Access Millions of academic & study documents

Phyllis fieids week 8

Content type
User Generated
Showing Page:
1/5

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/5

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/5

Sign up to view the full document!

lock_open Sign Up
Showing Page:
4/5

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 5 pages?
Access Now
Unformatted Attachment Preview
Phyllis Fields SEC310 10/2022 NIST cybersecurity Framework The NIST Cybersecurity Framework gives organizations a fivepoint structure to improve their cybersecurity posturing. While this is not regulatory, it is widely considered best practice — and as such, it offers organizations powerful ways to take charge of their cybersecurity strategy. By using the NIST Cybersecurity Framework, organizations can assess their exposure, evaluate their cybersecurity measures, and decrease risk. Let’s take a closer look at what NIST entails and how can each of the five points work to improve cybersecurit The Five Functions Identify Protect Detect Respond Recove References Microsoft, (2022). Assessing Microsoft 365 security solutions using the NIST1.CybersecurityFramework. https://www.microsoft.com/security/blog/2018/07/02/assessing-microsoft-365security-solutions-using-the-nist-cybersecurity-framework/ https://www.nist.gov/cyberframework/online-learning/five-functions https://csrc.nist.rip/publications/nistpubs/800-12/800-12-html/chapter15.html Leszczyna, R. (2018). A review of standards with cybersecurity requirements for smart grid. Computers & Security, 77, 262-276 Narayanan, S. N., Ganesan, A., Joshi, K., Oates, T., Joshi, A., & Finin, T. (2018, October). Early detection of cybersecurity threats using collaborative cognition. In 2018 IEEE 4th international conference on collaboration and internet computing (CIC) (pp. 354-363). IEEE. Alagic, G., Alagic, G., Alperin-Sheriff, ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4