Table of Contents Table of Contents
Previous Page  630-631 / 1145 Next Page
Information
Show Menu
Previous Page 630-631 / 1145 Next Page
Page Background

What does it cover

Defining the systems that are susceptible to

cyber threats

Risk assessment and ALARP demonstration-

note the issues here.

Putting proportionate control measures. The

guide identifies a range of example measures.

Operation and maintenance

Audit, monitor and review

Change control