CSCI E-170 Reading

Lecture 08: Protecting Infrastructure & Incident Response


required reading:




Other documents

optional reading:

Documents that may be of interest

·          Sabotage Reporting

·          Critical Cyber Asset Identification

·          Security Management Controls

·          Personnel & Training

·          Electronic Security Perimeter(s)

·          Physical Security of Critical Cyber Assets

·          Systems Security Management

·          Incident Reporting and Response Planning

·          Recovery Plans for Critical Cyber Assets