首页 > 最新文献

Confronting Cyber Risk最新文献

英文 中文
Who Is Responsible for Cybersecurity? 谁对网络安全负责?
Pub Date : 2021-11-18 DOI: 10.1093/oso/9780197526545.003.0005
Gregory Falco, Eric Rosenbach
The question “Who is responsible for cybersecurity?” addresses how cyber risk prevention and resilience is not a one-person show: it takes a village to reduce organizational cyber risk. A case study opens the chapter by examining the immense hack of Equifax and the company’s poor cyber leadership during and after the data breach. It details the importance of strong leadership and educates readers on achieving accountable leadership for cyber risk. Afterward, it teaches readers about an organization’s enterprise information security policy and outlines the components of a cybersecurity culture. Topics include transparency, accountability, appropriate system knowledge, compliance with policy and procedure, and formal communication channels. The chapter guides executives in budgeting and allocating resources to cyber risk management and explains third-party agreements for cyber risk. It also details the importance of cyber talent management. The chapter concludes with Rosenbach’s Embedded Endurance strategy experience with cyber risk leadership at the U.S. Department of Défense.
“谁对网络安全负责?”,阐述了网络风险预防和恢复能力不是一个人的表演:它需要一个村庄来减少组织的网络风险。一个案例研究揭开了这一章的序幕,研究了Equifax遭遇的大规模黑客攻击,以及该公司在数据泄露期间和之后糟糕的网络领导力。它详细介绍了强有力的领导的重要性,并教育读者如何在网络风险方面实现负责任的领导。随后,它向读者介绍了一个组织的企业信息安全政策,并概述了网络安全文化的组成部分。主题包括透明度、问责制、适当的系统知识、对政策和程序的遵守以及正式的沟通渠道。本章指导管理者对网络风险管理进行预算和资源分配,并对网络风险第三方协议进行解释。并详细阐述了网络人才管理的重要性。本章最后介绍了Rosenbach在美国国防部网络风险领导部门的嵌入式耐力战略经验。
{"title":"Who Is Responsible for Cybersecurity?","authors":"Gregory Falco, Eric Rosenbach","doi":"10.1093/oso/9780197526545.003.0005","DOIUrl":"https://doi.org/10.1093/oso/9780197526545.003.0005","url":null,"abstract":"The question “Who is responsible for cybersecurity?” addresses how cyber risk prevention and resilience is not a one-person show: it takes a village to reduce organizational cyber risk. A case study opens the chapter by examining the immense hack of Equifax and the company’s poor cyber leadership during and after the data breach. It details the importance of strong leadership and educates readers on achieving accountable leadership for cyber risk. Afterward, it teaches readers about an organization’s enterprise information security policy and outlines the components of a cybersecurity culture. Topics include transparency, accountability, appropriate system knowledge, compliance with policy and procedure, and formal communication channels. The chapter guides executives in budgeting and allocating resources to cyber risk management and explains third-party agreements for cyber risk. It also details the importance of cyber talent management. The chapter concludes with Rosenbach’s Embedded Endurance strategy experience with cyber risk leadership at the U.S. Department of Défense.","PeriodicalId":176943,"journal":{"name":"Confronting Cyber Risk","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125025643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
What Risk Resilience Measures Can I Use? 我可以使用哪些风险抵御措施?
Pub Date : 2021-11-18 DOI: 10.1093/oso/9780197526545.003.0007
Gregory Falco, Eric Rosenbach
The question “What resilience measures can I use?” addresses how to reduce the impact and consequences of successful cyberattacks. The chapter begins with a case study analyzing how Capital One recovered after being hacked and highlighting how your organization can use planning to facilitate cyber resilience. It illuminates the technical means for enabling resilience from an attack, including virtualization and maintaining backups. It defines a ten-step process for responding to cyberattacks: prevention, planning, preparation, detection, analysis, containment, communication, eradication, recovery, and post-event analysis. The chapter explains how an organization can build a computer security incident response team (CSIRT) to facilitate this process, and what role a cyber crisis communication plan should play. The chapter concludes with Rosenbach’s Embedded Endurance strategy experience supporting the White House in crafting a national cyberattack resilience and response plan.
“我可以使用什么弹性措施?”解决了如何减少成功的网络攻击的影响和后果。本章以一个案例研究开始,分析Capital One在被黑客攻击后如何恢复,并强调您的组织如何使用规划来促进网络弹性。它阐明了从攻击中启用弹性的技术手段,包括虚拟化和维护备份。它定义了应对网络攻击的十步流程:预防、计划、准备、检测、分析、遏制、通信、根除、恢复和事后分析。本章解释了一个组织如何建立一个计算机安全事件响应小组(CSIRT)来促进这一过程,以及网络危机沟通计划应该发挥什么作用。本章总结了罗森巴赫的嵌入式耐力战略经验,支持白宫制定国家网络攻击弹性和响应计划。
{"title":"What Risk Resilience Measures Can I Use?","authors":"Gregory Falco, Eric Rosenbach","doi":"10.1093/oso/9780197526545.003.0007","DOIUrl":"https://doi.org/10.1093/oso/9780197526545.003.0007","url":null,"abstract":"The question “What resilience measures can I use?” addresses how to reduce the impact and consequences of successful cyberattacks. The chapter begins with a case study analyzing how Capital One recovered after being hacked and highlighting how your organization can use planning to facilitate cyber resilience. It illuminates the technical means for enabling resilience from an attack, including virtualization and maintaining backups. It defines a ten-step process for responding to cyberattacks: prevention, planning, preparation, detection, analysis, containment, communication, eradication, recovery, and post-event analysis. The chapter explains how an organization can build a computer security incident response team (CSIRT) to facilitate this process, and what role a cyber crisis communication plan should play. The chapter concludes with Rosenbach’s Embedded Endurance strategy experience supporting the White House in crafting a national cyberattack resilience and response plan.","PeriodicalId":176943,"journal":{"name":"Confronting Cyber Risk","volume":"263 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122161744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How Do I Embed Cyber Risk Management in All Aspects of the Organization? 如何将网络风险管理嵌入组织的各个方面?
Pub Date : 2021-11-18 DOI: 10.1093/oso/9780197526545.003.0008
Gregory Falco, Eric Rosenbach
The question “How do I embed cyber risk management in all aspects of the organization?” addresses how to adopt an Embedded Endurance cyber risk strategy in your day-to-day work as a cyber leader. The chapter begins with a case study about the NotPetya cyberattack, which highlights ongoing challenges in cyber insurance and illuminates the need for embedding cyber mitigation measures across all prioritized critical systems, networks, and data. The chapter describes how to develop an Embedded Endurance cyber risk strategy that is customized for your organization. This chapter walks readers through the key elements of a cyber strategy, from start to finish. This includes defining a risk framework, setting strategic goals, identifying metrics, and establishing strong leadership. The chapter concludes with experiences highlighting the real-world importance of an Embedded Endurance cyber risk strategy from Rosenbach and Falco.
“我如何将网络风险管理嵌入到组织的各个方面?”,阐述了作为网络领导者如何在日常工作中采用嵌入式耐力网络风险策略。本章以NotPetya网络攻击的案例研究开始,该案例强调了网络保险中的持续挑战,并阐明了在所有优先的关键系统、网络和数据中嵌入网络缓解措施的必要性。本章描述了如何开发为您的组织定制的嵌入式持久网络风险策略。本章从头到尾引导读者了解网络战略的关键要素。这包括定义风险框架、设定战略目标、确定度量标准和建立强有力的领导。本章总结了Rosenbach和Falco的经验,强调了嵌入式耐力网络风险策略在现实世界中的重要性。
{"title":"How Do I Embed Cyber Risk Management in All Aspects of the Organization?","authors":"Gregory Falco, Eric Rosenbach","doi":"10.1093/oso/9780197526545.003.0008","DOIUrl":"https://doi.org/10.1093/oso/9780197526545.003.0008","url":null,"abstract":"The question “How do I embed cyber risk management in all aspects of the organization?” addresses how to adopt an Embedded Endurance cyber risk strategy in your day-to-day work as a cyber leader. The chapter begins with a case study about the NotPetya cyberattack, which highlights ongoing challenges in cyber insurance and illuminates the need for embedding cyber mitigation measures across all prioritized critical systems, networks, and data. The chapter describes how to develop an Embedded Endurance cyber risk strategy that is customized for your organization. This chapter walks readers through the key elements of a cyber strategy, from start to finish. This includes defining a risk framework, setting strategic goals, identifying metrics, and establishing strong leadership. The chapter concludes with experiences highlighting the real-world importance of an Embedded Endurance cyber risk strategy from Rosenbach and Falco.","PeriodicalId":176943,"journal":{"name":"Confronting Cyber Risk","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122693295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Who Is Attacking Us?
Pub Date : 2021-11-18 DOI: 10.1093/oso/9780197526545.003.0002
Gregory Falco, Eric Rosenbach
The question “Who is attacking us?” explains cyber threat actors and their motivations for attacking organizations. The chapter begins with a Colonial Pipeline case study that describes the ransomware attack against the U.S. fuel pipeline, a cyberattack on critical U.S. infrastructure. The chapter explains different types of cyberattacks, including social engineering, denial of service, advance persistent threats, brute force attacks, and artificial intelligence attacks. Further, the chapter details the suite of threat actors who launch cyberattacks, including lone hackers, hacktivists, petty criminals, organized criminals, professional criminals, and nation-states. Finally, the chapter describes the importance of sectoral threat intelligence, including Information Sharing and Analysis Centers (ISACs), and types of threats to specific sectors, including finance, healthcare, manufacturing, education, power and utilities, and retail. The chapter concludes with Embedded Endurance strategy lessons from Falco’s experience addressing these issues at NASA’s Jet Propulsion Laboratory.
“谁在攻击我们?”解释了网络威胁行为者及其攻击组织的动机。本章以Colonial Pipeline案例研究开始,该案例描述了针对美国燃料管道的勒索软件攻击,这是对美国关键基础设施的网络攻击。这一章解释了不同类型的网络攻击,包括社会工程、拒绝服务、高级持续威胁、暴力攻击和人工智能攻击。此外,本章还详细介绍了发起网络攻击的一系列威胁行为者,包括单独的黑客、黑客激进分子、轻微罪犯、有组织罪犯、职业罪犯和民族国家。最后,本章描述了部门威胁情报的重要性,包括信息共享和分析中心(ISACs),以及对特定部门的威胁类型,包括金融、医疗保健、制造、教育、电力和公用事业以及零售。本章总结了Falco在NASA喷气推进实验室解决这些问题的经验教训。
{"title":"Who Is Attacking Us?","authors":"Gregory Falco, Eric Rosenbach","doi":"10.1093/oso/9780197526545.003.0002","DOIUrl":"https://doi.org/10.1093/oso/9780197526545.003.0002","url":null,"abstract":"The question “Who is attacking us?” explains cyber threat actors and their motivations for attacking organizations. The chapter begins with a Colonial Pipeline case study that describes the ransomware attack against the U.S. fuel pipeline, a cyberattack on critical U.S. infrastructure. The chapter explains different types of cyberattacks, including social engineering, denial of service, advance persistent threats, brute force attacks, and artificial intelligence attacks. Further, the chapter details the suite of threat actors who launch cyberattacks, including lone hackers, hacktivists, petty criminals, organized criminals, professional criminals, and nation-states. Finally, the chapter describes the importance of sectoral threat intelligence, including Information Sharing and Analysis Centers (ISACs), and types of threats to specific sectors, including finance, healthcare, manufacturing, education, power and utilities, and retail. The chapter concludes with Embedded Endurance strategy lessons from Falco’s experience addressing these issues at NASA’s Jet Propulsion Laboratory.","PeriodicalId":176943,"journal":{"name":"Confronting Cyber Risk","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129783289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Conclusion 结论
Pub Date : 2021-11-18 DOI: 10.1093/oso/9780197526545.003.0009
Gregory Falco, Eric Rosenbach
The conclusion summarizes the importance of an Embedded Endurance cyber risk strategy and the steps you can take to design and implement your own. The Embedded Endurance cyber risk strategy you will build focuses on implementing mitigation measures that include prevention and resilience. The chapter describes how even in an evolving cyber risk landscape, the concepts described in the Embedded Endurance cyber risk strategy will remain foundational. The chapter concludes with “cryptograms” from the future, in which organizational leaders confront the next generation of cyber risk challenges. The cryptograms encourage readers to apply the lessons learned and extend these Embedded Endurance strategy lessons to the future.
结论总结了嵌入式耐久性网络风险策略的重要性,以及您可以采取的设计和实施自己的步骤。您将构建的嵌入式耐久性网络风险战略侧重于实施缓解措施,包括预防和恢复能力。本章描述了即使在不断变化的网络风险环境中,嵌入式耐力网络风险战略中描述的概念仍将是基础。本章以未来的“密码学”作为结尾,组织领导者将面临下一代网络风险挑战。这些密码鼓励读者应用所学到的经验教训,并将这些嵌入式耐久性策略的经验教训扩展到未来。
{"title":"Conclusion","authors":"Gregory Falco, Eric Rosenbach","doi":"10.1093/oso/9780197526545.003.0009","DOIUrl":"https://doi.org/10.1093/oso/9780197526545.003.0009","url":null,"abstract":"The conclusion summarizes the importance of an Embedded Endurance cyber risk strategy and the steps you can take to design and implement your own. The Embedded Endurance cyber risk strategy you will build focuses on implementing mitigation measures that include prevention and resilience. The chapter describes how even in an evolving cyber risk landscape, the concepts described in the Embedded Endurance cyber risk strategy will remain foundational. The chapter concludes with “cryptograms” from the future, in which organizational leaders confront the next generation of cyber risk challenges. The cryptograms encourage readers to apply the lessons learned and extend these Embedded Endurance strategy lessons to the future.","PeriodicalId":176943,"journal":{"name":"Confronting Cyber Risk","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130717970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
What Risk Prevention Measures Can I Use? 我可以采取哪些风险预防措施?
Pub Date : 2021-11-18 DOI: 10.1093/oso/9780197526545.003.0006
Gregory Falco, Eric Rosenbach
The question “What risk prevention measures can I use?” describes how to reduce the likelihood of a cyberattack on your organization. The chapter begins with a case study on the SolarWinds hack exemplifying how prevention measures on a specific system, network, or data cannot be effective on their own. The chapter describes why cyber risk management needs to be embedded across all facets of the organization, and how the Embedded Endurance strategy can help readers achieve that. It reviews system security prevention measures that include patch management and antivirus software. It explains network security prevention measures, including intrusion detection and intrusion prevention systems. The chapter also describes data risk prevention measures such as data governance, encryption, and data loss prevention technology, and highlights the importance of physical security for reducing cyber risk. The chapter concludes with Falco’s Embedded Endurance strategy insight on risk prevention gained at his industrial Internet-of-Things security company.
“我可以使用哪些风险预防措施?”,描述了如何降低组织遭受网络攻击的可能性。本章以SolarWinds黑客攻击的案例研究开始,举例说明了针对特定系统、网络或数据的预防措施如何无法单独有效。本章描述了为什么网络风险管理需要嵌入到组织的各个方面,以及嵌入式持久性战略如何帮助读者实现这一目标。介绍系统安全防护措施,包括补丁管理和防病毒软件。介绍了网络安全防护措施,包括入侵检测和入侵防御系统。介绍了数据治理、数据加密、数据防丢失技术等数据风险防范措施,强调了物理安全对于降低网络风险的重要性。本章以Falco在其工业物联网安全公司获得的关于风险预防的嵌入式耐力战略见解作为结语。
{"title":"What Risk Prevention Measures Can I Use?","authors":"Gregory Falco, Eric Rosenbach","doi":"10.1093/oso/9780197526545.003.0006","DOIUrl":"https://doi.org/10.1093/oso/9780197526545.003.0006","url":null,"abstract":"The question “What risk prevention measures can I use?” describes how to reduce the likelihood of a cyberattack on your organization. The chapter begins with a case study on the SolarWinds hack exemplifying how prevention measures on a specific system, network, or data cannot be effective on their own. The chapter describes why cyber risk management needs to be embedded across all facets of the organization, and how the Embedded Endurance strategy can help readers achieve that. It reviews system security prevention measures that include patch management and antivirus software. It explains network security prevention measures, including intrusion detection and intrusion prevention systems. The chapter also describes data risk prevention measures such as data governance, encryption, and data loss prevention technology, and highlights the importance of physical security for reducing cyber risk. The chapter concludes with Falco’s Embedded Endurance strategy insight on risk prevention gained at his industrial Internet-of-Things security company.","PeriodicalId":176943,"journal":{"name":"Confronting Cyber Risk","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127807836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
What Do I Need to Know About Cyber Frameworks, Standards, and Laws? 关于网络框架、标准和法律我需要知道什么?
Pub Date : 2021-11-18 DOI: 10.1093/oso/9780197526545.003.0004
Gregory Falco, Eric Rosenbach
The question “What do I need to know about cyber frameworks, standards, and laws?” distills the complex landscape of cyber risk laws, requirements, and standards. The chapter begins with a case study on Nielsen Holdings’ legal and business trouble with the European General Data Protection Regulation (GDPR). It distinguishes compliance from security—explaining how readers can achieve both—and clarifies the dynamic, complex legal landscape in a world of ever-evolving cyber risk. It reviews legislation relating to cyber risk including the Health Insurance Portability and Accountability Act (HIPAA), the Gramm-Leach-Bliley Act (GBLA), the Federal Information Security Management Act (FISMA), and GDPR. The chapter describes the importance of adopting the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework, creating a cyber policy/act/law/regulation “watch list” and purchasing cyber insurance. At the chapter’s end Falco shares Embedded Endurance strategy insight from his experience leading a team developing a cyber standard of care.
“关于网络框架、标准和法律,我需要知道些什么?”,提炼了网络风险法律、要求和标准的复杂图景。本章以尼尔森控股在欧洲通用数据保护条例(GDPR)方面的法律和商业麻烦的案例研究开始。它区分了合规性和安全性——解释了读者如何实现两者——并阐明了在一个不断演变的网络风险世界中动态的、复杂的法律环境。它审查了与网络风险相关的立法,包括《健康保险流通与责任法案》(HIPAA)、《格雷姆-里奇-比利利法案》(GBLA)、《联邦信息安全管理法》(FISMA)和《通用数据保护条例》(GDPR)。本章描述了采用美国国家标准与技术研究院(NIST)网络安全框架、创建网络政策/法案/法律/法规“观察名单”和购买网络保险的重要性。在本章的最后,Falco分享了他从领导团队开发网络护理标准的经验中获得的嵌入式耐力战略见解。
{"title":"What Do I Need to Know About Cyber Frameworks, Standards, and Laws?","authors":"Gregory Falco, Eric Rosenbach","doi":"10.1093/oso/9780197526545.003.0004","DOIUrl":"https://doi.org/10.1093/oso/9780197526545.003.0004","url":null,"abstract":"The question “What do I need to know about cyber frameworks, standards, and laws?” distills the complex landscape of cyber risk laws, requirements, and standards. The chapter begins with a case study on Nielsen Holdings’ legal and business trouble with the European General Data Protection Regulation (GDPR). It distinguishes compliance from security—explaining how readers can achieve both—and clarifies the dynamic, complex legal landscape in a world of ever-evolving cyber risk. It reviews legislation relating to cyber risk including the Health Insurance Portability and Accountability Act (HIPAA), the Gramm-Leach-Bliley Act (GBLA), the Federal Information Security Management Act (FISMA), and GDPR. The chapter describes the importance of adopting the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework, creating a cyber policy/act/law/regulation “watch list” and purchasing cyber insurance. At the chapter’s end Falco shares Embedded Endurance strategy insight from his experience leading a team developing a cyber standard of care.","PeriodicalId":176943,"journal":{"name":"Confronting Cyber Risk","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129495998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Why Is Cyber Risk an Issue? 为什么网络风险是一个问题?
Pub Date : 2021-11-18 DOI: 10.1093/oso/9780197526545.003.0001
Gregory Falco, Eric Rosenbach
The question “Why is cyber risk an issue?” pinpoints the leadership challenge that cyber risk poses. The chapter begins with a WannaCry case study that demonstrates how cyberattacks can impact every aspect of organizations given the pervasive nature of digital systems. The chapter describes how leadership must address cyber risk by analyzing the organization’s unique threats, its vulnerabilities, and the impact an attack can have on the organization. It describes how mitigation measures minimize cyber vulnerabilities and maximize an organization’s ability to respond to cyberattacks. It emphasizes that leadership must strategically manage cyber risk through carefully selected mitigations. This chapter introduces how an Embedded Endurance cyber risk strategy offers a systems-level approach to mitigating cyber risk by addressing interdependent components of the organization’s risk and preparing for the inevitability of cyber threats over the long term, and details real-world Embedded Endurance cyber risk strategy experiences.
“为什么网络风险是个问题?”准确地指出了网络风险带来的领导力挑战。本章以一个WannaCry案例研究开始,该案例研究表明,鉴于数字系统的普遍性,网络攻击如何影响组织的各个方面。本章描述了领导层必须如何通过分析组织的独特威胁、漏洞以及攻击对组织的影响来应对网络风险。它描述了缓解措施如何最大限度地减少网络漏洞并最大限度地提高组织应对网络攻击的能力。报告强调,领导层必须通过精心选择的缓解措施,战略性地管理网络风险。本章介绍了嵌入式耐久性网络风险策略如何通过解决组织风险的相互依赖组成部分,并为长期不可避免的网络威胁做好准备,提供系统级方法来降低网络风险,并详细介绍了实际的嵌入式耐久性网络风险策略经验。
{"title":"Why Is Cyber Risk an Issue?","authors":"Gregory Falco, Eric Rosenbach","doi":"10.1093/oso/9780197526545.003.0001","DOIUrl":"https://doi.org/10.1093/oso/9780197526545.003.0001","url":null,"abstract":"The question “Why is cyber risk an issue?” pinpoints the leadership challenge that cyber risk poses. The chapter begins with a WannaCry case study that demonstrates how cyberattacks can impact every aspect of organizations given the pervasive nature of digital systems. The chapter describes how leadership must address cyber risk by analyzing the organization’s unique threats, its vulnerabilities, and the impact an attack can have on the organization. It describes how mitigation measures minimize cyber vulnerabilities and maximize an organization’s ability to respond to cyberattacks. It emphasizes that leadership must strategically manage cyber risk through carefully selected mitigations. This chapter introduces how an Embedded Endurance cyber risk strategy offers a systems-level approach to mitigating cyber risk by addressing interdependent components of the organization’s risk and preparing for the inevitability of cyber threats over the long term, and details real-world Embedded Endurance cyber risk strategy experiences.","PeriodicalId":176943,"journal":{"name":"Confronting Cyber Risk","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127373218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How Do I Assess Our Cyber Risk? 如何评估我们的网络风险?
Pub Date : 2021-11-18 DOI: 10.1093/oso/9780197526545.003.0003
Gregory Falco, Eric Rosenbach
The question “How do I assess our cyber risk?” addresses how to identify and characterize cyber risk unique to an organization’s critical systems, networks, and data. The chapter begins with a case study about a cyberattack on Ukraine’s electric grid. It details risk assessment for three types of critical systems: mission-critical systems, business-critical systems, and safety-critical systems. It explains the three types of networks critical to many organizations: business and administrative networks, operational and service delivery networks, and communication networks. In outlining the “CIA triad,” it shows how cyber risk can be characterized as a confidentiality, integrity, or availability issue relating to digital assets. Further, it describes how to assess the importance of different digital assets and how to prioritize them using a business impact analysis (BIA). The chapter concludes with real-world Embedded Endurance strategy lessons Rosenbach gained in Saudi Arabia in the wake of one of the world’s most destructive cyberattacks.
“我如何评估我们的网络风险?”解决了如何识别和描述组织的关键系统、网络和数据所特有的网络风险。本章以一个关于乌克兰电网网络攻击的案例研究开始。它详细介绍了三类关键系统的风险评估:任务关键系统、业务关键系统和安全关键系统。它解释了对许多组织至关重要的三种类型的网络:业务和管理网络,运营和服务交付网络,以及通信网络。在概述“CIA三位一体”时,它展示了网络风险如何被描述为与数字资产相关的机密性、完整性或可用性问题。此外,它还描述了如何评估不同数字资产的重要性,以及如何使用业务影响分析(BIA)对它们进行优先排序。这一章的最后是Rosenbach在沙特阿拉伯经历了世界上最具破坏性的网络攻击后获得的现实世界的嵌入式耐力战略经验。
{"title":"How Do I Assess Our Cyber Risk?","authors":"Gregory Falco, Eric Rosenbach","doi":"10.1093/oso/9780197526545.003.0003","DOIUrl":"https://doi.org/10.1093/oso/9780197526545.003.0003","url":null,"abstract":"The question “How do I assess our cyber risk?” addresses how to identify and characterize cyber risk unique to an organization’s critical systems, networks, and data. The chapter begins with a case study about a cyberattack on Ukraine’s electric grid. It details risk assessment for three types of critical systems: mission-critical systems, business-critical systems, and safety-critical systems. It explains the three types of networks critical to many organizations: business and administrative networks, operational and service delivery networks, and communication networks. In outlining the “CIA triad,” it shows how cyber risk can be characterized as a confidentiality, integrity, or availability issue relating to digital assets. Further, it describes how to assess the importance of different digital assets and how to prioritize them using a business impact analysis (BIA). The chapter concludes with real-world Embedded Endurance strategy lessons Rosenbach gained in Saudi Arabia in the wake of one of the world’s most destructive cyberattacks.","PeriodicalId":176943,"journal":{"name":"Confronting Cyber Risk","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124725510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Confronting Cyber Risk
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1