Book description
Cybersecurity Risk ManagementIn Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, veteran technology analyst Cynthia Brumfield, with contributions from cybersecurity expert Brian Haugli, delivers a straightforward and up-to-date exploration of the fundamentals of cybersecurity risk planning and management. The book offers readers easy-to-understand overviews of cybersecurity risk management principles, user, and network infrastructure planning, as well as the tools and techniques for detecting cyberattacks. The book also provides a roadmap to the development of a continuity of operations plan in the event of a cyberattack.
With incisive insights into the Framework for Improving Cybersecurity of Critical Infrastructure produced by the United States National Institute of Standards and Technology (NIST), Cybersecurity Risk Management presents the gold standard in practical guidance for the implementation of risk management best practices.
Filled with clear and easy-to-follow advice, this book also offers readers:
- A concise introduction to the principles of cybersecurity risk management and the steps necessary to manage digital risk to systems, assets, data, and capabilities
- A valuable exploration of modern tools that can improve an organization’s network infrastructure protection
- A practical discussion of the challenges involved in detecting and responding to a cyberattack and the importance of continuous security monitoring
- A helpful examination of the recovery from cybersecurity incidents
Perfect for undergraduate and graduate students studying cybersecurity, Cybersecurity Risk Management is also an ideal resource for IT professionals working in private sector and government organizations worldwide who are considering implementing, or who may be required to implement, the NIST Framework at their organization.
Table of contents
- Cover
- Title page
- Copyright
- Dedication
- Academic Foreword
- Acknowledgments
- Preface – Overview of the NIST Framework
-
CHAPTER 1 Cybersecurity Risk Planning and Management
- Introduction
- I. What Is Cybersecurity Risk Management?
-
II. Asset Management
- A. Inventory Every Physical Device and System You Have and Keep the Inventory Updated
- B. Inventory Every Software Platform and Application You Use and Keep the Inventory Updated
- C. Prioritize Every Device, Software Platform, and Application Based on Importance
- D. Establish Personnel Security Requirements Including Third-Party Stakeholders
- III. Governance
- IV. Risk Assessment and Management
- Summary
- Chapter Quiz
- Essential Reading on Cybersecurity Risk Management
-
CHAPTER 2 User and Network Infrastructure Planning and Management
- I. Introduction
-
II. Infrastructure Planning and Management Is All about Protection, Where the Rubber Meets the Road
-
A. Identity Management, Authentication, and Access Control
- 1. Always Be Aware of Who Has Access to Which System, for Which Period of Time, and from Where the Access Is Granted
- 2. Establish, Maintain, and Audit an Active Control List and Process for Who Can Physically Gain Access to Systems
- 3. Establish Policies, Procedures, and Controls for Who Has Remote Access to Systems
- 4. Make Sure That Users Have the Least Authority Possible to Perform Their Jobs and Ensure That at Least Two Individuals Are Responsible for a Task
- 5. Implement Network Security Controls on All Internal Communications, Denying Communications among Various Segments Where Necessary
- A Word about Firewalls
-
A. Identity Management, Authentication, and Access Control
- III. Awareness and Training
-
IV. Data Security
- A. Protect the Integrity of Active and Archived Databases
- B. Protect the Confidentiality and Integrity of Corporate Data Once It Leaves Internal Networks
- C. Assure That Information Can Only Be Accessed by Those Authorized to Do So and Protect Hardware and Storage Media
- D. Keep Your Development and Testing Environments Separate from Your Production Environment
- E. Implement Checking Mechanisms to Verify Hardware Integrity
- V. Information Protection Processes and Procedures
- A Word about Patch Management
- VI. Maintenance
- VII. Protective Technology
- Summary
- Chapter Quiz
- Essential Reading on Network Management
-
CHAPTER 3 Tools and Techniques for Detecting Cyber Incidents
- Introduction
- What Is an Incident?
-
I. Detect
-
A. Anomalies and Events
- 1. Establish Baseline Data for Normal, Regular Traffic Activity and Standard Configuration for Network Devices
- 2. Monitor Systems with Intrusion Detection Systems and Establish a Way of Sending and Receiving Notifications of Detected Events; Establish a Means of Verifying, Assessing, and Tracking the Source of Anomalies
-
A Word about Antivirus Software
- 3. Deploy One or More Centralized Log File Monitors and Configure Logging Devices throughout the Organization to Send Data Back to the Centralized Log Monitor
- 4. Determine the Impact of Events Both Before and After they Occur
- 5. Develop a Threshold for How Many Times an Event Can Occur Before You Take Action
-
B. Continuous Monitoring
- 1. Develop Strategies for Detecting Breaches as Soon as Possible, Emphasizing Continuous Surveillance of Systems through Network Monitoring
- 2. Ensure That Appropriate Access to the Physical Environment Is Monitored, Most Likely through Electronic Monitoring or Alarm Systems
- 3. Monitor Employee Behavior in Terms of Both Physical and Electronic Access to Detect Unauthorized Access
- 4. Develop a System for Ensuring That Software Is Free of Malicious Code through Software Code Inspection and Vulnerability Assessments
- 5. Monitor Mobile Code Applications (e.g., Java Applets) for Malicious Activity by Authenticating the Codes’ Origins, Verifying their Integrity, and Limiting the Actions they Can Perform
- 6. Evaluate a Provider’ s Internal and External Controls’ Adequacy and Ensure they Develop and Adhere to Appropriate Policies, Procedures, and Standards; Consider the Results of Internal and External Audits
- 7. Monitor Employee Activity for Security Purposes and Assess When Unauthorized Access Occurs
- 8. Use Vulnerability Scanning Tools to Find Your Organization’ s Weaknesses
-
C. Detection Processes
- 1. Establish a Clear Delineation between Network and Security Detection, with the Networking Group and the Security Group Having Distinct and Different Responsibilities
- 2. Create a Formal Detection Oversight and Control Management Function; Define Leadership for a Security Review, Operational Roles, and a Formal Organizational Plan; Train Reviewers to Perform Their Duties Correctly and Implement the Review Process
- 3. Test Detection Processes Either Manually or in an Automated Fashion in Conformance with the Organization’ s Risk Assessment
- 4. Inform Relevant Personnel Who Must Use Data or Network Security Information about What Is Happening and Otherwise Facilitate Organizational Communication
- 5. Document the Process for Event Detection to Improve the Organization’ s Detection Systems
-
A. Anomalies and Events
- Summary
- Chapter Quiz
- Essential Reading for Tools and Techniques for Detecting a Cyberattack
- CHAPTER 4 Developing a Continuity of Operations Plan
-
CHAPTER 5 Supply Chain Risk Management
- Introduction
- I. NIST Special Publication 800–161
- II. Software Bill of Materials
-
III. NIST Revised Framework Incorporates Major Supply Chain Category
- A. Identify, Establish, and Assess Cyber Supply Chain Risk Management Processes and Gain Stakeholder Agreement
- B. Identify, Prioritize, and Assess Suppliers and Third-Party Partners of Suppliers
- C. Develop Contracts with Suppliers and Third-Party Partners to Address Your Organization舗s Supply Chain Risk Management Goals
- D. Routinely Assess Suppliers and Third-Party Partners Using Audits, Test Results, and Other Forms of Evaluation
- E. Test to Make Sure Your Suppliers and Third-Party Providers Can Respond to and Recover from Service Disruption
- Summary
- Chapter Quiz
- Essential Reading for Supply Chain Risk Management
- CHAPTER 6 Manufacturing and Industrial Control Systems Security
- Appendix A: Helpful Advice for Small Organizations Seeking to Implement Some of the Book’s Recommendations
- Appendix B: Critical Security Controls Version 8.0 Mapped to NIST CSF v1.1
- Answers to Chapter Quizzes
- Index
- End User License Agreement
Product information
- Title: Cybersecurity Risk Management
- Author(s):
- Release date: December 2021
- Publisher(s): Wiley
- ISBN: 9781119816287
You might also like
book
Building a Cyber Risk Management Program
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents …
book
Cybersecurity and Third-Party Risk
STRENGTHEN THE WEAKEST LINKS IN YOUR CYBERSECURITY CHAIN Across the world, the networks of hundreds of …
book
Information Security Risk Management for ISO 27001/ISO 27002, third edition
Ideal for risk managers, information security managers, lead implementers, compliance managers and consultants, as well as …
book
Cybersecurity Career Master Plan
Start your Cybersecurity career with expert advice on how to get certified, find your first job, …