Muutke küpsiste eelistusi

Framework for Programming and Budgeting for Cybersecurity [Pehme köide]

  • Formaat: Paperback / softback, 74 pages, kõrgus x laius x paksus: 279x214x5 mm, kaal: 227 g
  • Ilmumisaeg: 26-Feb-2016
  • Kirjastus: RAND
  • ISBN-10: 0833092561
  • ISBN-13: 9780833092564
  • Formaat: Paperback / softback, 74 pages, kõrgus x laius x paksus: 279x214x5 mm, kaal: 227 g
  • Ilmumisaeg: 26-Feb-2016
  • Kirjastus: RAND
  • ISBN-10: 0833092561
  • ISBN-13: 9780833092564
This report explains the menu of actions for defending an organization against cyberattack and recommends an approach for organizing the range of actions and evaluating cybersecurity defensive activities.
Preface iii
Figures
vii
Summary ix
Acknowledgments xiii
Abbreviations xv
Chapter One Motivation
1(4)
Chapter Two Core Concepts
5(8)
Goal: Reduce the Expected Cost of Cyberattacks
7(3)
Ring 1 Four Basic Strategies
9(1)
The Basis of Our Approach
10(1)
The Benefits of Our Approach
10(3)
Chapter Three Ring 2
13(8)
Ring 2 Minimize Exposure
13(2)
Ring 2 Neutralize Attacks
15(2)
Ring 2 Increase Resilience
17(1)
Ring 2 Accelerate Recovery
18(3)
Chapter Four Ring 3
21(28)
Ring 3 Resilience → Take Resilience Steps
21(1)
Ring 3 Resilience → Conform to Resilience Guidelines
22(1)
Ring 3 Resilience → Improve Cross-System Engineering
23(1)
Ring 3 Recovery → Generate Rapid Response Plans
24(1)
Ring 3 Recovery → Increase Response Competence
25(1)
Ring 3 Recovery → Build the Ability to Restore Systems
25(1)
Ring 3 Exposure → Reduce the Number of Networked Machines
26(1)
Ring 3 Neutralize Attack → Reduce the Number of Cyberattack Attempts
27(2)
Ring 3 Neutralize Attack → Counter the Insider Threat
29(1)
Ring 3 Neutralize Attack → Develop Mitigations for Specific Known Threats
30(1)
Ring 3 Neutralize Attack → Block Cyberattacks
30(4)
Ring 3 Neutralize Attack → Ensure the Quality of a System's Hardware and Software
34(4)
Ring 3 Neutralize Attack → Systematically Reduce Risks Inherent in the Network
38(2)
Ring 3 Neutralize Attack → Improve the Security-Related Competence of System Administrators
40(4)
Ring 3 Neutralize Attack → Test Systems Against Simulated Attacks
44(1)
Ring 3 Neutralize Attack → Defend Against DDOS Attacks
45(1)
Ring 3 Neutralize Attack → Reduce the Amount of Material Exfiltrated by Attacks
46(3)
Chapter Five Using This Work
49(4)
Auditing Mechanism
49(1)
Prescriptive Mechanism
49(1)
Improving the Cyberdefensive Actions
50(1)
Applying the Model to Broader IT Compliance Efforts
51(2)
Chapter Six Conclusion
53(2)
References 55