000 -LEADER |
fixed length control field |
01997nam a22003377a 4500 |
001 - CONTROL NUMBER |
control field |
00006275 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
ES-MaONT |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20220906140416.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
201211s2020 gr d|||f t||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
978-92-9204-457-2 |
024 ## - OTHER STANDARD IDENTIFIER |
Source of number or code |
doi |
Standard number or code |
10.2824/44013 |
Additional codes following the standard number or code |
. |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
ES-MaONT |
100 ## - MAIN ENTRY--PERSONAL NAME |
9 (RLIN) |
4764 |
Personal name |
Milenkovic, Goran |
245 00 - TITLE STATEMENT |
Title |
Guideline on security measures under the EECC |
Statement of responsibility, etc. |
/ Authors, Goran Milenkovic and Dr. Marnix Dekker, European Union Agency for Cybersecurity |
250 ## - EDITION STATEMENT |
Edition statement |
3rd ed |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Attiki, Greece |
Name of publisher, distributor, etc. |
: ENISA, |
Date of publication, distribution, etc. |
December 2020 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
60 p. |
Other physical details |
: gráf. |
Dimensions |
; 1 documento PDF |
336 ## - CONTENT TYPE |
Content type term |
texto (visual) |
Source |
isbdcontent |
337 ## - MEDIA TYPE |
Media type term |
electrónico |
Source |
isbdmedia |
338 ## - CARRIER TYPE |
Carrier type term |
recurso en línea |
Source |
rdacarrier |
520 ## - SUMMARY, ETC. |
Summary, etc. |
This document, the Technical Guideline for Security Measures, provides guidance to competent authorities about the technical details of implementing Articles 40 and 41 of the EECC: how to ensure that providers assess risks and take appropriate security measures. The guideline lists 29 high-level security objectives, which are grouped in 8 security domains. For each security objective we list specific detailed security measures which could be taken by providers to reach the security objective. These security measures are grouped in 3 levels of increasing sophistication. We also give examples of evidence, which could be taken into account by an auditor, for example, when assessing if these security measures are actually in place. |
540 ## - TERMS GOVERNING USE AND REPRODUCTION NOTE |
Terms governing use and reproduction |
Reproduction is authorised provided the source is acknowledged. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Ciberseguridad y confianza |
9 (RLIN) |
2188 |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
cybersecurity |
-- |
security measures |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
EECC |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
European Electronic Communications Code |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Dekker , Marnix |
9 (RLIN) |
3131 |
710 ## - ADDED ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
European Union Agency for Cybersecurity |
9 (RLIN) |
3781 |
856 4# - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="https://www.enisa.europa.eu/publications/guideline-on-security-measures-under-the-eecc">https://www.enisa.europa.eu/publications/guideline-on-security-measures-under-the-eecc</a> |
Nonpublic note |
Abierto |
Link text |
Acceso al documento |
Electronic format type |
pdf |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Koha item type |
Informes |