1 |
Fredrik Bjorck, et al, "Cyber Resilience-Fundamentals for a Definition", Advances in Intelligent Systems & Computing, 2015
|
2 |
Ernst & Young, "Achieving Resilience in the Cyber Ecosystem", 2014
|
3 |
Springer, "New Contributions in Information Systems and Technologies", pp.313-315, 2015
|
4 |
Gartner, "Use Six Principles of Resilience to Address Digital Business Risk and Security", 2015
|
5 |
Carnegie Mellon, "CERT(R) Resilience Management Model, Version 1.0", 2010
|
6 |
Dept. of Homeland Security, "Cyber Resilience Review(CRR):Method Description and Self-Assessment User Guide", 2016
|
7 |
ISO/IEC 27001:2013, "Information Security Management Systems - Requirements", 2013
|
8 |
ISO/IEC 27002:27013, "Code of Practice for Information Security Controls", 2013
|
9 |
World Economic Forum, "Partnering for Cyber Resilience", 2012
|
10 |
ISO/IEC 27013:2015, "Guidance on the Integrated Implementation of ISO/IEC 27001 and ISO/ IEC 20000-1", 2015
|
11 |
ISO/IEC 27031:2011, "Guidelines for Information and Communication Technology Readiness for Business Continuity", 2011
|
12 |
ISO/IEC 27035:2011, "Information Security Incident Management", 2011
|
13 |
ISO/IEC 27036-1:2014, "Information Security for Supplier Relationships - Part 1: Overview and Concepts", 2014
|
14 |
ISO 22301:2012, "Societal Security - Business Continuity Management Systems - Requirements", 2012
|
15 |
ENISA, "Security and Resilience in eHealth, Security Challenges and Risks", 2015
|
16 |
ENISA, "Security and Resilience of Smart Home Environments, Good Practices and Recommendations", 2015
|
17 |
NIST, "NIST SP 800-61 Rev. 2, Computer Security Incident Handling Guide", 2012
|
18 |
ASIS SPC.1-2009, "Organizational Resilience: Security, Preparedness, and Continuity Management Systems-Requirements with Guidance for Use", 2009
|
19 |
NIST, SP 800-53 Rev. 4, Security and Privacy Controls for Federal Information Systems and Organizations", 2013
|