This collection comprises:
- an introduction to cyber security for executive/board-level staff
- a white paper that explains what a common cyber attack looks like, and how attackers execute them
- the 10 technical advice sheets you should consider putting in place
Introduction to Cyber Security
-
10 Steps: Executive Summary
Guidance on how organisations can protect themselves in cyberspace, including the 10 steps to cyber security.
-
10 Steps: A Board Level Responsibility
Why protecting your information is a board-level responsibility.
-
Common Cyber Attacks: Reducing the Impact
This white paper explains how basic security controls can protect organisations from the most common cyber attacks.
Technical advice sheets
-
10 Steps: Risk Management Regime
Why defining and communicating your Board’s Information Risk Management Regime is central to your organisation’s overall cyber security strategy.
-
10 Steps: Secure Configuration
This section from within the NCSC's '10 Steps To Cyber Security' concerns Secure Configuration.
-
10 Steps: Network Security
This section from within the NCSC's '10 Steps To Cyber Security' concerns Network Security.
-
10 Steps: Managing User Privileges
This section from within the NCSC's '10 Steps To Cyber Security' concerns Managing User Privileges.
-
10 Steps: User Education and Awareness
This section from within the NCSC's '10 Steps To Cyber Security' concerns User Education and Awareness.
-
10 Steps: Incident Management
This section from within the NCSC's '10 Steps To Cyber Security' concerns Incident Management.
-
10 Steps: Malware Prevention
This section from within the NCSC's '10 Steps To Cyber Security' concerns Malware Prevention.
-
10 Steps: Monitoring
This section from within the NCSC's '10 Steps To Cyber Security' concerns Monitoring.
-
10 Steps: Removable Media Controls
This section from within the NCSC's '10 Steps To Cyber Security' concerns Removable Media Controls.
-
10 Steps: Home and Mobile Working
This section from within the NCSC's '10 Steps To Cyber Security' concerns Home and Mobile Working.
Source: https://www.ncsc.gov.uk/guidance/10-steps-cyber-security
Comments
0 comments
Please sign in to leave a comment.