Belgian Cyber Security Guide

Page 66

BIBLIOGRAPHY

Allen & Overy. (2012). EU and U.S. propose new cybersecurity strategies. London, United Kingdom Retrieved from http://www.allenovery.com/publications/en-gb/Pages/EU-and-U-S--propose-new-cybersecurity-strategies.aspx

Bergsma, K. (2011). Information Security Governance. Retrieved from https://wiki.internet2.edu/confluence/display/itsg2/Information+Security+Governance

Bescherm je bedrijf. Retrieved from http://www.beschermjebedrijf.nl

CERT-EU. (2012). Incident Response – Data Acquisition Guidelines for Investigation Purposes version 1.3. Retrieved from http://cert.europa.eu/static/WhitePapers/CERT-EU-SWP_12_004_v1_3.pdf

CERT-EU. (2011). Security White Paper 2011-003 - Guidelines for handling common malware infections on Windows based workstations. Retrieved from http://cert.europa.eu/static/WhitePapers/CERT-EU-SWP_11_003_v2.pdf

CESG. (2012). 10 Steps to Information security. Gloucestershire, United Kingdom Retrieved from https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/73128/12-1120-10-steps-to-cyber-security-executive.pdf

Cyber Security Strategy.be.(2012). Belgium. Retrieved from http://www.b-ccentre.be

EYGM Limited. (2012). Fighting to close the gap: Ernst & Young’s 2012 Global Information Security Survey. Retrieved from http://www.ey.com/Publication/vwLUAssets/Fighting_to_close_the_gap:_2012_Global_Information_Security_Survey/$FILE/2012_Global_ Information_Security_Survey___Fighting_to_close_the_gap.pdf

Federal Communications Commission, Information security Planning Guide, 2012 Federal Communications Commission. (2012). Information security Planning Guide. Washington, DC: Retrieved from http://www.fcc.gov/cyber/cyberplanner.pdf

66

| BELGIAN CYBER SECURITY GUIDE


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.