Question

In: Computer Science

Select and describe three sections of the NIST framework which would have an immediate impact on...

Select and describe three sections of the NIST framework which would have an immediate impact on your organization’s security if implemented and justify why.

Solutions

Expert Solution

three sections of the NIST

  • Implementation Tiers

  • Framework Core

  • Profiles

  • Framework Implementation Tiers

    Tiers describe the degree to which an organization’s cyber security risk management practices exhibit the characteristics defined in the Framework. The Tiers range from Partial (Tier 1) to Adaptive (Tier 4) and describe an increasing degree of rigor, and how well integrated cyber security risk decisions are into broader risk decisions, and the degree to which the organization shares and receives cyber security info from external parties.

    Tiers do not necessarily represent maturity levels. Organizations should determine the desired Tier, ensuring that the selected level meets organizational goals, reduces cybersecurity risk to levels acceptable to the organization, and is feasible to implement, fiscally and otherwise.

    Framework Core

    The Core is a set of desired cybersecurity activities and outcomes organized into Categories and aligned to Informative References. The Framework Core is designed to be intuitive and to act as a translation layer to enable communication between multi-disciplinary teams by using simplistic and non-technical language. The Core consists of three parts: Functions, Categories, and Subcategories. The Core includes five high level functions: Identify, Protect, Detect, Respond, and Recover. These 5 functions are not only applicable to cybersecurity risk management, but also to risk management at large. The next level down is the 23 Categories that are split across the five Functions. The image below depicts the Framework Core's Functions and Categories.

    The Categories were designed to cover the breadth of cybersecurity objectives for an organization, while not being overly detailed. It covers topics across cyber, physical, and personnel, with a focus on business outcomes.

    Subcategories are the deepest level of abstraction in the Core. There are 108 Subcategories, which are outcome-driven statements that provide considerations for creating or improving a cybersecurity program. Because the Framework is outcome driven and does not mandate how an organization must achieve those outcomes, it enables risk-based implementations that are customized to the organization's needs.

    The five Subcategories pictured from the Business Environment Category (ID.BE) provide an example of the outcome focused statements that are found throughout the core. The column to the right, Informative References support the Core by providing broad references that are more technical than the Framework itself. Organizations may wish to use some, none, or all of these references to inform the activities to undertake to achieve the outcome described in the Subcategory.

    For more information regarding the Informative References, see the Informative References Learning Module.

    Framework Profiles

    Profiles are an organization's unique alignment of their organizational requirements and objectives, risk appetite, and resources against the desired outcomes of the Framework Core. Profiles can be used to identify opportunities for improving cybersecurity posture by comparing a “Current” Profile with a “Target” Profile.

    Profiles are about optimizing the Cybersecurity Framework to best serve the organization. The Framework is voluntary, so there is no ‘right’ or ‘wrong’ way to do it. One way of approaching profiles is for an organization to map their cybersecurity requirements, mission objectives, and operating methodologies, along with current practices against the subcategories of the Framework Core to create a Current-State Profile. These requirements and objectives can be compared against the current operating state of the organization to gain an understanding of the gaps between the two.

    The creation of these profiles, and the gap analysis allows organizations to create a prioritized implementation plan. The priority, size of gap, and estimated cost of the corrective actions help organizations plan and budget for cybersecurity improvement activities.


Related Solutions

Which of the following transactions would have an immediate positive impact on ROE and ROIC (make...
Which of the following transactions would have an immediate positive impact on ROE and ROIC (make them go up), ignoring depreciation, interest expense, and taxes? a. The company purchases machinery using trade credit for $20,000. b. The company collects $30,000 from customers on accounts receivable c. The company pays off bank-notes payable for $10,000 by rolling short-term debt into long-term debt of 5-year bonds at the same interest rate. d. The company sells common stock for $30,000. e. None of...
The NIST framework core is meant to be meant to be generally applicable. However, organizations have...
The NIST framework core is meant to be meant to be generally applicable. However, organizations have varying security needs depending on their industry, information systems, data assets, etc. How may an organization account for their individual needs when applying the NIST framework?
Identify and describe the three main sections of the HITECH Act that have affected patients' privacy...
Identify and describe the three main sections of the HITECH Act that have affected patients' privacy and security? Accessing the latest material on the websites listed in this chapter, what are the current time periods for the Meaningful Use program under Medicare and Medicaid, respectively
Will a decrease in oil prices have an IMMEDIATE IMPACT on the U.S. real interest rate?...
Will a decrease in oil prices have an IMMEDIATE IMPACT on the U.S. real interest rate? Why or why not?
Describe the types of activities in each of the three main sections of the Statement of...
Describe the types of activities in each of the three main sections of the Statement of Cash Flows and provide two examples. a) Operating b) Investing c) Financing
Explain in detail how open market operations have a direct and immediate impact on the federal...
Explain in detail how open market operations have a direct and immediate impact on the federal funds rate and the money supply.?
Critically analyze the immediate to the medium term (next three years) possible impact of the COVID-19...
Critically analyze the immediate to the medium term (next three years) possible impact of the COVID-19 pandemic on the balance of payments account of Ghana.
Which of the following would tend to have a contractionary impact on the level of macroeconomic...
Which of the following would tend to have a contractionary impact on the level of macroeconomic activity? a) decrease in taxes b) a rise in the interest rate c) an increase in government spending d) an increase in business spending e) an increase in the money supply 59. In which of the following cases would all of the policies be beneficial to an economy in a recession? a) increase the money supply; decrease taxes; decrease government spending. b) increase the...
Describe the components of the ROAMEF framework. Select one component to explain in more detail.
Describe the components of the ROAMEF framework. Select one component to explain in more detail.
Select one of the three scenarios and describe how you would use a systematic sample to...
Select one of the three scenarios and describe how you would use a systematic sample to select the sample. Write your answers in complete sentences. 2-4 sentences should suffice. 1) A group of scientists would like to determine if a new drug shrinks spleen tumors in mice. In order to do this, they select 150 mice and measure the size of their spleen tumors. Then they administer the drug. Then, they measure the size of the spleen tumors afterward. 2....
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT