12.12.2016 Views

Cybersecurity Management Guidelines Ver 1.1

CSM_Guidelines_v1.1_en

CSM_Guidelines_v1.1_en

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

malware prevention. Consider the introduction of multi-layer protective systems such<br />

as encryption of information and segregation of networks based on the differences of<br />

information assets with regards to terminals, networks and IT systems or IT services<br />

(including cloud service) with which important tasks are conducted.<br />

11

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!