000 -LEADER |
fixed length control field |
02195nam a22003137c 4500 |
001 - CONTROL NUMBER |
control field |
00006862 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
ES-MaONT |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20211209161850.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
211297s2021 xxu||||frt||| 00| 0 eng d |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
ES-MaONT |
245 00 - TITLE STATEMENT |
Title |
Guide to Developing a National Cybersecurity Strategy |
Remainder of title |
: Strategic Engagement in Cybersecurity |
246 ## - VARYING FORM OF TITLE |
Title proper/short title |
The NCS Guide 2021 |
250 ## - EDITION STATEMENT |
Edition statement |
2nd Edition 2021 |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Geneva : |
Name of publisher, distributor, etc. |
International Telecommunication Union (ITU), |
Date of publication, distribution, etc. |
2021 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
84 p. |
Dimensions |
; 1 documenrto PDF |
336 ## - CONTENT TYPE |
Content type term |
texto (visual) |
Source |
isbdcontent |
337 ## - MEDIA TYPE |
Media type term |
electrónico |
Source |
isbdmedia |
338 ## - CARRIER TYPE |
Carrier type term |
recurso en línea |
Source |
rdacarrier |
520 ## - SUMMARY, ETC. |
Summary, etc. |
In the past two decades, a global digital revolution has transformed societies and cultures, benefiting billions of people. However, while the Internet has become central to realizing economic and social opportunities, cyberthreats are also evolving rapidly and compromising trust in ICT — and only 76 countries have a clear plan in place to address that. Guide to Developing a National Cybersecurity Strategy — Strategic Engagement in Cybersecurity draws on the experiences and knowledge of 12 contributors from the public and private sectors to set out how to identify a common approach to risk management, establish response capabilities and contingency plans, promote information-sharing, conduct cybersecurity exercises, and encourage skills development. The guide looks at the overarching principles of devising a cybersecurity strategy, from human rights to best practices, and can assist policy-makers in developing offensive and defensive cybersecurity capabilities that protect our assets against illegal and destructive activities in cyberspace |
540 ## - TERMS GOVERNING USE AND REPRODUCTION NOTE |
Terms governing use and reproduction |
This work is available under the Creative Commons Attribution-NonCommercial <br/>3.0 IGO license (CC BY-NC 3.0 IGO) https://creativecommons.org/licenses/bync/3.0/igo/ |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Ciberseguridad y confianza |
9 (RLIN) |
2188 |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
cybersecurity |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
organisations |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
policy |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
strategy |
856 4# - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
https://ncsguide.org/wp-content/uploads/2021/11/2021-NCS-Guide.pdf |
Nonpublic note |
Abierto |
Link text |
Acceso al documento |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Koha item type |
Guía |