History
- 2008
- Agencies training system users and system administrators should include information on: a. how to recognise an anomaly that could indicate a possible ICT security incident b. contacts in the event of a real or suspected ICT security incident.