Couverture de Ransomware Risk Management

Ransomware Risk Management

A Cybersecurity Framework Profile

Aperçu

Bénéficiez gratuitement de Standard pendant 30 jours

5,99 €/mois après la période d’essai. Annulation possible à tout moment
Essayez pour 0,00 €
Plus d'options d'achat

Ransomware Risk Management

De : National Institute of Standards and Technology
Lu par : Tom Brooks
Essayez pour 0,00 €

Renouvellement automatique à 5,99 € mois après 30 jours. Annulation possible chaque mois.

Acheter pour 8,86 €

Acheter pour 8,86 €

À propos de ce contenu audio

Reports on Computer Systems Technology

The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the US economy and public welfare by providing technical leadership for the nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analyses to advance the development and productive use of information technology. ITL’s responsibilities include the development of management, administrative, technical, and physical standards and guidelines for the cost-effective security and privacy of other than national security-related information in federal information systems.

Abstract ransomware is a type of malicious attack where attackers encrypt an organization’s data and demand payment to restore access. Attackers may also steal an organization’s information and demand an additional payment in return for not disclosing the information to authorities, competitors, or the public. This ransomware profile identifies the Cybersecurity Framework Version 1.1 security objectives that support identifying, protecting against, detecting, responding to, and recovering from ransomware events. The profile can be used as a guide to managing the risk of ransomware events. That includes helping to gauge an organization’s level of readiness to counter ransomware threats and to deal with the potential consequences of events.

PLEASE NOTE: When you purchase this title, the accompanying PDF will be available in your Audible Library along with the audio.

©2022 Tom Brooks (P)2022 Tom Brooks
Ingénierie Sécurité et cryptage
Aucun commentaire pour le moment