Table of Contents Table of Contents
Previous Page  608-609 / 1143 Next Page
Information
Show Menu
Previous Page 608-609 / 1143 Next Page
Page Background

Links to MAHs

Threats can be malicious or accidental

They can originate from networks

(Intranet, or internet), or through

maintenance activities. E.g. software

upgrades, USB sticks, lap tops etc.

Equipment can have malware when it is

delivered to site or can be introduced via

maintenance personnel from vendors.

The controls by vendors are important