A comprehensive guide to the NIST cybersecurity framework 2.0 : strategies, implementation, and best practice / Jason Edwards.

By: Edwards, Jason (Cybersecurity expert) [author.]
Language: English Publisher: Hoboken, NJ : Wiley, 2024Description: 1 online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9781394280360Subject(s): Computer security -- StandardsGenre/Form: Electronic books.DDC classification: 005.802/1873 LOC classification: QA76.9.A25 | E3883 2024Online resources: Full text is available at Wiley Online Library Click here to view Summary: "The NIST Cybersecurity Framework, developed by the National Institute of Standards and Technology, is pivotal in standardizing cybersecurity risk management, particularly for critical infrastructure. It emerged from a U.S. Presidential directive in 2014, aiming to establish a unified approach to combat escalating cyber threats to national security and economic stability. Since its inception, the Framework has evolved, integrating new best practices and user feedback, to stay abreast of the dynamic cyber threat landscape. Its adaptability has led to widespread implementation across various industries, extending its influence beyond the United States."-- Provided by publisher.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Home library Call number Status Date due Barcode Item holds
EBOOK EBOOK COLLEGE LIBRARY
COLLEGE LIBRARY
005.8021873 Ed967 2024 (Browse shelf) Available (In Process)
Total holds: 0

Includes index.

"The NIST Cybersecurity Framework, developed by the National Institute of Standards and Technology, is pivotal in standardizing cybersecurity risk management, particularly for critical infrastructure. It emerged from a U.S. Presidential directive in 2014, aiming to establish a unified approach to combat escalating cyber threats to national security and economic stability. Since its inception, the Framework has evolved, integrating new best practices and user feedback, to stay abreast of the dynamic cyber threat landscape. Its adaptability has led to widespread implementation across various industries, extending its influence beyond the United States."-- Provided by publisher.

There are no comments for this item.

to post a comment.