Guide to Developing a National Cybersecurity Strategy (Registro nro. 6862)

000 -LEADER
fixed length control field 02195nam a22003137c 4500
001 - CONTROL NUMBER
control field 00006862
003 - CONTROL NUMBER IDENTIFIER
control field ES-MaONT
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20211209161850.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 211297s2021 xxu||||frt||| 00| 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency ES-MaONT
245 00 - TITLE STATEMENT
Title Guide to Developing a National Cybersecurity Strategy
Remainder of title : Strategic Engagement in Cybersecurity
246 ## - VARYING FORM OF TITLE
Title proper/short title The NCS Guide 2021
250 ## - EDITION STATEMENT
Edition statement 2nd Edition 2021
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Geneva :
Name of publisher, distributor, etc. International Telecommunication Union (ITU),
Date of publication, distribution, etc. 2021
300 ## - PHYSICAL DESCRIPTION
Extent 84 p.
Dimensions ; 1 documenrto PDF
336 ## - CONTENT TYPE
Content type term texto (visual)
Source isbdcontent
337 ## - MEDIA TYPE
Media type term electrónico
Source isbdmedia
338 ## - CARRIER TYPE
Carrier type term recurso en línea
Source rdacarrier
520 ## - SUMMARY, ETC.
Summary, etc. In the past two decades, a global digital revolution has transformed societies and cultures, benefiting billions of people. However, while the Internet has become central to realizing economic and social opportunities, cyberthreats are also evolving rapidly and compromising trust in ICT — and only 76 countries have a clear plan in place to address that. Guide to Developing a National Cybersecurity Strategy — Strategic Engagement in Cybersecurity draws on the experiences and knowledge of 12 contributors from the public and private sectors to set out how to identify a common approach to risk management, establish response capabilities and contingency plans, promote information-sharing, conduct cybersecurity exercises, and encourage skills development. The guide looks at the overarching principles of devising a cybersecurity strategy, from human rights to best practices, and can assist policy-makers in developing offensive and defensive cybersecurity capabilities that protect our assets against illegal and destructive activities in cyberspace
540 ## - TERMS GOVERNING USE AND REPRODUCTION NOTE
Terms governing use and reproduction This work is available under the Creative Commons Attribution-NonCommercial <br/>3.0 IGO license (CC BY-NC 3.0 IGO) https://creativecommons.org/licenses/bync/3.0/igo/
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Ciberseguridad y confianza
9 (RLIN) 2188
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term cybersecurity
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term organisations
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term policy
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term strategy
856 4# - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://ncsguide.org/wp-content/uploads/2021/11/2021-NCS-Guide.pdf
Nonpublic note Abierto
Link text Acceso al documento
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Guía
Existencias
Withdrawn status Lost status Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Total Checkouts Barcode Date last seen Price effective from Koha item type Public note
      Acceso libre online Colección digital CDO CDO   07/12/2021   1000020177056 07/12/2021 07/12/2021 Guía pdf
Copyright© ONTSI. Todos los derechos reservados.
x
Esta web está utilizando la política de Cookies de la entidad pública empresarial Red.es, M.P. se detalla en el siguiente enlace: aviso-cookies. Acepto