December 2020
Intermediate to advanced
361 pages
6h 26m
English
Deploy risk-appropriate information security measures – relying on people, processes and technology – to protect the CIA of your information assets, business processes and infrastructure.
‘Manage and protect’, the first and largest process category of the CRF, consists of activities that are central to managing cyber security and protecting the organisation from threats. Of course, in order for your defensive measures to be effective, you need to know what those threats are. By this we do not mean in a generic way, as discussed in part 2 of this book, but specifically those that apply to you. You need to understand who might attack you and how, and what their motivations are.
What line of business are you in? ...