


Annex B – Additional Resources

Annex A – Cybersecurity Readiness

Implementation Guidance for Information Sharing
The implementation of an information sharing framework requires collaborating Read More

Technical Aspects Involving Information Sharing
Technical controls and standardization may be used to improve efficiency, reduce Read More

People and Organizations Involved with Information Sharing
People and organizations are the key determinants to the success of Read More

Methods and Processes for Information Sharing
To effect the information sharing policies, and ensure consistency of practice, Read More

Policies for Information Sharing
Information Providing Organizations and Information Receiving Read More
Overview of the Information Sharing Framework
Cybersecurity incidents often cross national geographical and organizational Read More

Cybersecurity Readiness
Annex A describes additional technical controls that are applicable for Read More

Social Engineering Controls
Cybercriminals are increasingly resorting to psychological or social engineering Read More

End-User Controls
The following is an incomplete list of controls that end-users can use to Read More

Server Protection Controls
The following controls can be used to protect servers against unauthorized Read More

Application Level Controls
Application level controls include the following: Display of short notices, Read More

Overview of Cybersecurity Controls
Once the risks to cybersecurity are identified and appropriate guidelines are Read More

Security Guidance for Consumers
Service providers should provide guidance to consumers on how to stay secure Read More
- 1
- 2
- 3
- 4
- Next Page »