Category
          Guidance Document
              Type
          Standard
              Access
              Open
          Status
              Active
          Created
              February 2010
          Updated
              February 2017
          
          This document replaces the previous Strategies to Mitigate Targeted Cyber Intrusions – Mitigation Details publication and directly complements the Strategies to Mitigate Cyber Security Incidents publication.
This information helps organisations mitigate cyber security incidents caused by targeted cyber intrusions, ransomware, malicious insiders, business email compromise and threats to industrial control systems.
Main sections:
· Threat overview
· Relevance of mitigation strategies to additional threats
· Overarching considerations when implementing mitigation strategies
· Mitigation strategies to prevent malware delivery and execution
· Mitigation strategies to limit the extent of cyber security incidents
· Mitigation strategies to detect cyber security incidents and respond
· Mitigation strategies to recover data and system availability
· Mitigation strategy specific to preventing malicious insiders
· Further information
This information helps organisations mitigate cyber security incidents caused by targeted cyber intrusions, ransomware, malicious insiders, business email compromise and threats to industrial control systems.
Main sections:
· Threat overview
· Relevance of mitigation strategies to additional threats
· Overarching considerations when implementing mitigation strategies
· Mitigation strategies to prevent malware delivery and execution
· Mitigation strategies to limit the extent of cyber security incidents
· Mitigation strategies to detect cyber security incidents and respond
· Mitigation strategies to recover data and system availability
· Mitigation strategy specific to preventing malicious insiders
· Further information
Access Strategies to Mitigate Cyber Security Incidents – Mitigation Details
By accessing this content, you are leaving this website. The Agency takes no responsibility for the accuracy of content on the destination page.