{"id":297,"date":"2025-04-27T23:07:43","date_gmt":"2025-04-27T23:07:43","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/richcbs\/?p=297"},"modified":"2025-04-27T23:07:43","modified_gmt":"2025-04-27T23:07:43","slug":"the-nist-framework","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/richcbs\/2025\/04\/27\/the-nist-framework\/","title":{"rendered":"The NIST Framework"},"content":{"rendered":"\n<p>The NIST Cybersecurity Framework is one of the most widely used guides for managing cybersecurity risk. Originally developed for critical infrastructure, it has since expanded into general best practice across industries. What makes the NIST Framework so effective is its flexible structure \u2014 it doesn\u2019t dictate exactly what every organization must do but instead provides a language and process to help them identify risks, protect assets, detect problems, respond to attacks, and recover from incidents. These five core functions Identify, Protect, Detect, Respond, and Recover are simple to understand but deeply interconnected<\/p>\n\n\n\n<p>In a world where cyber threats are constantly evolving and the boundaries between physical and digital are blurring (what Verbeek calls the &#8220;intelligification&#8221; of the material world), frameworks like NIST become even more important. They allow businesses, governments, and individuals to organize their cybersecurity efforts in a systematic way even when they can\u2019t predict every future threat. The emphasis on continuous improvement and regular assessment fits well with the reality of diminishing centralized control and increasing technological complexity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The NIST Cybersecurity Framework is one of the most widely used guides for managing cybersecurity risk. Originally developed for critical infrastructure, it has since expanded into general best practice across industries. What makes the NIST Framework so effective is its flexible structure \u2014 it doesn\u2019t dictate exactly what every organization must do but instead provides&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/richcbs\/2025\/04\/27\/the-nist-framework\/\">Read More<\/a><\/div>\n","protected":false},"author":29900,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/richcbs\/wp-json\/wp\/v2\/posts\/297"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/richcbs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/richcbs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/richcbs\/wp-json\/wp\/v2\/users\/29900"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/richcbs\/wp-json\/wp\/v2\/comments?post=297"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/richcbs\/wp-json\/wp\/v2\/posts\/297\/revisions"}],"predecessor-version":[{"id":298,"href":"https:\/\/sites.wp.odu.edu\/richcbs\/wp-json\/wp\/v2\/posts\/297\/revisions\/298"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/richcbs\/wp-json\/wp\/v2\/media?parent=297"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/richcbs\/wp-json\/wp\/v2\/categories?post=297"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/richcbs\/wp-json\/wp\/v2\/tags?post=297"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}