To be used in the Cyber Attack Dice Scenario
The National Institute of Standards and Technology (NIST)
The National Institute of Standards and Technology (NIST) Cybersecurity Framework identifies five key functions for strong cybersecurity:
- Identify: Inventorying devices, conducting vulnerability assessments.
- Protect: Using firewalls, encryption, antivirus software, and limiting data access.
- Detect: Training employees to recognize phishing and malware.
- Respond: Incident response plans.
- Recover: Collaborating with professionals to restore systems after an attack.
Cybersecurity Precautions
- Awareness and Training for city employees
Regular training helps employees recognize and respond to cyber threats, minimizing human risk. - Advanced Awareness and Training for administrators and executives
Specialized training ensures those with access to sensitive data understand their responsibilities. - Keep all city software up to date
Security updates fix vulnerabilities that hackers might exploit. - Invest in up-to-date antivirus software
Prevents, detects, and removes malware to protect the city’s systems. - Hire a cybersecurity professional
Enhances capacity to monitor incidents and manage ongoing concerns. - Conduct background checks on employees
Identifies individuals with potential cybercrime history. - Request security documentation from vendors
Ensures vendors with network access prioritize cybersecurity. - Increase the city’s overall bandwidth
Prevents system shutdowns during Distributed Denial of Service (DDOS) attacks. - Invest in firewalls
Filters access and prevents data transmission to unauthorized websites. - Run regular cyberattack simulations
Tests and strengthens response and recovery plans. - Encrypt all collected data
Protects data from being usable, even in a breach. - Create an incident response and recovery plan
Guides employees on their roles during a cyberattack. - Inventory physical devices, systems, and software
Helps identify assets to prioritize their protection. - Conduct a security vulnerability assessment
Identifies weak spots to allocate resources effectively. - Limit privileges and data access
Reduces risk by restricting access to only essential personnel.