Читать книгу Cybersecurity and Third-Party Risk - Gregory C. Rasner - Страница 4

List of Illustrations

Оглавление

1 Chapter 2FIGURE 2.1 The CIA TriadFIGURE 2.2 The NIST Cybersecurity FrameworkFIGURE 2.3 The Five Steps to a Breach

2 Chapter 4FIGURE 4.1 The Four Pillars of ICT SCRMFIGURE 4.2 The Calculation FlowFIGURE 4.3 The Four Lines of Defense Model

3 Chapter 5FIGURE 5.1 The Cyber TPR LifecycleFIGURE 5.2 The RFP to IRQ to Intake ProcessFIGURE 5.3 Masking or De‐Identifying Tests in Lower‐Level Environments

4 Chapter 7FIGURE 7.1 The On‐site Assessment Lifecycle

5 Chapter 8FIGURE 8.1 The Continuous Monitoring Process

6 Chapter 10FIGURE 10.1 SaaS, PaaS, and IaaS StacksFIGURE 10.2 The Shared Responsibility Model

7 Chapter 13FIGURE 13.1 The Vendor Connection LifecycleFIGURE 13.2 Vendor Enclaves in ZT for Third PartiesFIGURE 13.3 An SDP GatewayFIGURE 13.4 The TPM Process

8 Chapter 15FIGURE 15.1 The Data Funnel to ReportingFIGURE 15.2 Red, Yellow, and Green Vendors

Cybersecurity and Third-Party Risk

Подняться наверх