You are on page 1of 4

Running head: NATIONAL INSTITUTE OF SECURITY TECHNOLOGY 1

National Institute of Security Technology

Name:

Course:

Instructor:

Date:
NATIONAL INSTITUTE OF SECURITY TECHNOLOGY 2

NIST stands for the National Institute of security technology which is a federal agency

with a mission to develop and promote measurement and technology to enhance productivity.

Establishment of the computer and information technology standards is also associated with

NIST. The global market place is where goods, services, and labor get exchanged throughout the

whole world. Comparing the components and outcomes of NIST with structure operating in the

worldwide market place we have, NIST has three overarching elements. One implementation

Tiers this explains the extent to which an organization cybersecurity risk management practices

the characteristics defined in the framework. In a structure operating in the global market place,

it has an organization that helps it outdo the risks ahead; this makes the structure to be

firm(staffing trends Fy,1995).

The second component of the NIST structure is the framework core. It is a set of

motivated cybersecurity activities and outcome arranged into categories and informative

reference .in the global market place the architecture also have the cybersecurity that secures any

fraud the May arise. The third component of the NIST based structure is profile. This is an

organization's particular alignment of its organizational requirements and desires risks, appetite,

and resources against the objected outcome of framework core. In comparison to the above

statement, the structure operating in the global market place does have its body in the fabric that

organizes the orders and protects the material from different types of risks (Baker EB,2016).

NIST based structure has various outcomes that get compared with the structure

operating in a global market place. NIST updates its web-based pages, which offer information

about how an organization is using the frame; likewise, the structure operating in the worldwide

market place has website pages that it keeps on updating and gives analysis. The other outcome

is it develops profiles that reflect the mission priorities of a given stakeholder (Wingrad T,2007)
NATIONAL INSTITUTE OF SECURITY TECHNOLOGY 3

Information security governance is a way to incipiently identify and rank the most critical risks

to your business. NIST compliance has influenced information security governance in having

business resilience by ensuring confidentiality and integrity (Korow-Diks K, 2002). It has also

caused influence in the information security through enhancing the practices of the risk

management and becoming the integral way of doing the business. The risk management is

mainly treated as one of the most important management purposes of the society instead of the

practical ways that are ran by the system of the admistrators. NIST has influenced cybersecurity

governance by integrating security within the business process to safeguard the information and

the resources supporting the organization.

NIST compliance has assisted in formulating the organization's desired outcome of the

information security governance by reducing the risks to operation and business, which can be

done in a variety of resources by investing in security, which mitigates risks to operations. It also

assists in establishing effective governance and agency policies and incorporating the resources

to a more security comprehensive measure, which will help the organization to have unique

characteristics and complexities (Fries S, 2005).

In conclusion, the Nation Institute of security and Technology (NIST) has a remarkable

impact globally. It has helped may organizations be able to secure their information and assets,

because nowadays, security has become a significant concern to all companies and organizations

that conduct their business through the internet.


NATIONAL INSTITUTE OF SECURITY TECHNOLOGY 4

REFERENCES

Baker EB, Baker WC (2019) Recommendation for key management.

Peck S, Smith J, Korow-Diks K (2002) security guide for interconnecting Information

Technology Systems

Souppaya MP, Scarfone KA (2013) Guidelines to enterprise patch Management Technology.

Tracy MC, Jansen W, Butterfield J (2007) Guidelines on Electronic Mail Security

You might also like