File
Cyber security
2018-03-09
Available for download: English

The aim of any cyber security strategy is to protect as many assets as possible and especially the most important – the “crown jewels”. Since it is not feasible, sensible or even efficient to try to protect everything in equal measure, it is important to identify what is valuable and needs greatest protection, identify vulnerabilities, then to prioritize and to erect defence-in-depth architecture that ensures business continuity.