Practical Align Overview of the Main Frameworks Used by the Companies to Prevent Cyber Incidents

Practical Align Overview of the Main Frameworks Used by the Companies to Prevent Cyber Incidents

Rogério Yukio Iwashita, Luiz Camolesi Junior
Copyright: © 2022 |Pages: 29
DOI: 10.4018/978-1-6684-3698-1.ch022
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Among the biggest cybercrime or information security challenges, the information security professionals must be up to date with the new risks, cases, and different ways of attacks. Being up to date in this complex and aggressive scenario is a huge challenge and is a necessity to the security professional to fight against the cybercriminals. Additionally, based on this standard of requisites to start an information security program, an immature professional may be confused on the different frameworks used by the industries, mainly ISO/IEC 27000 family, NIST 800-53, NIST Cybersecurity Framework, COBIT, etc. This chapter will help the information security professional to decide where is important to focus efforts, to decide what is feasible and which control does not demand any additional investment. Additionally, this grade helps the InfoSec professionals to compare the information security maturity level within the companies and between the companies, comparing with benchmarks.
Chapter Preview
Top

Background

The ISO/IEC 27000 is the most known and used framework of Information Security and Cybersecurity Managers. Being used as the most comprehensive and in-depth framework in different companies.

As this family of standards have more than 40 different standards, this chapter will focus only on the ISO/IEC 27001 which focus on the requirements and security techniques of the information security management systems on information technologies. Also, this is the unique standard eligible for the accredited certification, which is a very good manner to assess and to present to possible customers that the Information Security controls and cares are in place properly.

Complete Chapter List

Search this Book:
Reset