This paper explains the legal requirements for cyber security that operators of critical infrastructures in Germany need to comply with. It describes the cyclic process of an information security management system and compares it against corresponding ser
Files
File Name | ||
998-2095-11-22-17AR0_EN.pdf
|
|