OverviewThis learning module takes a deeper look at the Cybersecurity Framework's five Functions: Identify, Protect, Detect, Respond, and Recover. The information presented here builds upon the material introduced in the Components of the Framework module. This module explores the value of the Functions within the Framework, and what is included in each Function. Show An Introduction to the FunctionsThe five Functions included in the Framework Core are:
The Functions are the highest level of abstraction included in the Framework. They act as the backbone of the Framework Core that all other elements are organized around. These five Functions were selected because they represent the five primary pillars for a successful and holistic cybersecurity program. They aid organizations in easily expressing their management of cybersecurity risk at a high level and enabling risk management decisions. IdentifyThe Identify Function assists in developing an organizational understanding to managing cybersecurity risk to systems, people, assets, data, and capabilities. Understanding the business context, the resources that support critical functions, and the related cybersecurity risks enables an organization to focus and prioritize its efforts, consistent with its risk management strategy and business needs. Examples of outcome Categories within this Function include:
ProtectThe Protect Function outlines appropriate safeguards to ensure delivery of critical infrastructure services. The Protect Function supports the ability to limit or contain the impact of a potential cybersecurity event. Examples of outcome Categories within this Function include:
DetectThe Detect Function defines the appropriate activities to identify the occurrence of a cybersecurity event. The Detect Function enables timely discovery of cybersecurity events. Examples of outcome Categories within this Function include:
RespondThe Respond Function includes appropriate activities to take action regarding a detected cybersecurity incident. The Respond Function supports the ability to contain the impact of a potential cybersecurity incident. Examples of outcome Categories within this Function include:
RecoverThe Recover Function identifies appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity incident. The Recover Function supports timely recovery to normal operations to reduce the impact from a cybersecurity incident. Examples of outcome Categories within this Function include:
Additional ResourcesThe_Five_Functions.pptx What are the 4 main types of vulnerability in cyber security?Security Vulnerability Types. Network Vulnerabilities. These are issues with a network's hardware or software that expose it to possible intrusion by an outside party. ... . Operating System Vulnerabilities. ... . Human Vulnerabilities. ... . Process Vulnerabilities.. What are the 3 categories of threats to information security?The three most general categories are natural threats (such as earthquakes), physical security threats (such as power outages damaging equipment), and human threats (blackhat attackers who can be internal or external.)
What are the 5 types of cyber security?Cybersecurity can be categorized into five distinct types:. Critical infrastructure security.. Application security.. Network security.. Cloud security.. Internet of Things (IoT) security.. What are the five 5 steps of the cybersecurity lifecycle?It consists of five concurrent and continuous Functions: Identify, Protect, Detect, Respond and Recover.
|