Critical Infrastructure Security Guide 2

How to design and implement a cyber security strategy

Download this Paper


This guide provides a general introduction into the processes and technologies of cyber security, specifically in relation to the communications that integrate an ICS. Its purpose is to help managers and decision makers to understand the cyber-security implications of existing and emerging communications technologies, and how organizations can begin the process of protecting their assets from cyber-threats.

In this paper, you will learn about:

  • Where to start
  • Knowing which regulations apply
  • Seven strategies for network security
  • Where to go for more information

This guide should be read in conjunction with;

Critical Infrastructure Security Guide 1:
What network operators need to understand about the cyber security threat