Showing 1 - 10 of 1,100
Taking into account the main third-party cybersecurity assessments methodologies for ICT products and cloud services as well as the number of assessment bodies, the report presents the current state of play of cybersecurity assessments based on the past 5 years data. This study aims at analysing...
Persistent link: https://www.econbiz.de/10015277159
Persistent link: https://www.econbiz.de/10014438002
Persistent link: https://www.econbiz.de/10014373522
Persistent link: https://www.econbiz.de/10012697974
Persistent link: https://www.econbiz.de/10012153912
Persistent link: https://www.econbiz.de/10012305095
Introduction -- Chapter 1: Expanding Security: The CIA Triad -- Chapter 2: Security Management -- Chapter 3: Access Control -- Chapter 4: Security Architecture -- Chapter 5: Business Continuity and Disaster Recovery Planning -- Chapter 6: Physical Security -- Chapter 7: Cryptography (Yes,...
Persistent link: https://www.econbiz.de/10013182715
Persistent link: https://www.econbiz.de/10013182954
The Department of Homeland Security (DHS) facilitates cybersecurity information sharing among federal government departments and agencies and critical infrastructure owners and operators to promote their security. Information sharing is deemed of critical importance to accomplish the...
Persistent link: https://www.econbiz.de/10014147036
Many governments subsidize regional rail service as an alternative to road traffic. This paper assesses whether increases in service frequency reduce road traffic externalities. We exploit differences in service frequency growth by procurement mode following a railway reform in Germany to...
Persistent link: https://www.econbiz.de/10014161226