CHAPTER 12: MANAGE AND PROTECT

Deploy risk-appropriate information security measures – relying on people, processes and technology – to protect the CIA of your information assets, business processes and infrastructure.

‘Manage and protect’, the first and largest process category of the CRF, consists of activities that are central to managing cyber security and protecting the organisation from threats. Of course, in order for your defensive measures to be effective, you need to know what those threats are. By this we do not mean in a generic way, as discussed in part 2 of this book, but specifically those that apply to you. You need to understand who might attack you and how, and what their motivations are.

What line of business are you in? ...

Get The Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.