Definition
Cybersecurity preparedness assists public and private sector agencies in being ready for cybersecurity incidents that may occur and are essential for the mitigation of materialized cybersecurity threats.
Introduction
Cybersecurity measures have retrospective and prospective capabilities. Retrospectively, these measures seek to respond to incidents while they are occurring or after they have occurred. Generally, this form of cybersecurity seeks to take action or solve something after the fact. Prospectively, these measures seek to mitigate or prevent something from occurring in the future. Cybersecurity measures, therefore, seek to anticipate threats before they materialize, forestall threats, and take action to lessen the impact of a threat once it has materialized. Having incident response plans in place is not all that is needed. These plans need to be viable and useful in the event of cybersecurity incidents to guide individuals involved in incident response on the ways...
References
Brangetto, P., Çalişkan, E., & Rõigas, H. (2015). Cyber Red Teaming: Organisational, technical and legal implications in a military context. NATO Cooperative Cyber Defence Centre of Excellence. https://ccdcoe.org/uploads/2018/10/Cyber_Red_Team.pdf
CISA. (2019a). Cyber Storm: Securing cyber space. https://www.cisa.gov/cyber-storm-securing-cyber-space
CISA. (2019b). National Cyber Exercise and Planning Program. https://www.cisa.gov/national-cyber-exercise-and-planning-program
Dewar, R. S. (2018). Cybersecurity and cyberdefense exercises. Center for Security Studies (CSS) Cyber Defense Report, ETH Zürich. https://ethz.ch/content/dam/ethz/special-interest/gess/cis/center-for-securities-studies/pdfs/Cyber-Reports-2018-10-Cyber_Exercises.pdf
DHS. (2012). Plan and prepare for disasters. https://www.dhs.gov/plan-and-prepare-disasters
DHS Ready. (n.d.). Exercises. https://www.ready.gov/business/testing/exercises
Emergency Management Institute (EMI). (n.d.). Discussion-based exercises. Federal Emergency Management Agency (FEMA). http://humtech.com/fema/isdbscourses/is703_nimsresource/RES0103350text.htm
Grance, T., Nolan, T., Burke, K., Dudley, R., White, G., & Good, T. (2006). Guide to test, training, and exercise programs for IT plans and capabilities. Recommendations of the National Institute of Standards and Technology. NIST Special Publication, 800–84. https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-84.pdf
NYS-OEM. (n.d.). Exercises. http://www.dhses.ny.gov/oem/exercise/
Wilson, C. (2003). Computer attack and cyber terrorism: Vulnerabilities and policy issues for congress. CRS Report for Congress, RL32114. https://fas.org/irp/crs/RL32114.pdf
Further Readings
Brangetto, P., Çalişkan, E., & Rõigas, H. (2015). Cyber Red Teaming: Organisational, technical and legal implications in a military context. NATO Cooperative Cyber Defence Centre of Excellence. https://ccdcoe.org/uploads/2018/10/Cyber_Red_Team.pdf
Dewar, R. S. (2018). Cybersecurity and cyberdefense exercises. Center for Security Studies (CSS) Cyber Defense Report, ETH Zürich. https://ethz.ch/content/dam/ethz/special-interest/gess/cis/center-for-securities-studies/pdfs/Cyber-Reports-2018-10-Cyber_Exercises.pdf
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this entry
Cite this entry
Maras, MH.(. (2020). Cybersecurity: Preparedness. In: Shapiro, L., Maras, MH. (eds) Encyclopedia of Security and Emergency Management. Springer, Cham. https://doi.org/10.1007/978-3-319-69891-5_302-1
Download citation
DOI: https://doi.org/10.1007/978-3-319-69891-5_302-1
Received:
Accepted:
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-69891-5
Online ISBN: 978-3-319-69891-5
eBook Packages: Springer Reference Law and CriminologyReference Module Humanities and Social SciencesReference Module Business, Economics and Social Sciences