{"id":12,"date":"2025-09-15T15:17:52","date_gmt":"2025-09-15T15:17:52","guid":{"rendered":"https:\/\/wp.pprd.odu.edu\/spring2017-met330-template\/?page_id=12"},"modified":"2025-09-29T02:15:20","modified_gmt":"2025-09-29T02:15:20","slug":"hw","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cyse008\/hw\/","title":{"rendered":"Write-up Assignment"},"content":{"rendered":"\n<p>Jayden Hood&nbsp;<\/p>\n\n\n\n<p>Professor Duvall<\/p>\n\n\n\n<p>CYSE-200T<\/p>\n\n\n\n<p>9\/21\/25&nbsp;<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>NIST CSF 1.1 vs 2.0: Key Differences<\/strong><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>BLUF (Bottom Line Up Front):<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">In 2024, NIST released CSF 2.0, a major update to its widely adopted Cybersecurity Framework. This revision broadens the framework\u2019s applicability to all organizations, introduces a new Govern function, and enhances guidance to better address modern cybersecurity risks, including supply chain security, cloud, IoT, and ransomware.<\/h3>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>\u2705 What Stayed the Same in NIST CSF 2.0<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>1. Core Functions (5 Original)<\/strong><\/h3>\n\n\n\n<ul>\n<li>Identify, Protect, Detect, Respond, Recover remain foundational.<\/li>\n\n\n\n<li>Still form the core cybersecurity lifecycle for managing risk.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>2. Profiles<\/strong><\/h3>\n\n\n\n<ul>\n<li>Organizations still use Current and Target Profiles.<\/li>\n\n\n\n<li>Helps tailor the framework to specific needs and goals.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>3. Voluntary &amp; Non-Prescriptive<\/strong><\/h3>\n\n\n\n<ul>\n<li>CSF 2.0 is still voluntary and flexible, not a compliance mandate.<\/li>\n\n\n\n<li>Allows broad adoption across sectors and organization sizes.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>4. Risk-Based Approach<\/strong><\/h3>\n\n\n\n<ul>\n<li>Risk remains central to all framework functions and decisions.<\/li>\n\n\n\n<li>Enables prioritization based on impact and likelihood.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>\ud83d\udd10Key Differences<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Area<\/strong><\/td><td><strong>CSF 1.1&nbsp;<\/strong><\/td><td><strong>CSF 2.0<\/strong><\/td><\/tr><tr><td><strong>Supply Chain Risk&nbsp;<\/strong><strong>Why did it need to change? Events like SolarWinds uncovered third-party vulnerabilities. CSF 2.0 helps with the management of these threats by integrating them with governance and operations.<\/strong><\/td><td><br>Mentioned, but not central<br><\/td><td>Stronger emphasis in Govern function and integrated throughout<\/td><\/tr><tr><td><br><strong>Modern Threat Focus<\/strong><br>Why was this change needed? Threats have evolved. CSF 2.0 helps organizations respond to today\u2019s complex and fast-changing attack landscape.<\/td><td>Limited mention of cloud, IoT, or ransomware<\/td><td>Updated to address cloud security, zero trust, nation-state threats, and emerging tech risks<\/td><\/tr><tr><td><br><strong>Continuous Improvement<\/strong><strong>Why was the change needed? Cybersecurity maturity has no end point. CSF 2.0 encourages iteration, monitoring progress, and regular updating.<\/strong><\/td><td><br>Less emphasized<br><\/td><td>Encourages ongoing evaluation, metrics, and continuous improvement<\/td><\/tr><tr><td><br><br><br><strong>Core Functions<\/strong><br><strong>Why was this change needed?Good cybersecurity starts with leadership. The new role specifies roles, strategy, and management<\/strong><\/td><td><br><br><br>5 Functions: Identify, Protect, Detect, Respond, Recover<\/td><td><br><br><br>6 Functions: Adds Govern to emphasize leadership, roles, oversight, and risk strategy<\/td><\/tr><tr><td><br><strong>Implementation Guidance<\/strong><br><strong>Why was this change needed? Far too many organizations found CSF 1.1 too theoretical. CSF 2.0 offers practical tools for easier adoption.<\/strong><\/td><td><br>Less practical guidance; no examples<br><\/td><td><br>Includes implementation examples, quick-start guides, and reference tools<br><\/td><\/tr><tr><td><br><strong>Terminology &amp; Title<\/strong><br><strong>Why was this change needed? The update includes its broader use across industries and nations\u2014not just U.S. critical infrastructure.<\/strong><\/td><td>Called &#8220;Framework for Improving Critical Infrastructure Cybersecurity&#8221;<\/td><td>Renamed to &#8220;Cybersecurity Framework&#8221; \u2014 broader and more inclusive<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>\ud83d\udee1\ufe0fWhy the Update Matters<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>1.Stronger Governance<\/strong><\/h3>\n\n\n\n<ul>\n<li>Cybersecurity is now recognized as a strategic business risk, requiring leadership involvement, clear roles, and executive accountability.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>2. Broader Adoption<\/strong><\/h3>\n\n\n\n<ul>\n<li>CSF 2.0 is designed for organizations of all sizes and sectors, not just critical infrastructure\u2014making it more inclusive and globally relevant.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>3. Enhanced Supply Chain Security<\/strong><\/h3>\n\n\n\n<ul>\n<li>With rising third-party and vendor-related threats, the framework places greater emphasis on supply chain risk management (SCRM) and resilience.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>4. Alignment with Modern Threats<\/strong><\/h3>\n\n\n\n<ul>\n<li>CSF 2.0 addresses today\u2019s threat landscape more effectively, including cloud security, zero trust, ransomware, IoT, and OT vulnerabilities.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Conclusion<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">NIST CSF 2.0 represents a strategic evolution of the framework, making it more accessible, globally applicable, and better aligned with today\u2019s cybersecurity needs. With stronger leadership focus, improved guidance, and broader applicability, CSF 2.0 is designed to help organizations of all sizes manage cybersecurity as an enterprise-wide priority.<\/h3>\n","protected":false},"excerpt":{"rendered":"<p>Jayden Hood&nbsp; Professor Duvall CYSE-200T 9\/21\/25&nbsp; NIST CSF 1.1 vs 2.0: Key Differences BLUF (Bottom Line Up Front): In 2024, NIST released CSF 2.0, a major update to its widely adopted Cybersecurity Framework. This revision broadens the framework\u2019s applicability to&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyse008\/hw\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":29905,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse008\/wp-json\/wp\/v2\/pages\/12"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse008\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse008\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse008\/wp-json\/wp\/v2\/users\/29905"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse008\/wp-json\/wp\/v2\/comments?post=12"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/cyse008\/wp-json\/wp\/v2\/pages\/12\/revisions"}],"predecessor-version":[{"id":61,"href":"https:\/\/sites.wp.odu.edu\/cyse008\/wp-json\/wp\/v2\/pages\/12\/revisions\/61"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse008\/wp-json\/wp\/v2\/media?parent=12"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}