Loading…

Lessons learned : critical information infrastructure protection : how to protect critical information infrastructure /

""I loved the quotes at the beginning of each chapter - very interesting and thought-provoking. I also enjoyed the author's style and his technical expertise shone through.""Christopher Wright, Wright CandA Consulting LtdProtecting critical information infrastructure (CII) i...

Full description

Bibliographic Details
Call Number:Libro Electrónico
Main Author: Viira, Toomas (Author)
Format: Electronic eBook
Language:Inglés
Published: Ely : IT Governance Publishing, 2018.
Ely, Cambridgeshire, United Kingdom : 2018.
Subjects:
Online Access:Texto completo
Table of Contents:
  • Cover; Title; Copyright; About the Author; Acknowledgements; Contents; Introduction; Part 1: Critical infrastructure; Chapter 1: Critical infrastructure services; Chapter 2: Description of service and service level; Chapter 3: Providers of critical infrastructure services; Chapter 4: Critical activities and required resources; Chapter 5: Interdependencies of services; Chapter 6: Visualisation of information; Part 2: Critical information infrastructure; Chapter 7: Identification of important information systems; Chapter 8: Interdependencies of information systems
  • Chapter 9: Focusing and prioritisationPart 3: Threats, vulnerabilities, risks, impacts; Chapter 10: Threats and vulnerabilities of information systems; Chapter 11: Assessment of the impact of service disruptions; Chapter 12: Risk assessment; Part 4: Protection activities; Chapter 13: Implementation of security measures; Chapter 14: Organisation required to protect critical information infrastructure; Chapter 15: NIS Directive; Chapter 16: Assessment of the security level; Chapter 17: Network scanning; Chapter 18: Business continuity plan and testing
  • Part 5: Protection system supporting activitiesChapter 19: Reliable relations and maintaining them; Chapter 20: Sharing information; Chapter 21: Training people; Part 6: Perfecting the system; Chapter 22: Improvement of the system; Part 7: Backup plan; Chapter 23: Life without IT; Appendix 1: Lessons learned; ITG Resources