• QUESTION 22-1 – Securing information and communication networks: best practices for developing a culture of cybersecurity
    • TABLE OF CONTENTS
    • Introduction
    • PART I – Developing and Obtaining Agreement on a National Cybersecurity Strategy
      • I.A Overview of the Goals under this Part
      • I.B Specific Steps to Achieve these Goals
    • PART II – Establishing Collaboration Between National Government and the Private Sector
      • II.A Overview of the Goals under this Part
      • II.B Specific Steps to Achieve these Goals
    • PART III – Deterring Cybercrime
      • III.A Overview of the Goal under this Part
      • III.B Specific Steps to Achieving this Goal
    • PART IV – Creating National Incident Management Capabilities: Watch, Warning, Response and Recovery
      • IV.A Overview of the Goals under this Part
      • IV.B Specific Steps to Achieve these Goals
    • PART V – Promoting A National Culture of Cybersecurity
      • V.A Overview of the Goal under this Part
      • V.B Specific Steps to Achieve this Goal
    • Appendix 1 – List of acronyms
    • Appendix 2 – National implementation strategy for cybersecurity cooperation & measures of effectiveness
    • Annex A – Case Study: Spam
    • Annex B – Identity Management
    • Annex C – Links and references