Cybersecurity Risk Management. Cynthia Brumfield
Чтение книги онлайн.
Читать онлайн книгу Cybersecurity Risk Management - Cynthia Brumfield страница 3
2 Chapter 1FIGURE 1.1 HARDWARE ASSETS.FIGURE 1.2 DETERMINING THREAT LIKELIHOOD.
3 Chapter 6FIGURE 6.1 FUNCTION AND CATEGORY UNIQUE IDENTIFIERS.FIGURE 6.2 FUNCTION AND CATEGORY UNIQUE PROTECTION ELEMENTS.FIGURE 6.3 FUNCTION AND CATEGORY UNIQUE DETECTION ELEMENTS.FIGURE 6.4 FUNCTION AND CATEGORY UNIQUE109 RESTORE ELEMENTS.FIGURE 6.5 FUNCTION AND CATEGORY UNIQUE RECOVERY ELEMENTS.
Guide
1 Cover
5 Table of Contents
8 Preface – Overview of the NIST Framework
11 Appendix B: Critical Security Controls Version 8.0 Mapped to NIST CSF v1.1
13 Index
Pages
1 i
2 ii
3 iii
4 iv
5 v
6 vi
7 vii
8 viii
9 ix
10 x
11 xi
12 xii
13 xiii
14 xiv
15 xv
16 xvi
17 xvii
18 xviii
19 xix
20 xx
21 xxi
22 xxii
23 xxiii
24 xxiv
25 1
26 2
27 3
28 4
29 5
30 6
31 7
32 8
33 9
34 10
35 11
36 12