Search results

Jump to navigation Jump to search
  • {{#ask: [[Category:Main]][[defined by::Scotland]] | format=category | limit=1000 }}
    279 bytes (41 words) - 02:29, 2 December 2016
  • {{#ask: [[Category:Main]][[defined by::United Kingdom||Scotland||IIsle of Man]]| format=category | limit=1000 }}
    302 bytes (46 words) - 01:42, 24 January 2020
  • ...][[defined by::EU||European Commission||Council of Europe||UNited Kingdom||Scotland||Wales||Norway||Sweden||Finland||Denmark||Netherlands||Belgium||Germany||Po
    616 bytes (81 words) - 02:35, 10 January 2021
  • Chile's national critical information infrastructure is categorised by the following critical sectors: <ref>[http://ciberseguridad.interior.gob.cl Ghana's national critical information infrastructure is categorised by the following critical sectors: <ref>[https://www.csa.gov.gh/resources/Dir
    6 KB (677 words) - 00:58, 15 November 2023
  • ...le. Each new definition should be formatted as a heading level 4, followed by the unformatted text of the definition. An example follows below: --> ...le. Each new definition should be formatted as a heading level 4, followed by the unformatted text of the definition. Enclose the name with [[ ]] to link
    6 KB (811 words) - 14:36, 30 January 2020
  • ...capacity can be framed in many different ways; an inventory has been made by the Dutch Climate Changes Spatial Planning research programme.<br /><br/> ...nning horizon of the assessment, and adaptive capacity that is constrained by existing information, technology and resources of the system under consider
    8 KB (1,137 words) - 23:13, 27 June 2019
  • ...recovery. What constitutes an acceptable level of resilience is determined by a risk assessment. This can help with the selection of the right technical, ...dapting to cyber threats and other relevant changes in the environment and by withstanding, containing and rapidly recovering from cyber incidents <ref>[
    15 KB (1,808 words) - 11:21, 1 April 2024
  • {{definition|A process by which a [[CBRN]] substance/material becomes available for absorption, swall ==== [[Scotland]] ====
    13 KB (1,569 words) - 13:40, 15 August 2022
  • {{definition|Infrastructure is defined as: The framework of interdependent networks and systems comprising identif ====[[Scotland]]====
    14 KB (1,765 words) - 00:47, 15 November 2023
  • The EU EURAM project defined Risk mitigation as: {{definition|Action of reducing a risk by implementing security controls, taking assurance measures, avoiding the ris
    23 KB (3,049 words) - 13:48, 15 August 2022
  • ...le. Each new definition should be formatted as a heading level 4, followed by the unformatted text of the definition. An example follows below: --> {{definition|Adaptation - Is a process by which strategies to moderate, cope with and take advantage of the consequen
    20 KB (2,599 words) - 17:14, 19 December 2020
  • {{definition|[https://un.mfa.gov.by/docs/doctrine_of_information_security_of_the_republic_of_belarus.pdf DOCTRI ...v.vn/Upload_Moi/2018/QD-898Eng1--7-.docx Vietnam's Cybersecurity Strategy by 2020 (2016)]}}
    101 KB (12,017 words) - 11:35, 1 April 2024
  • ...Parliament and of the Council, which carry out the function of ‘supply’ as defined in Article 2, point (12), of that Directive |Distribution system operators as defined in Article 2, point (29), of <ref name="EU2019944">[http://data.europa.eu/e
    63 KB (7,982 words) - 14:01, 19 October 2023
  • ...fferent ways in which resilience can be framed; an inventory has been made by the Dutch Climate Changes Spatial Planning research programme. <br/><br/> ...ommunity in respect to potential [[hazard]] [[event|events]] is determined by the degree to which the community has the necessary resources and is capabl
    64 KB (8,511 words) - 01:00, 15 November 2023
  • ...lity or flaw of an asset, system, process or control that can be exploited by a cyber threat. <ref name="NIS Directive2">[https://eur-lex.europa.eu/eli/d ...ion, or operation that renders it susceptible to disruption or destruction by a [[threat]] and includes [[dependency|dependencies]] on other types of [[i
    67 KB (9,377 words) - 23:17, 10 January 2023
  • ...information systems, the users of such systems, and other persons affected by cyber threats. <ref name=CSact>[https://eur-lex.europa.eu/eli/reg/2019/881/ ...nd [[integrity]] of information that is processed, stored and communicated by electronic or similar means. <ref>[http://www.ag.gov.au/RightsAndProtection
    121 KB (15,215 words) - 11:21, 1 April 2024