Our PROMISE: Our ads will never cover up content.
Our children thank you.
NIST
Published: Thursday, November 20, 2014 - 14:26 (NIST) -- Time is not your friend when your information systems are under cyber attack, but sharing threat information before, during, and after an attack with a trusted group of peers can help. Not only does it alert the other members of your community to a potential attack, it can provide critical actionable information to speed and bolster your own defenses. Participating in a formal information sharing group can greatly enhance an organization’s cybersecurity capabilities. But for all the potential benefits, sharing operational information outside an organization presents a unique set of challenges. To help, the National Institute of Standards and Technology (NIST) has prepared a Guide to Cyber Threat Information Sharing that provides organizations with the key practices they need to consider when planning, implementing and maintaining information sharing relationships. NIST is requesting comments on the draft document by November 28, 2014. An organization that has faced an attack has valuable information to share with others. “By sharing cyber threat information, organizations can gain valuable insights about their adversaries,” says lead author Christopher Johnson. “They can learn the types of systems and information being targeted, the techniques used to gain access and indicators of compromise. Organizations can use this information to prioritize defensive strategies including patching vulnerabilities, implementing configuration changes and enhancing monitoring capabilities.” Information sharing within business sectors is particularly advantageous because the organizations often face similar threats. The NIST publication presents a deeper treatment of the information-sharing concepts presented in Section 4 of the Computer Security Incident Handling Guide, Revision 2. The guidance also references the Framework for Improving Critical Infrastructure Cybersecurity’s Framework Core, which is a set of cybersecurity activities, desired outcomes, and applicable references that are common across critical infrastructure sectors. The guide examines the benefits and challenges of coordinating and sharing, presents the strengths and weaknesses of a variety of information sharing models, explores the importance of trust, and addresses specific data handling considerations. Appendix A provides a collection of scenarios that demonstrate the value of information sharing by describing real-world applications of threat intelligence sharing and coordinated incident response. These include an email phishing attack on people who attended a conference and how an investigation by credit card companies revealed that a retailer was unknowingly under attack. The Guide to Cyber Threat Information Sharing is available at http://csrc.nist.gov/publications/PubsDrafts.html#SP-800-150. Comments should be sent by November 28, 2014 to sp800-150comments@nist.gov using the Comment Template Form for Draft SP 800-150. Quality Digest does not charge readers for its content. We believe that industry news is important for you to do your job, and Quality Digest supports businesses of all types. However, someone has to pay for this content. And that’s where advertising comes in. Most people consider ads a nuisance, but they do serve a useful function besides allowing media companies to stay afloat. They keep you aware of new products and services relevant to your industry. All ads in Quality Digest apply directly to products and services that most of our readers need. You won’t see automobile or health supplement ads. So please consider turning off your ad blocker for our site. Thanks, Founded in 1901, the National Institute of Standards and Technology (NIST) is a nonregulatory federal agency within the U.S. Department of Commerce. Headquartered in Gaithersburg, Maryland, NIST’s mission is to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life.Cyber Security: Your Mother Was Right
Sharing is good, and NIST has some help on how
Our PROMISE: Quality Digest only displays static ads that never overlay or cover up content. They never get in your way. They are there for you to read, or not.
Quality Digest Discuss
About The Author
NIST
© 2022 Quality Digest. Copyright on content held by Quality Digest or by individual authors. Contact Quality Digest for reprint information.
“Quality Digest" is a trademark owned by Quality Circle Institute, Inc.