THE "HOLY GRAIL" OF CYBERSECURITY IS "CONTINUOUS MONITORING"This book is written as a beginner's guide to the challenges and solutions of CCM as proscribed by the National Institute of Standards and Technology (NIST). CCM is to be that final step in the Risk Management Framework (RMF) process. Once you have completed all the five preceding steps, you will enter Step, Continuous Monitoring. Some of this can be done manually, but the objective is to automate the process to alert System Owner's of critical changes in the ...
Read More
THE "HOLY GRAIL" OF CYBERSECURITY IS "CONTINUOUS MONITORING"This book is written as a beginner's guide to the challenges and solutions of CCM as proscribed by the National Institute of Standards and Technology (NIST). CCM is to be that final step in the Risk Management Framework (RMF) process. Once you have completed all the five preceding steps, you will enter Step, Continuous Monitoring. Some of this can be done manually, but the objective is to automate the process to alert System Owner's of critical changes in the architecture that afford vulnerabilities and avenues of approach for threats; threats that may include Insider Threats and nation-state actors such as Russia, China, and Iran. CCM is on the horizon, yet we are years from attaining true CCM as described in this book.
Read Less
Add this copy of Nist 800-137: An Introduction to Information Security to cart. $12.87, new condition, Sold by Ingram Customer Returns Center rated 5.0 out of 5 stars, ships from NV, USA, published 2018 by Independently Published.
Add this copy of Nist 800-137: an Introduction to Information Security to cart. $35.01, good condition, Sold by Bonita rated 4.0 out of 5 stars, ships from Newport Coast, CA, UNITED STATES, published 2018 by Independently published.
Add this copy of Nist 800-137: an Introduction to Information Security to cart. $65.05, new condition, Sold by Bonita rated 4.0 out of 5 stars, ships from Newport Coast, CA, UNITED STATES, published 2018 by Independently published.