Book creator ( disable )
 This page cannot be added Show book (36 pages) Suggest pages

Manage your book

From LIMSWiki
Jump to navigationJump to search
Book Creator is undergoing changes

Due to severe issues with our existing system, the Book Creator will no longer support saving a book as a PDF.

Download single pages

While the Book Creator PDF rendering is disabled, you can try Download as PDF from the sidebar tools for individual articles.

Update
  • Remove About this book
  • Remove Show Introduction
  • Remove 1. What is a cybersecurity plan and why do you need it?
  • Remove Show 1.1 Cybersecurity planning and its value
  • Remove 2. What are the major regulations and standards dictating cybersecurity action?
  • Remove Show 2.1 Cybersecurity standards frameworks
  • Remove 3. Fitting a cybersecurity standards framework into a cybersecurity plan
  • Remove Show 3.1 How do cybersecurity controls and frameworks guide plan development?
  • Remove 4. NIST Special Publication 800-53, Revision 5 and the NIST Cybersecurity Framework
  • Remove Show 4.1 NIST Cybersecurity Framework
  • Remove 5. Develop and create the cybersecurity plan
  • Remove Show 5.1 Develop strategic cybersecurity goals and define success
  • Remove Show 5.2 Define scope and responsibilities
  • Remove Show 5.3 Identify cybersecurity requirements and objectives
  • Remove Show 5.4 Establish performance indicators and associated time frames
  • Remove Show 5.5 Identify key stakeholders
  • Remove Show 5.6 Determine resource needs
  • Remove Show 5.7 Develop a communications plan
  • Remove Show 5.8 Develop a response and continuity plan
  • Remove Show 5.9 Establish how the overall cybersecurity plan will be implemented
  • Remove Show 5.10 Review progress
  • Remove 6. Closing remarks
  • Remove Show 6.1 Recap and closing
  • Remove Appendix 1. A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec
  • Remove Show Appendix 1.1 Access control
  • Remove Show Appendix 1.2 Awareness and training
  • Remove Show Appendix 1.3 Audit and accountability
  • Remove Show Appendix 1.4 Assessment, authorization, and monitoring
  • Remove Show Appendix 1.5 Configuration management
  • Remove Show Appendix 1.6 Contingency planning
  • Remove Show Appendix 1.7 Identification and authentication
  • Remove Show Appendix 1.8 Incident response
  • Remove Show Appendix 1.9 Maintenance
  • Remove Show Appendix 1.10 Media protection
  • Remove Show Appendix 1.11 Physical and environmental protection
  • Remove Show Appendix 1.12 Planning
  • Remove Show Appendix 1.13 Program management
  • Remove Show Appendix 1.14 Personnel security
  • Remove Show Appendix 1.15 Personally identifiable information processing and transparency
  • Remove Show Appendix 1.16 Risk assessment
  • Remove Show Appendix 1.17 System and services acquisition
  • Remove Show Appendix 1.18 System and communications protection
  • Remove Show Appendix 1.19 System and information integrity
  • Remove Show Appendix 1.20 Supply chain risk management
Enter name for new chapter Enter new name for chapter Do you really want to completely clear your book?

Order as a printed book

Get a printed book from our print-on-demand partner.

Download

To download your book choose a format and click the button.