Security Capabilities of Information Systems
Today’s information systems include individual servers, cloud-based systems, IoT, industrial control systems, and virtualized computing. This diverse range of architectures means there is also a diverse range of policies, practices, and technologies, and security professionals are tasked with protecting these architectures from ransomware attacks, loss of privacy data, and other exploits.
This section describes practices that are used by security professionals to properly deploy security engineering policies, standards, processes, and technologies for organizations.
Security Engineering Standards
Although every organization and IT architecture is different, there are many commonalities in the risks they face. Though targeted attacks are common, the methods that malicious actors use are replicated across the IT landscape. To create consistency and best practices in cybersecurity, organizations such as the US National Institute...