Amazon cover image
Image from Amazon.com

Lessons Learned : How to protect critical information infrastructure / Toomas Viira.

By: Material type: TextTextPublisher: Ely : IT Governance Publishing, 2018Description: 1 online resource (92 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781849289580
  • 1849289581
Subject(s): Genre/Form: Additional physical formats: Print version:: Lessons Learned: Critical Information Infrastructure Protection.DDC classification:
  • 658.4/78 23
LOC classification:
  • HF5548.37 .V55 2018
Online resources:
Contents:
Cover; Title; Copyright; About the Author; Acknowledgements; Contents; Introduction; Part 1: Critical infrastructure; Chapter 1: Critical infrastructure services; Chapter 2: Description of service and service level; Chapter 3: Providers of critical infrastructure services; Chapter 4: Critical activities and required resources; Chapter 5: Interdependencies of services; Chapter 6: Visualisation of information; Part 2: Critical information infrastructure; Chapter 7: Identification of important information systems; Chapter 8: Interdependencies of information systems.
Chapter 9: Focusing and prioritisationPart 3: Threats, vulnerabilities, risks, impacts; Chapter 10: Threats and vulnerabilities of information systems; Chapter 11: Assessment of the impact of service disruptions; Chapter 12: Risk assessment; Part 4: Protection activities; Chapter 13: Implementation of security measures; Chapter 14: Organisation required to protect critical information infrastructure; Chapter 15: NIS Directive; Chapter 16: Assessment of the security level; Chapter 17: Network scanning; Chapter 18: Business continuity plan and testing.
Part 5: Protection system supporting activitiesChapter 19: Reliable relations and maintaining them; Chapter 20: Sharing information; Chapter 21: Training people; Part 6: Perfecting the system; Chapter 22: Improvement of the system; Part 7: Backup plan; Chapter 23: Life without IT; Appendix 1: Lessons learned; ITG Resources.
Summary: ""I loved the quotes at the beginning of each chapter - very interesting and thought-provoking. I also enjoyed the author's style and his technical expertise shone through.""Christopher Wright, Wright CandA Consulting LtdProtecting critical information infrastructure (CII) is not an easy process. Risks need to be minimised and systems adequately protected. It is an endless balancing act, where one side is constantly on the defensive and the other on the offensive. Lessons Learned: Critical Information Infrastructure Protection aims to help you be as successful as possible in protecting your CI
Item type:
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Home library Collection Call number Materials specified Status Date due Barcode
Electronic-Books Electronic-Books OPJGU Sonepat- Campus E-Books EBSCO Available

Cover; Title; Copyright; About the Author; Acknowledgements; Contents; Introduction; Part 1: Critical infrastructure; Chapter 1: Critical infrastructure services; Chapter 2: Description of service and service level; Chapter 3: Providers of critical infrastructure services; Chapter 4: Critical activities and required resources; Chapter 5: Interdependencies of services; Chapter 6: Visualisation of information; Part 2: Critical information infrastructure; Chapter 7: Identification of important information systems; Chapter 8: Interdependencies of information systems.

Chapter 9: Focusing and prioritisationPart 3: Threats, vulnerabilities, risks, impacts; Chapter 10: Threats and vulnerabilities of information systems; Chapter 11: Assessment of the impact of service disruptions; Chapter 12: Risk assessment; Part 4: Protection activities; Chapter 13: Implementation of security measures; Chapter 14: Organisation required to protect critical information infrastructure; Chapter 15: NIS Directive; Chapter 16: Assessment of the security level; Chapter 17: Network scanning; Chapter 18: Business continuity plan and testing.

Part 5: Protection system supporting activitiesChapter 19: Reliable relations and maintaining them; Chapter 20: Sharing information; Chapter 21: Training people; Part 6: Perfecting the system; Chapter 22: Improvement of the system; Part 7: Backup plan; Chapter 23: Life without IT; Appendix 1: Lessons learned; ITG Resources.

""I loved the quotes at the beginning of each chapter - very interesting and thought-provoking. I also enjoyed the author's style and his technical expertise shone through.""Christopher Wright, Wright CandA Consulting LtdProtecting critical information infrastructure (CII) is not an easy process. Risks need to be minimised and systems adequately protected. It is an endless balancing act, where one side is constantly on the defensive and the other on the offensive. Lessons Learned: Critical Information Infrastructure Protection aims to help you be as successful as possible in protecting your CI

Includes bibliographical references.

Description based on online resource; title from PDF title page (viewed June 10, 2020).

eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - Worldwide

There are no comments on this title.

to post a comment.

O.P. Jindal Global University, Sonepat-Narela Road, Sonepat, Haryana (India) - 131001

Send your feedback to glus@jgu.edu.in

Hosted, Implemented & Customized by: BestBookBuddies   |   Maintained by: Global Library