TransitPR.DS-2
3.11Encrypt Sensitive Data at RestPR.DS-1
3.12Segment Data Processing and Storage Based on SensitivityPR.AC-5
3.13Deploy a Data Loss Prevention SolutionPR.DS-5
3.14Log Sensitive Data Access
Secure Configuration of Enterprise Assets and Software
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework»

Look at similar books to Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework»

Discussion, reviews of the book Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.