Lessons Learned : How to protect critical information infrastructure /
Saved in:
Author / Creator: | Viira, Toomas author. |
---|---|
Imprint: | Ely : IT Governance Publishing, 2018. |
Description: | 1 online resource (92 pages) |
Language: | English |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/12019461 |
Table of Contents:
- Cover; Title; Copyright; About the Author; Acknowledgements; Contents; Introduction; Part 1: Critical infrastructure; Chapter 1: Critical infrastructure services; Chapter 2: Description of service and service level; Chapter 3: Providers of critical infrastructure services; Chapter 4: Critical activities and required resources; Chapter 5: Interdependencies of services; Chapter 6: Visualisation of information; Part 2: Critical information infrastructure; Chapter 7: Identification of important information systems; Chapter 8: Interdependencies of information systems.
- Chapter 9: Focusing and prioritisationPart 3: Threats, vulnerabilities, risks, impacts; Chapter 10: Threats and vulnerabilities of information systems; Chapter 11: Assessment of the impact of service disruptions; Chapter 12: Risk assessment; Part 4: Protection activities; Chapter 13: Implementation of security measures; Chapter 14: Organisation required to protect critical information infrastructure; Chapter 15: NIS Directive; Chapter 16: Assessment of the security level; Chapter 17: Network scanning; Chapter 18: Business continuity plan and testing.
- Part 5: Protection system supporting activitiesChapter 19: Reliable relations and maintaining them; Chapter 20: Sharing information; Chapter 21: Training people; Part 6: Perfecting the system; Chapter 22: Improvement of the system; Part 7: Backup plan; Chapter 23: Life without IT; Appendix 1: Lessons learned; ITG Resources.