CPNI archive

Archive content originally produced by CPNI that has not yet been absorbed into the new NCSC web pages.
Showing 19 results
Sort by: A-Z|Date
  • Effective log file management

    Document21 Oct 2016TopicsArchived guidance, CPNI archive

    Archive content originally produced by CPNI that has not yet been absorbed into the new NCSC web pages.

  • Threat intelligence case studies: cyber attack types

    Document06 Oct 2016TopicsArchived guidance, CPNI archive

    Archive content originally produced by CPNI that has not yet been absorbed into the new NCSC web pages.

    Case studies of real-world incidents, to help you understand how attacks are conducted. Describing real events, they also help show the potential impact of attacks and the failures that lead to compromise.

  • Threat Intelligence: Collecting, Analysing, Evaluating

    Guidance06 Oct 2016TopicsArchived guidance, CPNI archive

    Archive content originally produced by CPNI that has not yet been absorbed into the new NCSC web pages.

    A framework for threat intelligence that can be scaled to different sectors, sizes of organisation, and organisational goals

  • Threat intelligence: executive summary & infographic

    Guidance06 Oct 2016TopicsArchived guidance, CPNI archive

    Archive content originally produced by CPNI that has not yet been absorbed into the new NCSC web pages.

    Why ‘doing’ threat intelligence is important – but doing it intelligently is critical.

  • Threat intelligence: video summary

    Guidance06 Oct 2016TopicsArchived guidance, CPNI archive

    Archive content originally produced by CPNI that has not yet been absorbed into the new NCSC web pages.

    A brief video that introduces the key concepts of threat intelligence.

  • PIANOS: Protecting Information About Networks, the Organisation and its Systems

    Guidance05 Oct 2016TopicsArchived guidance, CPNI archive

    Archive content originally produced by CPNI that has not yet been absorbed into the new NCSC web pages.

    Advice to help organisations impede attackers' progress into their IT infrastructures.

  • Security for Industrial Control Systems

    Guidance01 Oct 2016TopicsArchived guidance, CPNI archive

    Archive content originally produced by CPNI that has not yet been absorbed into the new NCSC web pages.

    A framework and set of good practice guides for securing Industrial Control Systems.

  • 20 Critical Controls

    Guidance01 Oct 2016TopicsArchived guidance, CPNI archive

    Archive content originally produced by CPNI  that has not yet been absorbed into the new NCSC web pages.

    High-priority information security measures and controls that can be applied across an organisation in order to improve its cyber defence

  • Cyber insiders: network administrators (video)

    Guidance01 Oct 2016TopicsArchived guidance, CPNI archive

    Archive content originally produced by CPNI that has not yet been absorbed into the new NCSC web pages.

    This video outlines the insider threat from network administrators.

  • Cyber insiders: detection and deterrence (video)

    Guidance01 Oct 2016TopicsArchived guidance, CPNI archive

    Archive content originally produced by CPNI that has not yet been absorbed into the new NCSC web pages.

    This video outlines the importance of detecting and deterring insider threat .

  • Insider misuse of systems

    Guidance01 Oct 2016TopicsArchived guidance, CPNI archive

    Archive content originally produced by CPNI that has not yet been absorbed into the new NCSC web pages.

    This paper is a brief summary of the types of insider cases that CPNI has examined as part of its Cyber Insiders Programme

  • Managing insider risks to IT: key principles

    Guidance01 Oct 2016TopicsArchived guidance, CPNI archive

    Archive content originally produced by CPNI that has not yet been absorbed into the new NCSC web pages.

    An infographic summarising the key principles that organisations should be aware of in order to manage insider risks.

  • Cyber security assessments of industrial control systems

    Guidance01 Oct 2016TopicsArchived guidance, CPNI archive

    Archive content originally produced by CPNI that has not yet been absorbed into the new NCSC web pages.

    An overview of how to plan and execute a cyber security assessment.

  • Configuring and Managing Remote Access for Industrial Control Systems

    Guidance01 Oct 2016TopicsArchived guidance, CPNI archive

    Archive content originally produced by CPNI that has not yet been absorbed into the new NCSC web pages.

    This practice document provides support for developing remote access solutions for industrial control systems

  • Configuring and managing remote access for industrial control systems

    Guidance01 Oct 2016TopicsArchived guidance, CPNI archive

    Archive content originally produced by CPNI that has not yet been absorbed into the new NCSC web pages.

    Guidance for the development of remote access strategies for industrial control systems.

  • Firewall deployment for SCADA and process control networks

    Guidance01 Oct 2016TopicsArchived guidance, CPNI archive

    Archive content originally produced by CPNI that has not yet been absorbed into the new NCSC web pages.

    A look at the current practices in SCADA/PCN firewall deployment.

  • Mitigating insider risks with IT security

    Guidance01 Oct 2016TopicsArchived guidance, CPNI archive

    Archive content originally produced by CPNI that has not yet been absorbed into the new NCSC web pages.

    Guidance for security managers responsible for insider threat and have some responsibility for their organisation’s IT security.

  • Securing the move to IP-based SCADA/PLC networks

    Document29 Sep 2016TopicsArchived guidance, CPNI archive

    Archive content originally produced by CPNI that has not yet been absorbed into the new NCSC web pages.

    This guidance is designed to impart good practice advice for securing industrial control systems 

  • Spear Phishing - Understanding the threat

    Document29 Sep 2016TopicsArchived guidance, CPNI archive

    Archive content originally produced by CPNI that has not yet been absorbed into the new NCSC web pages.