I do agree with the assertion of this article since those three functions covers
Discussion
.
Respond to two colleagues (BELOW): (Half a page each and provide each reference separately)
Discussion Topic
Within the Topic 1 article “NIST Cybersecurity Framework Aims to Improve Critical Infrastructure,” the author describes the three parts of the cybersecurity framework and how it can help an organization address its security program and manage cybersecurity threats. Identify and explain those three steps. Do you agree or disagree with the assertion? Why or why not? Provide a rationale for your answer.
Post from colleague 1
There are three main parts within NIST which are framework core, framework profile, and the framework implementation tiers. The core is a synopsis of what the organization is performing within their security management activities. Within the core there are five functionalities which are identify, protect, detect, respond, and recover. Then there is the framework profile that quantifies how well the core framework is being implemented. It is able to quantify if the anticipated outcome is being achieved by comparing the organizations current state with what they are targeting. Lastly there is the framework implementation tiers which is about management of cybersecurity within an organization.
I do agree with the assertion of this article since those three functions covers how management is aiming for their goals, how well they manage their security system, and have a clear focus on what they should do to better their system. Those five functions within the core really stands out to me since it’s a great attributes that every organization should analyze within their company. How they identify, protect, detect, respond and recover are all attributes that other businesses as well as consumers take into consideration when involving their time and resources (Mustard, 2014). While NIST isn’t for every company, each should at least be taking into account of all the beneficial information this law has to offer to improve their cybersecurity. Whether it be simply to review what they have to see if it aligns, organizations need to make time for their network security.
References
Mustard, S. s. (2014). NIST Cybersecurity Framework Aims to Improve Critical Infrastructure. Power, 158(2), 49-51.
Post from colleague 2
The first part is the Framework Core and it centers around security measures that organizations should have in place. They include five functions. These functions are identify, protect, detect, respond and recover. These steps include risk management and staff training as well as awareness. The next portion is the Framework Profile. It is a set of goals or image that the organization decides to adopt. The final part is the implementation. This includes how the organization manages cybersecurity. It consists of four tiers which are: adaptive, repeatable, risk informed and partial (Mustard, 2014).
The author makes a strong argument that the implementation of the Framework will improve security across the industry. Its weaknesses hinge on the ability of organizations to implement the framework. Detractors of the Framework are missing the bigger picture. Any organization that takes the Framework, follows it on principle and implements their cybersecurity strategy is surely better off than those that do nothing in addition to their current practices. It provides a common language that simplifies the concepts of cybersecurity (Nili, 2014). The Framework fits the bigger picture of cybersecurity by providing sound strategic advice that can be modified by organizations to suit their individual needs. A recent survey from the SANS institute showed that of those survey, the majority use the Framework as their principle cybersecurity stratagem (Anderson, 2020).
Anderson, E. (2020). HOW TO COMPLY IN 2020 WITH THE 5 FUNCTIONS OF THE NIST CYBERSECURITY FRAMEWORK. Retrieved from https://www.forescout.com/company/blog/how-to-comply-with-the-5-functions-of-the-nist-cybersecurity-framework/
Mustard, S. (2014). NIST Cybersecurity Framework Aims to Improve Critical Infrastructure. Power, 158(2), 49–51.
Nili, Y. (2014). Understanding and Implementing the NIST Cybersecurity Framework. Retrieved from
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.