The expectations of users and organisations
Cyber security in the wider context
Some thoughts on social, political and other issues
Cyber harassment or cyber bullying
What makes cyber security difficult?
Critical national infrastructure (CNI) targets
Manufacturing and industry targets
4. CYBER VULNERABILITIES AND IMPACTS
Motives: what drives an attacker
Types of cyber-attack and attack vectors
The risks of conducting a cyber-attack
PART II CYBER SECURITY SOLUTIONS
6. INFORMATION RISK MANAGEMENT OVERVIEW
Qualitative and quantitative assessments
7. BUSINESS CONTINUITY AND DISASTER RECOVERY
9. ORGANISATIONAL SECURITY STEPS
Protection of shared information
Anonymisation of shared information
ISO/IEC 27000 series standards
National Institute of Standards and Technology (NIST) standards
APPENDIX B – GOOD PRACTICE GUIDELINES
UK government cyber security advice
APPENDIX C – CYBER SECURITY LAW
APPENDIX D – TRAINING AND QUALIFICATIONS
Generic cyber security training and qualifications
Specific cyber security training and qualifications
APPENDIX E – LINKS TO OTHER USEFUL ORGANISATIONS