Cybersecurity Risk Management

Cybersecurity Risk Management
Автор книги: id книги: 2211841     Оценка: 0.0     Голосов: 0     Отзывы, комментарии: 0 10143,8 руб.     (99,11$) Читать книгу Купить и скачать книгу Электронная книга Жанр: Зарубежная компьютерная литература Правообладатель и/или издательство: John Wiley & Sons Limited Дата добавления в каталог КнигаЛит: ISBN: 9781119816300 Скачать фрагмент в формате   fb2   fb2.zip Возрастное ограничение: 0+ Оглавление Отрывок из книги

Реклама. ООО «ЛитРес», ИНН: 7719571260.

Описание книги

Cybersecurity Risk Management In Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework , veteran technology analyst Cynthia Brumfield, with contributions from cybersecurity expert Brian Haugli, delivers a straightforward and up-to-date exploration of the fundamentals of cybersecurity risk planning and management. The book offers readers easy-to-understand overviews of cybersecurity risk management principles, user, and network infrastructure planning, as well as the tools and techniques for detecting cyberattacks. The book also provides a roadmap to the development of a continuity of operations plan in the event of a cyberattack. With incisive insights into the Framework for Improving Cybersecurity of Critical Infrastructure produced by the United States National Institute of Standards and Technology (NIST), Cybersecurity Risk Management presents the gold standard in practical guidance for the implementation of risk management best practices. Filled with clear and easy-to-follow advice, this book also offers readers: A concise introduction to the principles of cybersecurity risk management and the steps necessary to manage digital risk to systems, assets, data, and capabilities A valuable exploration of modern tools that can improve an organization’s network infrastructure protection A practical discussion of the challenges involved in detecting and responding to a cyberattack and the importance of continuous security monitoring A helpful examination of the recovery from cybersecurity incidents Perfect for undergraduate and graduate students studying cybersecurity, Cybersecurity Risk Management is also an ideal resource for IT professionals working in private sector and government organizations worldwide who are considering implementing, or who may be required to implement, the NIST Framework at their organization.

Оглавление

Cynthia Brumfield. Cybersecurity Risk Management

Cybersecurity Risk Management. Mastering the Fundamentals Using the NIST Cybersecurity Framework

Contents

List of Illustrations

Guide

Pages

Academic Foreword

Acknowledgments

Preface – Overview of the NIST Framework

BACKGROUND ON THE FRAMEWORK

FRAMEWORK BASED ON RISK MANAGEMENT

THE FRAMEWORK CORE

FRAMEWORK IMPLEMENTATION TIERS

FRAMEWORK PROFILE

OTHER ASPECTS OF THE FRAMEWORK DOCUMENT

RECENT DEVELOPMENTS AT NIST

Notes

CHAPTER 1 Cybersecurity Risk Planning and Management. Overview of Chapter and Objective

INTRODUCTION

I. WHAT IS CYBERSECURITY RISK MANAGEMENT?

A. Risk Management Is a Process

II. ASSET MANAGEMENT

Voices of Experience. On Asset Management. If you don’t know what you have, you don’t know what you need to protect

A. Inventory Every Physical Device and System You Have and Keep the Inventory Updated

Voices of Experience. On Asset Management. Work from Home Environments Raise the Stakes on Asset Management

Relevant Technical Standards for ID.AM-1

B. Inventory Every Software Platform and Application You Use and Keep the Inventory Updated

Relevant Technical Standards for ID.AM-2

C. Prioritize Every Device, Software Platform, and Application Based on Importance

Relevant Technical Standards for ID.RA-5

D. Establish Personnel Security Requirements Including Third-Party Stakeholders

Relevant Technical Standards for ID.AM-6

III. GOVERNANCE

A. Make Sure You Educate Management about Risks

Voices of Experience. On Governance. Know Your Laws and Regulations

Relevant Technical Standards for ID.GV-4

IV. RISK ASSESSMENT AND MANAGEMENT

A. Know Where You’re Vulnerable

Relevant Technical Standards for ID.RA-1

B. Identify the Threats You Face, Both Internally and Externally

Relevant Technical Standards for ID.RA-3

C. Focus on the Vulnerabilities and Threats That Are Most Likely AND Pose the Highest Risk to Assets

Relevant Technical Standards for ID.RA-5

D. Develop Plans for Dealing with the Highest Risks

Relevant Technical Standards for ID.RA-6

SUMMARY

CHAPTER QUIZ

ESSENTIAL READING ON CYBERSECURITY RISK MANAGEMENT

Notes

CHAPTER 2 User and Network Infrastructure Planning and Management. Overview of Chapter and Objective

I. INTRODUCTION

II. INFRASTRUCTURE PLANNING AND MANAGEMENT IS ALL ABOUT PROTECTION, WHERE THE RUBBER MEETS THE ROAD

A. Identity Management, Authentication, and Access Control

Voices of Experience. On Granting Access. Watch Out for Layering Entitlements When Job Functions Change

Relevant Technical Standards for PR.AC-1

Relevant Technical Standards for PR.AC-2

Relevant Technical Standards for PR.AC-3

Relevant Technical Standards for PR.AC-4

Relevant Technical Standards for PR.AC-5

A WORD ABOUT FIREWALLS

Relevant Technical Standards for PR.AC-6

Relevant Technical Standards for PR.AC-7

III. AWARENESS AND TRAINING

Voices of Experience. On Awareness and Training. Training That Is Most Useful to Employees

A. Make Sure That Privileged Users and Security Personnel Understand Their Roles and Responsibilities

Relevant Technical Standards for PR.AT-5

IV. DATA SECURITY

A. Protect the Integrity of Active and Archived Databases

Relevant Technical Standards for PR.DS-1

B. Protect the Confidentiality and Integrity of Corporate Data Once It Leaves Internal Networks

Relevant Technical Standards for PR.DS-2

C. Assure That Information Can Only Be Accessed by Those Authorized to Do So and Protect Hardware and Storage Media

Relevant Technical Standards for PR.DS-6

D. Keep Your Development and Testing Environments Separate from Your Production Environment

Relevant Technical Standards for PR.DS-7

E. Implement Checking Mechanisms to Verify Hardware Integrity

Relevant Technical Standards for PR.DS-8

V. INFORMATION PROTECTION PROCESSES AND PROCEDURES

A. Create a Baseline of IT and OT Systems

Relevant Technical Standards for PR.IP-1

B. Manage System Configuration Changes in a Careful, Methodical Way

Relevant Technical Standards for PR.IP-3

A WORD ABOUT PATCH MANAGEMENT

C. Perform Frequent Backups and Test Your Backup Systems Often

Relevant Technical Standards for PR.IP-4

D. Create a Plan That Focuses on Ensuring That Assets and Personnel Will Be Able to Continue to Function in the Event of a Crippling Attack or Disaster

Relevant Technical Standards for PR.IP-9

VI. MAINTENANCE

A. Perform Maintenance and Repair of Assets and Log Activities Promptly

Relevant Technical Standards for PR.MA-1

B. Develop Criteria for Authorizing, Monitoring, and Controlling All Maintenance and Diagnostic Activities for Third Parties

Voices of Experience. On Removable Media. Overlook Removable Media at Your Own Peril

Relevant Technical Standards for PR.MA-2

VII. PROTECTIVE TECHNOLOGY

A. Restrict the Use of Certain Types of Media On Your Systems

Relevant Technical Standards for PR.PT-2

B. Wherever Possible, Limit Functionality to a Single Function Per Device (Least Functionality)

Voices of Experience. On Least Functionality. Turn on Only Those Services Needed

Relevant Technical Standards for PR.PT-3

C. Implement Mechanisms to Achieve Resilience on Shared Infrastructure

Relevant Technical Standards for PR.PT-5

SUMMARY

CHAPTER QUIZ

ESSENTIAL READING ON NETWORK MANAGEMENT

Notes

CHAPTER 3 Tools and Techniques for Detecting Cyber Incidents. Overview of Chapter and Objective

INTRODUCTION

WHAT IS AN INCIDENT?

Voices of Experience. On Why Detect Is “Right of Boom” Detect Looks for Weakness Exploitations

I. DETECT

A. Anomalies and Events

1. Establish Baseline Data for Normal, Regular Traffic Activity and Standard Configuration for Network Devices

Voices of Experience. On Anomalies and Events. Start Off with a Strong Foundation

Relevant Technical Standards for DE.AE-1

Relevant Technical Standards for DE.AE-2

A WORD ABOUT ANTIVIRUS SOFTWARE

Relevant Technical Standards for DE.AE-3

Relevant Technical Standards for DE.AE-4

Relevant Technical Standards for DE.AE-5

B. Continuous Monitoring

Voices of Experience. On Continuous Monitoring. Continuous Monitoring Needs to Actually Be Continuous

Relevant Technical Standards for DE.CM-1

Relevant Technical Standards for DE.CM-2

Relevant Technical Standards for DE.CM-3

Relevant Technical Standards for DE.CM-4

Relevant Technical Standards for DE.CM-5

Relevant Technical Standards for DE.CM-6

Relevant Technical Standards for DE.CM-7

Relevant Technical Standards for DE.CM-8

C. Detection Processes

Relevant Technical Standards for DE.DP-1

Relevant Technical Standards for DE.DP-2

Relevant Technical Standards for DE.DP-3

Relevant Technical Standards for DE.DP-4

Relevant Technical Standards for DE.DP-5

SUMMARY

CHAPTER QUIZ

ESSENTIAL READING FOR TOOLS AND TECHNIQUES FOR DETECTING A CYBERATTACK

CHAPTER 4 Developing a Continuity of Operations Plan. Overview of Chapter and Objective

INTRODUCTION

A. ONE SIZE DOES NOT FIT ALL

I. RESPONSE

Develop an Executable Response Plan

Relevant Technical Standards for RS.RP-1

Voices of Experience. On Coordinating with Stakeholders. Communicating with Peers is Powerful

B. Understand the Importance of Communications in Incident Response

Relevant Technical Standards for RS.CO-1

C. Prepare for Corporate-Wide Involvement During Some Cybersecurity Attacks

Relevant Technical Standards for RS.CO-4

II. ANALYSIS

A. Examine Your Intrusion Detection System in Analyzing an Incident

Relevant Technical Standards for RS.AN-1

B. Understand the Impact of the Event

Relevant Technical Standards for RS.AN-2

C. Gather and Preserve Evidence

Relevant Technical Standards for RS.AN-3

D. Prioritize the Treatment of the Incident Consistent with Your Response Plan

Relevant Technical Standards for RS.AN-4

Voices of Experience. On Vulnerability Disclosures. Bug Bounties Make You Go from Reactive to Proactive

E. Establish Processes for Handling Vulnerability Disclosures

Relevant Technical Standards for RS.AN-5

III. MITIGATION

A. Take Steps to Contain the Incident

Relevant Technical Standards for RS.MI-1

B. Decrease the Threat Level by Eliminating or Intercepting the Adversary as Soon as the Incident Occurs

Relevant Technical Standards for RS.MI-2

C. Mitigate Vulnerabilities or Designate Them as Accepted Risk

Relevant Technical Standards for RS.MI-3

IV. RECOVER

Voices of Experience. On Why Recovery Planning is Key. It’s Your Last Line of Defense

A. Recovery Plan Is Executed During or After a Cybersecurity Incident

Relevant Technical Standards for RC.RP-1

B. Update Recovery Procedures Based on New Information as Recovery Gets Underway

Relevant Technical Standards for RC.IM-1

C. Develop Relationships with Media to Accurately Disseminate Information and Engage in Reputational Damage Limitation

Relevant Technical Standards for RC.CO-1 (and RC.CO-2 Regarding Advance Media Plans)

SUMMARY

CHAPTER QUIZ

ESSENTIAL READING FOR DEVELOPING A CONTINUITY OF OPERATIONS PLAN

CHAPTER 5 Supply Chain Risk Management. Overview of Chapter and Objective

INTRODUCTION

I. NIST SPECIAL PUBLICATION 800-161

II. SOFTWARE BILL OF MATERIALS

Voices of Experience. On Supply Chain. Enterprises Need a Consistent Approach

III. NIST REVISED FRAMEWORK INCORPORATES MAJOR SUPPLY CHAIN CATEGORY

A. Identify, Establish, and Assess Cyber Supply Chain Risk Management Processes and Gain Stakeholder Agreement

Relevant Technical Standards for ID.SC-1

B. Identify, Prioritize, and Assess Suppliers and Third-Party Partners of Suppliers

Relevant Technical Standards for ID.SC-2

C. Develop Contracts with Suppliers and Third-Party Partners to Address Your Organization’s Supply Chain Risk Management Goals

Relevant Technical Standards for ID.SC-3

D. Routinely Assess Suppliers and Third-Party Partners Using Audits, Test Results, and Other Forms of Evaluation

Relevant Technical Standards for ID.SC-4

E. Test to Make Sure Your Suppliers and Third-Party Providers Can Respond to and Recover from Service Disruption

Relevant Technical Standards for ID.SC-5

SUMMARY

CHAPTER QUIZ

ESSENTIAL READING FOR SUPPLY CHAIN RISK MANAGEMENT

CHAPTER 6 Manufacturing and Industrial Control Systems Security. Overview of Chapter and Objective

Voices of Experience. On Industrial Control Security. Industrial Processes Are Very Complex

ESSENTIAL READING ON MANUFACTURING AND INDUSTRIAL CONTROL SECURITY

Appendix A: Helpful Advice for Small Organizations Seeking to Implement Some of the Book’s Recommendations

Appendix B: Critical Security Controls Version 8.0 Mapped to NIST CSF v1.1

Answers to Chapter Quizzes. CHAPTER 1

CHAPTER 2

CHAPTER 3

CHAPTER 4

CHAPTER 5

Index

WILEY END USER LICENSE AGREEMENT

Отрывок из книги

Cynthia Brumfield

Cybersecurity analyst, writer and President of DCT Associates, Washington, D.C., USA

.....

Within each of these functions are categories of activities. Within each category of activities are subcategories, and for each subcategory, there are informative references, usually standards, for helping to support the activities (Figure 0.2).

Figure 0.2 NIST CATEGORIES, SUBCATEGORIES, AND INFORMATIVE REFERENCES.

.....

Добавление нового отзыва

Комментарий Поле, отмеченное звёздочкой  — обязательно к заполнению

Отзывы и комментарии читателей

Нет рецензий. Будьте первым, кто напишет рецензию на книгу Cybersecurity Risk Management
Подняться наверх