wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Cyber Security Standards

profile
Sanket Jadhav
Sep 14, 2023
0 Likes
0 Discussions
57 Reads

Understanding Cybersecurity Standards

 

Cybersecurity standards are a set of guidelines or best practices that organizations can use to improve theircybersecurity posture. They define both functional and assurance requirements within a product, system,process, or technology environment. Well-developed cybersecurity standards enable consistency among product developers and serve as a reliable metric for purchasing security products.

 

NIST Cybersecurity Framework

 

The National Institute of Standards and Technology (NIST) has developed a Cybersecurity Framework that iswidely recognized and used. This voluntary framework consists of standards, guidelines, and best practices to manage cybersecurity risk. It is designed to help organizations identify and implement appropriate measures to protect their systems and data from cyber threats.

 

Framework Version 1.1

 

The Cybersecurity Framework is ready to download. It provides introductory material for new Framework users and implementation guidance for more advanced Framework users.

 

Journey to the NIST CSF 2.0

 

NIST has released the Public Draft of the NIST Cybersecurity Framework 2.0 for public comment through November 4, 2023. They have also released a Discussion Draft of the Implementation Examples included in the CSF 2.0 Draft Core for public comment by the same date.

 

Conclusion

 

Cybersecurity standards play a crucial role in improving the security of information technology (IT) systems, networks, and critical infrastructures. By following these standards, organizations can effectively manage their cybersecurity risks and protect their valuable data from potential cyber threats


Comments ()


Sign in

Read Next

How can denial-of-service(Dos) attacks be prevented?

Blog banner

Password Generator - Lisp

Blog banner

ASANA- A Management System.

Blog banner

ART AND CULTURE OF VRINDAVAN

Blog banner

MEMORY MANAGEMENT REQUIREMENT

Blog banner

Photorec - media recovery tool

Blog banner

What is Packet Filtering?

Blog banner

DIGITAL ECONOMY

Blog banner

Pink sauce pasta

Blog banner

MUTUAL EXCLUSION

Blog banner

Thumb Sucking: When It’s Normal and When It Becomes a Dental Problem

Blog banner

Types of Big Data

Blog banner

Full Disk Encryption

Blog banner

Short-Form Video Marketing: Why It's Dominating the Internet

Blog banner

Facebook marketing

Blog banner

Security Issues and Countermeasures

Blog banner

USES OF WHATSAPP

Blog banner

Southern Turkey Earthquake: Causes and Consequences of a Tragic Natural Disaster

Blog banner

Maharashtrian culture: Tradition, Art, Food

Blog banner

Real-Time Operating Systems (RTOS) Deep Explanation

Blog banner

Understanding Endometriosis and Its Psychological Impact on Quality of Life

Blog banner

VIRTUAL MACHINE

Blog banner

Digital Marketing

Blog banner

LiquidPlanner

Blog banner

Question

Blog banner

Operating system

Blog banner

Pro-Tips On How To Keep your Foot Healthy

Blog banner

What is Email? Uses of Emails

Blog banner

The launch of UniMap by HERE

Blog banner

MEMORY MANAGEMENT FILE

Blog banner

Decision Tree: A Diagram Model

Blog banner

Yoga in INDIA and ABROAD

Blog banner

RSA (Rivest-Shamir-Adelman) Algorithm

Blog banner

File management

Blog banner

Deadlock and Starvation

Blog banner

Man is free by the birth .

Blog banner

Digital Footprints An Emerging Dimension of Digital Inequality

Blog banner

The Sunny Side of Instagram

Blog banner

Introduction to Virtual Memory - 080

Blog banner

Social media

Blog banner

Im Photographer

Blog banner

SPEM

Blog banner