Cybersecurity Management Guidelines Ver 1.1
CSM_Guidelines_v1.1_en
CSM_Guidelines_v1.1_en
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
malware prevention. Consider the introduction of multi-layer protective systems such<br />
as encryption of information and segregation of networks based on the differences of<br />
information assets with regards to terminals, networks and IT systems or IT services<br />
(including cloud service) with which important tasks are conducted.<br />
11