9/3/19 In today’s society as cybersecurity becomes a larger threat each day, new protocols or infrastructures are being created to fight against these threats. The cybersecurity framework is a tool that organizations, businesses, etc. can use to combat the threats posed by technological developments and so much information and business being done digitally. The National Institute of Standards and Technology wanted the framework to “guide cybersecurity guide cybersecurity activities and considering cybersecurity risks as part of the organization’s risk management processes” (Framework For Improving Critical Infrastructure Cybersecurity, 2018). This framework can be helpful to all organizations, businesses, databases, and others for many reasons. Protecting customer/member/employee personal information from being breached and securing monetary transactions among the most important of the reasons. There are five core activities that are involved in the cybersecurity framework process. These five core activities are identify, protect, detect, respond, and recover. Each of these activities serves a different purpose. In able to fight against threats, an infrastructure must be able to identify how it could be attacked, and then in turn how to protect themselves against the identified vulnerabilities. They must be able to detect when a threat/breach is present or has occurred. They must respond to a cybersecurity hack or breach, figuring out the steps to fight against it and communicate possible negative effects of the attack. The last step would be recovering from the attack so things can go relatively back to normal and not destroy the business or organization completely. It is very important for infrastructures to implement all of these steps in order to protect people’s personal information that can be hacked (which is in my opinion the biggest cybersecurity threat to the average person), as it happens extremely often and increases cyber-crime.