Начать. Это бесплатно
или регистрация c помощью Вашего email-адреса
NIST Cybersecurity Framework создатель Mind Map: NIST Cybersecurity Framework

1. Protect

1.1. Protective Technology

1.1.1. Communications and control networks are protected

1.2. Identity Management, Authentication and Access Control

1.2.1. Network integrity is protected (e.g., network segregation, network segmentation)

1.3. Data Security

1.3.1. Protections against data leaks are implemented

2. Detect

2.1. Anomalies and Events

2.1.1. A baseline of network operations and expected data flows for

2.1.2. Event data are collected and correlated from multiple sources and sensors

2.1.3. Impact of events is determined

2.2. Security Continuous Monitoring

2.2.1. The network is monitored to detect potential cybersecurity events

2.2.2. Malicious code is detected

2.2.3. External service provider activity is monitored to detect potential cybersecurity events

3. Respond

3.1. Communications

3.1.1. Information is shared consistent with response plans

3.1.1.1. s

3.1.2. Notifications from detection systems are investigated