Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • How to Use NIST’s Cybersecurity Framework to Protect against Integrity-Themed Threats
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware

How to Use NIST’s Cybersecurity Framework to Protect against Integrity-Themed Threats

4 years ago David Bisson
How to Use NIST’s Cybersecurity Framework to Protect against Integrity-Themed Threats

With the CIA Triad, confidentiality commands much of the attention. Organizations fret over the unauthorized disclosure of their data, so they try to reduce the risks of that type of an incident. In so doing, however, enterprises commonly overlook the other two, integrity in particular.

Ron Ross, a fellow at the National Institute of Standards and Technology (NIST), thinks it’s a mistake for organizations to forget about integrity. He feels that way because of how an integrity-related security event can undermine the entire CIA triad.

“If you have a compromise of integrity, it can affect both availability and confidentiality,” he explained. “The malicious code can wreck confidentiality by getting access to things it shouldn’t have access to and seeing things it shouldn’t. Alternatively, compromising key components of a system through an integrity violation can make the system crash and the capability go away. That’s an availability issue. With that said, I don’t think we spend enough time talking about integrity. We’re focused on unauthorized disclosure when in reality integrity is right up there at the top and maybe one of the most important components.”

Integrity-Based Threats on the Rise

Integrity-related threats such as the ones described by Ross aren’t theoretical in nature. Attackers are already targeting organizations to compromise the integrity of their data and systems.

Take ransomware. In its Cost of a Data Breach Study, IBM found that ransomware attacks cost an average of $4.62 million in 2021—more than the typical data breach price tag of $4.24 million. Security researchers detected 623 million ransomware attacks during that same period, noted PRWeb, constituting a 105% year-over-year increase.

The effects of a ransomware infection or another integrity-related attack on an enterprise’s IT environment can be devastating. It can be even more serious for organizations that maintain the nation’s critical infrastructure. Such an incident can undermine the host country’s national security, weaken the global economy, and threaten public safety.

Organizations need to defend themselves against integrity-related threats. To do so, they should consider turning to NIST’s Cybersecurity Framework.

The Gist of NIST

Published by the National Institute of Standards and Technology (NIST) in 2014, the Cybsersecurity Framework (CSF) is designed to help critical infrastructure organizations address security challenges in their Operational Technology (OT) environments. Even so, its common language makes the Framework accessible to organizations in every sector. Companies can therefore use the Framework to confront ransomware and other threats facing their industry.

NIST’s Cybersecurity Framework constitutes a risk-based approach by which organizations can accelerate their efforts to create a digital security strategy, reduce miscommunication among security staff, and heighten awareness of threats across the organization.

That includes building awareness within the Board of Directors, as Ross rightly notes.

“A key piece of security is integrity,” he explained. “That needs to be an important consideration at the Board level. Once they say integrity is important to this company because they want to protect the company’s intellectual property or want to make sure that intellectual property is not changed or have integrity in the things the company is producing for its customers, those things get conveyed down to the people who are in the operational chain below or the development chain. So, if you’re developing a system or a product, that development work has to have high integrity, too, because management wants to make sure that what they’re producing is what the customer gets and they can be trusted to be giving customers what they expect.”

The NIST Framework to the Rescue!

Enterprises can use the NIST CSF to protect against integrity-themed threats. They can do so by pairing it with NIST 800-53, the Center for Internet Security’s (CIS) Critical Security Controls (CSCs), and other control sets that enable integrity management including security configuration management (SCM) and file integrity monitoring (FIM). They can also use the Framework to triage their systems based on how an integrity-related attack could affect the business.

The Framework facilitates protective strategies via the following five core functions:

  1. Identify: Understand the business context and resources that support critical functions as well as their associated security risks.
  2. Protect: Enforce safeguards to ensure the delivery of a given service.
  3. Detect: Create activities that can assist in the discovery of a security incident.
  4. Respond: Develop procedures that can help contain the impact of a security event.
  5. Recover: Implement measures that can facilitate the organization’s transition back to normal operations after a security incident.

Each of those features allow organizations to strategize against integrity-based threats. They can essentially lay out the foundations for where they want to go. With that groundwork in place, enterprises can then create a security program in pursuit of that goal.

For more information on how organizations can use NIST’s Cybersecurity Framework to defend against integrity-based attacks, download this whitepaper.

The post ” How to Use NIST’s Cybersecurity Framework to Protect against Integrity-Themed Threats” appeared first on TripWire

Source:TripWire – David Bisson

Tags: Critical Severity, Finance, High Severity, Malware, Ransomware, TripWire

Continue Reading

Previous Tripwire & FoxGuard: Patching for compliance and security
Next Russian Hackers Tried Attacking Ukraine’s Power Grid with Industroyer2 Malware

More Stories

  • Cyber Attacks

⚡ Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and More

3 hours ago [email protected] (The Hacker News)
  • Malware

Three China-Linked Clusters Target Southeast Asian Government in 2025 Cyber Campaign

10 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

Iran-Linked Hackers Breach FBI Director’s Personal Email, Hit Stryker With Wiper Attack

2 days ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Vulnerabilities

Citrix NetScaler Under Active Recon for CVE-2026-3055 (CVSS 9.3) Memory Overread Bug

2 days ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Vulnerabilities

CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation

2 days ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks

Apple Sends Lock Screen Alerts to Outdated iPhones Over Active Web-Based Exploits

3 days ago [email protected] (The Hacker News)

Recent Posts

  • ⚡ Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and More
  • 3 SOC Process Fixes That Unlock Tier 1 Productivity
  • The State of Secrets Sprawl 2026: 9 Takeaways for CISOs
  • Russian CTRL Toolkit Delivered via Malicious LNK Files Hijacks RDP via FRP Tunnels
  • Three China-Linked Clusters Target Southeast Asian Government in 2025 Cyber Campaign

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT