Final ePortfolio

The NIST Cybersecurity Framework
Introduction
The NIST Cybersecurity Framework (CSF) is a set of guidelines and best practices developed by the National Institute of Standards and Technology to help organizations manage and reduce cybersecurity risk. It is built around five core functions – Identify, Protect, Detect, Respond, and Recover – and is widely adopted across industries to improve cyber resilience, align with compliance requirements, and strengthen overall security posture.
1. Improved Risk Management
• The NIST CSF helps organizations identify, assess, and manage cybersecurity risks. By using the framework, companies can create a structured approach to evaluate potential vulnerabilities and threats, ensuring they prioritize their cybersecurity efforts based on their most critical assets and risks.
• Benefit: Organizations can make more informed decisions about where to invest resources and how to minimize risk effectively.
2. Standardization and Common Language
• The framework provides a common language for communicating about cybersecurity risks, both internally (across departments) and externally (with vendors, stakeholders, regulators). This standardization helps ensure that everyone in the organization is on the same page regarding cybersecurity.
• Benefit: It fosters clearer communication, reducing misunderstandings and improving coordination between technical teams, management, and external parties.
3. Flexibility and Scalability
• The NIST Cybersecurity Framework is designed to be adaptable. It can be used by organizations of all sizes, in any industry, and with different levels of cybersecurity maturity. The framework allows for gradual improvement, with organizations being able to start with basic measures and progress toward more advanced security practices.
• Benefit: Organizations can scale their cybersecurity efforts as their needs grow, making it a long-term, evolving strategy rather than a static one-time solution.
4. Better Alignment with Business Goals
• The framework encourages integrating cybersecurity with business objectives, ensuring that cybersecurity efforts are not seen as a separate function but as part of the overall business strategy.
• Benefit: Cybersecurity decisions are better aligned with organizational goals, creating a more cohesive approach that supports business success and resilience.
5. Regulatory Compliance
• Many industries and regions have specific regulatory requirements for cybersecurity, such as HIPAA for healthcare or GDPR for data protection. The NIST CSF helps organizations meet these requirements by providing guidelines that can be mapped to various compliance standards.
• Benefit: Organizations can streamline compliance efforts, ensuring they meet regulatory requirements without duplicating efforts or creating redundant processes.
6. Increased Resilience
• By implementing the NIST CSF, organizations can strengthen their ability to detect, respond to, and recover from cybersecurity incidents. The framework provides a structured approach to creating incident response plans and recovery strategies.
• Benefit: Organizations are more prepared for potential cybersecurity threats and are able to recover more quickly from incidents, reducing the impact of attacks.

Using the NIST Cybersecurity Framework at My Future Workplace.
If I were to implement the NIST CSF in my future workplace, I would approach it in a phased and practical way as follows;
1. Identify Critical Assets and Risks
o The first step would be to conduct a comprehensive risk assessment to identify the most critical assets in the organization (e.g., sensitive data, intellectual property, systems) and assess the risks to these assets.
o I would use the NIST framework’s Identify function to create an asset inventory, map out potential threats, and evaluate current controls.
2. Develop a Cybersecurity Strategy
o Using the insights from the risk assessment, I would work with management and key stakeholders to develop a tailored cybersecurity strategy that aligns with the organization’s business objectives. This strategy would define the organization’s risk tolerance and set priorities for addressing gaps.
3. Implement Security Measures
o Based on the risk assessment and strategy, I would help implement technical and procedural security measures in line with the Protect function of the framework. This could involve setting up access controls, data encryption, and employee training programs on cybersecurity best practices.
4. Create a Response Plan
o I would ensure that the Detect, Respond, and Recover functions are addressed by developing an incident response plan. This would include monitoring systems for threats, establishing clear protocols for responding to security breaches, and creating recovery plans for business continuity in case of an attack.
5. Continuous Monitoring and Improvement
o Cybersecurity is an ongoing process, so I would establish a continuous monitoring system to track the effectiveness of the implemented controls and incident response strategies. Regular audits and assessments would help identify areas for improvement, and the framework’s iterative nature would allow for adjustments and updates.
6. Communicate and Train
I would ensure there is consistent training and awareness campaigns across all levels of the organization to ensure that everyone understands their role in maintaining cybersecurity. By creating a culture of security awareness, we can reduce human errors and enhance overall security.


Chief Information Security Officer (CISO)
The Human Factor in Cybersecurity
To mitigate cyber threats with a limited budget, I propose allocating funds to a balanced strategy emphasizing employee training and selective technology investment. Training addresses the most persistent threat, human error, while targeted technology enhances detection and response.
Understanding the Human Factor in Cybersecurity
Advanced cybersecurity tools cannot fully compensate for human vulnerabilities such as poor passwords, phishing, and social engineering. A large portion of breaches stem from human error or manipulation, making people the weakest security link.
Budget Allocation Strategy
1. Prioritize Cybersecurity Training and Awareness (55%)
Continuous training will help employees spot phishing, use strong passwords, and follow protocols. Simulated phishing and quarterly updates improve awareness. Well-trained users reduce risk significantly (Hadnagy & Fincher, 2015).
2. Invest in Strategic Cybersecurity Technology (45%)
With limited funds, I will prioritize tools that maximize risk reduction such as;
• Endpoint Detection and Response (EDR)
• Multi-Factor Authentication (MFA)
• Security Information and Event Management (SIEM) and
• Automated threat detection
These tools support human efforts with real-time alerts and analytics.
Risk Mitigation Through Balanced Investment
Cybersecurity is a socio-technical issue. That means tools alone are not enough, training is essential. This strategy builds a security-awareness culture and supports standards like NIST.
Conclusion
To optimize limited resources, I will allocate 55% of the budget towards training and 45% towards key technologies. This balanced investment reduces risk, builds a strong security culture, and strengthens the organization’s defense posture.

References
Hadnagy, C., & Fincher, M. (2015). Phishing Dark Waters. Wiley.
https://books.google.com/books?hl=en&lr=&id=FUIxBwAAQBAJ&oi=fnd&pg=PP1&dq=Hadnagy,+C.,+%26+Fincher,+M.+(2015).+Phishing+Dark+Waters.+Wiley.&ots=stLCyB2OH-&sig=hl_-VppYWUJjrAoA901kFFtkirA#v=onepage&q=Hadnagy%2C%20C.%2C%20%26%20Fincher%2

C%20M.%20(2015).%20Phishing%20Dark%20Waters.%20Wiley.&f=false



Exploring Attacks on Availability
Distributed Denial of Service (DDoS) Attacks

An attack on availability is a cyberattack aimed at disrupting or halting access to systems, networks, or data, thereby preventing legitimate users from utilizing critical digital resources. One of the most prominent types of such attacks is the Distributed Denial of Service (DDoS), which overwhelms a target system with excessive traffic from multiple sources, effectively rendering services unavailable. This attack directly violates one of the core principles of cybersecurity, and that is Availability — ensuring that critical resources are reliably accessible when needed.
A common technique in these attacks involves leveraging botnets, networks of compromised devices to simultaneously flood a server or database with requests. As highlighted by Surianto et al. (2024), DDoS attacks significantly threaten the availability of databases, particularly within cloud and Internet of Things (IoT) environments. The attackers exploit vulnerabilities in these interconnected systems to create massive disruptions. The paper emphasizes that the severity of such attacks lies not just in downtime, but in the potential cascading effects on services, productivity, and user trust.
The broader implications for organizations include financial losses, reputational damage, and weakened customer trust. In critical industries like healthcare or finance, such attacks can result in delayed services or even life-threatening consequences. From a defensive standpoint, Surianto et al. (2024) recommend incorporating artificial intelligence (AI)-driven detection mechanisms, advanced firewalls, and complex load balancing to proactively mitigate and prevent these threats. These adaptive measures ensure databases remain functional and resilient under potential attack scenarios, safeguarding continuous operations in data-driven environments.
Reference
Surianto, J., Wairooy, I. K., Wirananda, S., & Makalew, B. A. (2024). Database Availability Security: Handling Denial of Service (DoS) Attacks. 2024 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)
https://ieeexplore.ieee.org/abstract/document/10957544

Leave a Reply

Your email address will not be published. Required fields are marked *