Chapter 4
Cybersecurity
IN THIS CHAPTER
Assessing the risk for security
Looking at two pillars of cybersecurity
Identifying the most important protection and recovery measures
Examining standardized cybersecurity frameworks
Looking closer at the NIST Cybersecurity Framework
As an IT professional, cybersecurity is the thing most likely to keep you awake at night. Consider the following scenarios:
- Your phone starts ringing like crazy at 3 o’clock one afternoon because no one anywhere on the network can access any of their files. You soon discover that your network has been infiltrated by ransomware, nefarious software that has encrypted every byte of data on your network, rendering it useless to your users until you pay a ransom to recover the data.
- Your company becomes a headline on CNN because a security breach has resulted in the theft of your customers’ credit card information.
- On his last day of work, a disgruntled employee copies your company contact list and other vital intellectual ...
Get Networking All-in-One For Dummies, 8th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.