Computer systems, network systems, and critical data are protected from outside attacks by cyber security, which is described as a body or combination of technologies, procedures, and practices. Frameworks are believed to be pre-defined structures that may be used several times. In this post, we'll go over the significance of cyber security as well as a comprehensive breakdown of the various cyber security frameworks.
In today’s article we will discuss the importance of Cyber Security and a list of all Cyber Security frameworks in detail:
Cyber Security is a body or a combination of technologies, processes, and practices that are defined and designed to protect computer systems, network systems and vital data from outside threats.
It regulates unauthorized access to the network. In the computing world, security generally refers to Cyber Security and physical security.
In terms of software terminology, a framework is considered to be a defined structure which can be utilized several times. A framework is a base structure where the teams can consume this and build further something useful.
As discussed earlier, a framework is a defined structure or a set of rules and regulations that the team can consume and build something useful. In the same way, Information Security framework is nothing but documented processes. It is utilized to define policies and procedures while implementing or managing information security controls within an organization.
The following is a snapshot of all the list of Cyber Security Frameworks that exists and explained in detail as we go through the article.
National Institute of Standards and Technology
Control Objectives for Information and Related Technologies
Committee of Sponsoring Organizations of the Treadway Commission
North American Electric Reliability Corporation
Technical Committee on CyberSecurity
Health Information Trust Alliance
Let us discuss these frameworks in detail one by one:
National Institute of Standards and Technology.
This framework was built by considering numerous security professionals from different businesses and put together a standard rules and regulations process which has finally designed into a framework.
It is not a standard checklist that one will check and mark it as completed during each phase of completion. Instead, it focuses on assessing the current situation
How to assess the security
How to consider risk
How to resolve the security threats
The framework is more associated and helps the individuals to take appropriate decision and also help the team to communicate about the security measures, risks involved etc
This framework concentrates on cyber-secure management, communication between internal and external environments, improving and updating security policies etc.
The five core factors that are involved while designing this framework are:
Understanding the above core elements will benefit the organization and the policies will be built according to the problem areas itself.
Related Article: Cyber Security Strategy Template
Control Objectives for Information and Related Technologies
It is one of security framework which includes good aspects of business practices into IT management, governance, and security. It was built by ISACA, i.e. Information Systems Audit and Control Association. It is an international association of professionals focused on IT security governance.
This framework is helpful for organizations who are planning to improve their security and quality of production.
This framework is built on the following factors:
Need to meet stakeholder expectations
End to end process control of the enterprise
It is a single integrated framework
Management and Governance are two different things
Leave an Inquiry to learn Cyber Security Training in Hyderabad
This framework has been set by the International Standards Organization (ISO) and International Electrotechnical Commission (IEC).
The origin of this framework was the British Standard BS 7799 but later got into several updates and modifications and finally got to ISO/IEC 27001:2013.
It caters towards high-level security management and implementation guide that accepts industry-level best practices for Cybersecurity
The framework will the organization to consider all aspects of cybersecurity process and involves the following:
Physical and environmental security
Access control and Access Management
IT security practices
Incident management and Compliance
Using this framework, it provides suggestions to hundreds of security controls that can be implemented within the organizations which will be addressed. All the issues will be addressed while risk management and evaluation
Related Article: Cyber Security Career Path
The Committee of Sponsoring Organizations of the Treadway Commission.
1. This framework is built by 5 popular associations go together, they are :
IMA, The Institute of Management Accountants
AAA, the American Accounting Association
AICPA, the American Institute of Certified Public Accountants
IIA, the Institute of Internal Auditors
FEI, Financial Executives International
2. This framework is built on the following core points, i.e. monitoring, controlling, auditing, reporting etc
3. This framework has 17th core points which are categorized into five categories they are :
Information & communication
Monitoring and Controlling
These concepts are combined and the policies are built which will be adopted by the employees and also customize it according to the business structure which will eventually help their functional and operational units.
The North American Electric Reliability Corporation.
This framework is developed which focuses on developing and enforcing reliability standards and performance-oriented inputs
This framework is developed to ensure that the electric grids are followed by certain standards. But in general, this framework can be adopted by any of the industry in specific.
Leave an Inquiry to learn Cyber Security Training in Houston
The Technical Committee on Cyber Security.
This framework is developed to cater to improvement within Telecommunications standards in the European zone.
Though this framework was developed specifically for the European zone it can be easily adopted worldwide.
This framework focuses more on increase privacy awareness and provides improved security towards both individuals and organizations.
The Health Information Trust Alliance.
This framework was built by a private sector organization which caters towards Healthcare and IT security industries. Evolution of these privately-held organizations has helped to evolve the Common Security Framework.
This framework addresses how to improve security, risk-based implementing security infrastructure, discuss alternate control options
So far we have seen different types of security frameworks that are available in the current market so that the organizations can leverage and start building up their security infrastructure. But in reality, no one security framework is enough to build a real-time security policy because every organization is different and it is a fundamental reason why there are no common security frameworks that are set as a standard.
One has to make sure that as an organization one has to plan and develop Cyber Security policies so that each and every level of employee is taken into consideration while developing security protocols. If not each and every individual sees Cyber Security from a different perspective and if that is the case the entire organization's security is in jeopardy.
Stay updated with our newsletter, packed with Tutorials, Interview Questions, How-to's, Tips & Tricks, Latest Trends & Updates, and more ➤ Straight to your inbox!
|Cyber Security Training||Nov 01 to Nov 16|
|Cyber Security Training||Nov 05 to Nov 20|
|Cyber Security Training||Nov 08 to Nov 23|
|Cyber Security Training||Nov 12 to Nov 27|
Sandeep is working as a Senior Content Contributor for Mindmajix, one of the world’s leading online learning platforms. With over 5 years of experience in the technology industry, he holds expertise in writing articles on various technologies including AEM, Oracle SOA, Linux, Cybersecurity, and Kubernetes. Follow him on LinkedIn and Twitter.
Copyright © 2013 - 2022 MindMajix Technologies