Practical Align Overview of the Main Frameworks Used by the Companies to Prevent Cyber Incidents

Rogério Yukio Iwashita, Luiz Camolesi Júnior
{"title":"Practical Align Overview of the Main Frameworks Used by the Companies to Prevent Cyber Incidents","authors":"Rogério Yukio Iwashita, Luiz Camolesi Júnior","doi":"10.4018/978-1-7998-5728-0.ch024","DOIUrl":null,"url":null,"abstract":"Among the biggest cybercrime or information security challenges, the information security professionals must be up to date with the new risks, cases, and different ways of attacks. Being up to date in this complex and aggressive scenario is a huge challenge and is a necessity to the security professional to fight against the cybercriminals. Additionally, based on this standard of requisites to start an information security program, an immature professional may be confused on the different frameworks used by the industries, mainly ISO/IEC 27000 family, NIST 800-53, NIST Cybersecurity Framework, COBIT, etc. This chapter will help the information security professional to decide where is important to focus efforts, to decide what is feasible and which control does not demand any additional investment. Additionally, this grade helps the InfoSec professionals to compare the information security maturity level within the companies and between the companies, comparing with benchmarks.","PeriodicalId":115612,"journal":{"name":"Handbook of Research on Cyber Crime and Information Privacy","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Handbook of Research on Cyber Crime and Information Privacy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/978-1-7998-5728-0.ch024","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Among the biggest cybercrime or information security challenges, the information security professionals must be up to date with the new risks, cases, and different ways of attacks. Being up to date in this complex and aggressive scenario is a huge challenge and is a necessity to the security professional to fight against the cybercriminals. Additionally, based on this standard of requisites to start an information security program, an immature professional may be confused on the different frameworks used by the industries, mainly ISO/IEC 27000 family, NIST 800-53, NIST Cybersecurity Framework, COBIT, etc. This chapter will help the information security professional to decide where is important to focus efforts, to decide what is feasible and which control does not demand any additional investment. Additionally, this grade helps the InfoSec professionals to compare the information security maturity level within the companies and between the companies, comparing with benchmarks.
公司用于防止网络事件的主要框架的实用对齐概述
在最大的网络犯罪或信息安全挑战中,信息安全专业人员必须及时了解新的风险、案例和不同的攻击方式。在这种复杂而激进的情况下保持最新状态是一个巨大的挑战,对于安全专业人员来说,打击网络罪犯是必要的。此外,基于该标准启动信息安全计划的必要条件,不成熟的专业人员可能会对行业使用的不同框架感到困惑,主要是ISO/IEC 27000系列,NIST 800-53, NIST网络安全框架,COBIT等。本章将帮助信息安全专业人员决定哪些是重要的重点努力,决定什么是可行的,哪些控制不需要任何额外的投资。此外,该等级有助于信息安全专业人员比较公司内部和公司之间的信息安全成熟度水平,并与基准进行比较。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信