Posts

Showing posts with the label NIST

What Makes a Security Plan?

      Hello, and welcome back to my blog. This week, I would like to quickly discuss the levels that go into making a security plan. These types of plans are an important tool for IT departments and Cybersecurity Administrators to design a plan that will help protect or slow down an attack on the network.     Of course, security plans can vary from company to company; however, their purpose remains the same, with threats looming every day. With IT managers adjusting in response to the ever-changing threats, the created security plan must be designed to stop or slow down any attempt to breach network defenses. Below we will look at the principal components of a security plan and what they entail.    Separate Networks              As the name suggests, having more than one network can protect company assists from hackers and the like. The reason being is that having every computer on one network would lead to issues if that subsequent work were to fail, which would stop operati

A quick look at NIST CSF (Cybersecurity Framework) core and how they are organizes into functions.

Hello, and Welcome to my blog! This week, I will be discussing how the NIST CSF (Cybersecurity Framework) core organizes into functions. What is a NIST Cybersecurity Framework?                 The National Institute of Standards (NIST) and Framework’s Cybersecurity (CSF) was published in February 2014 in response to Presidential Executive Order 13636, “Improving Critical Infrastructure Cybersecurity,” which called for a standardized security framework for critical infrastructure in the United States. What are the NIST CRF Framework cores areas? The NIST CSF is comprised of four core areas. These include Functions, Categories, Subcategories, and References. We will be talking about the different functions in the NIST CSF core and how they are organized for today. What are the Framework Functions? The NIST CSF is organized into five core functions, which are also known as the Framework Core. These functions are arranged with one another to represent a security cycle. Each p