Limit search to available items
Book Cover
E-book
Author Brumfield, Cynthia

Title Cybersecurity Risk Management Mastering the Fundamentals Using the NIST Cybersecurity Framework
Published Newark : John Wiley & Sons, Incorporated, 2021

Copies

Description 1 online resource (168 p.)
Contents Intro -- Cybersecurity Risk Management -- Contents -- Academic Foreword -- Acknowledgments -- Preface -- Overview of the NIST Framework -- Background on the Framework -- Framework Based on Risk Management -- The Framework Core -- Framework Implementation Tiers -- Framework Profile -- Other Aspects of the Framework Document -- Recent Developments At Nist -- CHAPTER 1 Cybersecurity Risk Planning and Management -- Introduction -- I. What Is Cybersecurity Risk Management? -- A. Risk Management Is a Process -- II. Asset Management
A. Inventory Every Physical Device and System You Have and Keep the Inventory Updated -- B. Inventory Every Software Platform and Application You Use and Keep the Inventory Updated -- C. Prioritize Every Device, Software Platform, and Application Based on Importance -- D. Establish Personnel Security Requirements Including Third-Party Stakeholders -- III. Governance -- A. Make Sure You Educate Management about Risks -- IV. Risk Assessment and Management -- A. Know Where You're Vulnerable -- B. Identify the Threats You Face, Both Internally and Externally
C. Focus on the Vulnerabilities and Threats That Are Most Likely AND Pose the Highest Risk to Assets -- D. Develop Plans for Dealing with the Highest Risks -- Summary -- Chapter Quiz -- Essential Reading on Cybersecurity Risk Management -- CHAPTER 2 User and Network Infrastructure Planning and Management -- I. Introduction -- II. Infrastructure Planning and Management Is All about Protection, Where the Rubber Meets the Road -- A. Identity Management, Authentication, and Access Control
1. Always Be Aware of Who Has Access to Which System, for Which Period of Time, and from Where the Access Is Granted -- 2. Establish, Maintain, and Audit an Active Control List and Process for Who Can Physically Gain Access to Systems -- 3. Establish Policies, Procedures, and Controls for Who Has Remote Access to Systems -- 4. Make Sure That Users Have the Least Authority Possible to Perform Their Jobs and Ensure That at Least Two Individuals Are Responsible for a Task
5. Implement Network Security Controls on All Internal Communications, Denying Communications among Various Segments Where Necessary -- A Word about Firewalls -- 6. Associate Activities with a Real Person or a Single Specific Entity -- 7. Use Single- or Multi-Factor Authentication Based on the Risk Involved in the Interaction -- III. Awareness and Training -- A. Make Sure That Privileged Users and Security Personnel Understand Their Roles and Responsibilities -- IV. Data Security -- A. Protect the Integrity of Active and Archived Databases
Summary The book offers readers easy-to-understand overviews of cybersecurity risk management principles, user, and network infrastructure planning, as well as the tools and techniques for detecting cyberattacks. The book also provides a roadmap to the development of a continuity of operations plan in the event of a cyberattack. -- Edited summary from book
Notes Description based upon print version of record
B. Protect the Confidentiality and Integrity of Corporate Data Once It Leaves Internal Networks
Subject Computer security.
Business enterprises -- Computer networks -- Security measures.
Business enterprises -- Computer networks -- Security measures
Computer security
Form Electronic book
Author Haugli, Brian
ISBN 9781119816300
1119816300