use the following links to go to different parts of this page:
CPNI - Centre for the Protection of National Infrastructure
You are here:
The section provides advice on how you can help protect various business information systems from electronic attack.
Applications are pieces of software that perform specific tasks. It is essential to understand that they do not exist in a vacuum and so their security must be considered as part of the environment they inhabit.
This page provides information and documentation on the Internet Protocol version 6 (IPv6).
There is a growing trend for electronic devices and systems to be connected through a variety of networks. There are also increasing commercial pressures for disparate company networks to be inter-connected, often using the internet.
An operating system is a software interface between the hardware and the user. There are three characteristics of good system security: identity and authentication; access control; and audit and accountability.
Almost all critical industrial infrastructures and processes are managed remotely from central control rooms, using computers and communications networks. The flow of gas and oil through pipes, the processing and distribution of water, the management of the electricity grid, the operation of chemical plants, and the signalling network for railways. These all use various forms of process control and 'supervisory control and data acquisition' - known as SCADA technology.
The dependability of the telecommunications infrastructure is vital to the wellbeing of most organisations and, by extension, the wider national infrastructure.
Guidance papers are intended to provide detailed information security advice that helps inform organisational risk management decisions. The associated viewpoint documents provide a summary of the most pertinent points to consider.
Page bottom. Go to top of page.