NIST cybersecurity framework : a pocket guide
The NIST CSF is a framework for organizations to manage and mitigate cybersecurity risk based on existing standards, guidelines, and practices.
Saved in:
Main Author: | |
---|---|
Format: | eBook |
Language: | English |
Published: |
Ely, Cambridgeshire, United Kingdom :
IT Governance Publishing,
2018.
|
Subjects: | |
ISBN: | 9781787780415 1787780414 9781787780422 1787780422 |
Physical Description: | 1 online resource |
LEADER | 03704cam a2200433 i 4500 | ||
---|---|---|---|
001 | kn-on1056110263 | ||
003 | OCoLC | ||
005 | 20240717213016.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 181008s2018 enk ob 000 0 eng d | ||
040 | |a JSTOR |b eng |e rda |e pn |c JSTOR |d EBLCP |d OCLCF |d MERUC |d IDB |d K6U |d UMI |d OTZ |d TOH |d OCLCQ |d N$T |d OCLCO |d N$T |d OCLCQ |d MM9 |d OCLCO |d OCLCQ |d OCLCO |d KSU |d OCLCQ |d OCLCO |d OCLCL |d DEGRU | ||
020 | |a 9781787780415 |q (electronic bk.) | ||
020 | |a 1787780414 |q (electronic bk.) | ||
020 | |a 9781787780422 |q (electronic bk.) | ||
020 | |a 1787780422 |q (electronic bk.) | ||
024 | 8 | |a 9781787780422 | |
035 | |a (OCoLC)1056110263 |z (OCoLC)1090413803 |z (OCoLC)1111634289 |z (OCoLC)1119129628 |z (OCoLC)1121385219 |z (OCoLC)1121439745 |z (OCoLC)1152986715 |z (OCoLC)1156369017 |z (OCoLC)1192345334 | ||
100 | 1 | |a Calder, Alan, |d 1957- |e author. |1 https://id.oclc.org/worldcat/entity/E39PCjFk9VbdBGPWpx6MgTCHhb | |
245 | 1 | 0 | |a NIST cybersecurity framework : |b a pocket guide / |c Alan Calder. |
264 | 1 | |a Ely, Cambridgeshire, United Kingdom : |b IT Governance Publishing, |c 2018. | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references. | ||
505 | 0 | |a Cover; Title; Copyright; About the Author; Contents; Introduction; The growing digital ecosystem; Federal responses; Past cyber incidents; The NIST Cybersecurity Framework; Chapter 1: Aims of the Framework; Relevant factors and variables; Implementation benefits; Structure; Chapter 2: Framework core; Functions; Identify; Protect, detect, and respond; Recover; Categories; Subcategories; Informative references; ISO 27001; COBIT; NIST SP 800-53; ISA 62443; CIS CSC; How the core elements interact; Implementation -- risk management; Methodologies; Risk responses; NIST's Risk Management Framework | |
505 | 8 | |a Chapter 3: Framework profilesCurrent profile; Target profile; How the two profiles interact; Chapter 4: Framework implementation tiers; How to view the tiers; Risk management aspects; Risk management processes; Integrated risk management program; External participation; Tier 1: Partial; Tier 2: Risk-informed; Tier 3: Repeatable; Tier 4: Adaptive; How the tiers, profiles, and core interact; Chapter 5: Implementing the Framework; Step 1: Determine objectives, priorities, and scope; Step 2: Identify assets and risks; Step 3: Create a current profile; Step 4: Conduct a risk assessment | |
505 | 8 | |a Step 5: Create a target profileStep 6: Perform a gap analysis; Step 7: Implement the action plan; Continual improvement; Decision-making and implementation responsibilities; Chapter 6: Alignment with other frameworks; ISO 27001; ISO 22301; Combining ISO 27001 and ISO 22301; Appendix: Key changes from Version 1.0 to 1.1; Glossary; Further reading | |
506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty | ||
520 | |a The NIST CSF is a framework for organizations to manage and mitigate cybersecurity risk based on existing standards, guidelines, and practices. | ||
590 | |a Knovel |b Knovel (All titles) | ||
610 | 2 | 0 | |a National Institute of Standards and Technology (U.S.) |
610 | 2 | 7 | |a National Institute of Standards and Technology (U.S.) |2 fast |
650 | 0 | |a Computer security. | |
650 | 0 | |a Cyberterrorism |x Prevention. | |
655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
655 | 9 | |a electronic books |2 eczenas | |
856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpNISTCFA3/nist-cybersecurity-framework?kpromoter=marc |y Full text |