Cyber security its the defense of electronic systems on devices, like computers, cell phones, servers, and networks, from malicious attacks by intruders and other assailants.
Existing cybersecurity regulations require companies to protect themselves from multiple risks. These include both cyber threats and the risk that they will be hacked by attackers. In many cases, cybersecurity regulation covers many issues at once and also asks businesses to meet social or environmental objectives, which means they must be technologically efficient and responsive.
According to companies like Fortinet, cyber security efforts generally start with the development of a threat model, or, a model that distinguishes between genuine threats and misperceived threats.
One approach is to create a threat model that defines all the possible threats and, in most cases, the types of cyber attacks and cyber vulnerabilities that are likely to occur.
Another approach is to develop an effective cyber security program, with all possible threats and associated vulnerabilities, which is then evaluated against a more formal cybersecurity threat model.
The last approach is to implement a robust cyber security strategy, which ensures that companies are focusing their attention and resources on the most likely threats, and a range of possible strategies that deal with the various vulnerabilities.
To ensure that businesses are engaging in the right programs and strategies, an industry-wide organization in the United States is known as the Federal Information Security Management Act (FISMA). It exists to recognize the importance of such cybersecurity programs and to provide assistance to the industry to identify, prioritize, and apply best practices for the different strategies and programs.
The Obama Administration initiated FISMA in 2011 with the goal of establishing a framework for providing industry best practices and enhancing the effectiveness of those practices through best practices agreements. FISMA is one of the Administrations efforts to increase cooperation among the private and public sectors to address security risks.
What are best practices?
Best practices are strategic documents or strategies to maximize cybersecurity and respond to cybersecurity threats in a manner that is best for businesses.
Best practices are designed to be implemented by companies through written agreements that define the specific procedures they must follow and include detailed steps for implementing them. Most of the best practices must be put into action by these agreements.