ISM-0254

History

2008
Agencies training system users and system administrators should include information on: a. how to recognise an anomaly that could indicate a possible ICT security incident b. contacts in the event of a real or suspected ICT security incident.