Chapter 4

Cybersecurity

IN THIS CHAPTER

Bullet Assessing the risk for security

Bullet Looking at two pillars of cybersecurity

Bullet Identifying the most important protection and recovery measures

Bullet Examining standardized cybersecurity frameworks

Bullet Looking closer at the NIST Cybersecurity Framework

As an IT professional, cybersecurity is the thing most likely to keep you awake at night. Consider the following scenarios:

  • Your phone starts ringing like crazy at 3 o’clock one afternoon because no one anywhere on the network can access any of their files. You soon discover that your network has been infiltrated by ransomware, nefarious software that has encrypted every byte of data on your network, rendering it useless to your users until you pay a ransom to recover the data.
  • Your company becomes a headline on CNN because a security breach has resulted in the theft of your customers’ credit card information.
  • On his last day of work, a disgruntled employee copies your company contact list and other vital intellectual ...

Get Networking All-in-One For Dummies, 8th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.