wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Cyber Security Standards

profile
Sanket Jadhav
Sep 14, 2023
0 Likes
0 Discussions
57 Reads

Understanding Cybersecurity Standards

 

Cybersecurity standards are a set of guidelines or best practices that organizations can use to improve theircybersecurity posture. They define both functional and assurance requirements within a product, system,process, or technology environment. Well-developed cybersecurity standards enable consistency among product developers and serve as a reliable metric for purchasing security products.

 

NIST Cybersecurity Framework

 

The National Institute of Standards and Technology (NIST) has developed a Cybersecurity Framework that iswidely recognized and used. This voluntary framework consists of standards, guidelines, and best practices to manage cybersecurity risk. It is designed to help organizations identify and implement appropriate measures to protect their systems and data from cyber threats.

 

Framework Version 1.1

 

The Cybersecurity Framework is ready to download. It provides introductory material for new Framework users and implementation guidance for more advanced Framework users.

 

Journey to the NIST CSF 2.0

 

NIST has released the Public Draft of the NIST Cybersecurity Framework 2.0 for public comment through November 4, 2023. They have also released a Discussion Draft of the Implementation Examples included in the CSF 2.0 Draft Core for public comment by the same date.

 

Conclusion

 

Cybersecurity standards play a crucial role in improving the security of information technology (IT) systems, networks, and critical infrastructures. By following these standards, organizations can effectively manage their cybersecurity risks and protect their valuable data from potential cyber threats


Comments ()


Sign in

Read Next

Corporate Discipline.

Blog banner

Question

Blog banner

Buffering

Blog banner

What is Spyware? and examples of them.

Blog banner

Memory Management

Blog banner

Southern Turkey Earthquake: Causes and Consequences of a Tragic Natural Disaster

Blog banner

Jira service Management

Blog banner

MODERN OPERATING SYSTEM

Blog banner

How India made the GIS its Own, and its Use in Infrastructural Developments

Blog banner

KPMG (Klynveld Peat Marwick Goerdeler)

Blog banner

Short note on Microsoft office

Blog banner

Time Series Analysis

Blog banner

Evolution of operating systems

Blog banner

Photography

Blog banner

Guidelines for a low sodium diet.

Blog banner

Data Security must be your Priority!

Blog banner

Review on Cyber Forensics and its Analysis Tools

Blog banner

Travel: Everything Everywhere!

Blog banner

Sessions In OS.

Blog banner

Session Vulnerabilities

Blog banner

Why Data Privacy Is Changing Online Advertising

Blog banner

Survey of Which Movies Types people are Prefer to Watch in India.

Blog banner

Working with Sniffers for monitoring network communication

Blog banner

File system

Blog banner

Security in Cloud Computing Environment using cryptography - Rushabh Modi

Blog banner

Geographic Information Systems(By aditi Unnikrishnan)

Blog banner

Reconnaissance

Blog banner

Assessing Incident Detection Response Process

Blog banner

MPL and how its effects?

Blog banner

Electronic Funds Transfer

Blog banner

First-Order Logic (FOL): The Foundation of Modern Logic

Blog banner

operating system

Blog banner

Busted : Common Web Security Myths

Blog banner

Getting into anime My anime suggestions

Blog banner

WHAT IS TWITTER AND HOW DOES IT WORK

Blog banner

My First Trek - Sondai, Karjat - Shoaib Malik

Blog banner

Escape

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Jio .....A Revolution ?? ??

Blog banner

Sagar Parikrama

Blog banner

Threads

Blog banner

Respondo Launches Revolutionary Video Discussion App

Blog banner