Committed to connecting the world

Girls in ICT

Question 3/2: Securing information and communication networks: Best practices for developing a culture of cybersecurity

Question 3/2: Securing information and communication networks: Best practices for developing a culture of cybersecurity
Year: 2017
Persistent link: http://handle.itu.int/11.1002/pub/80ec6ee6-en
This report is composed of a number of best practice reports on different aspects of cybersecurity. It shares the analysis of an ITU cybersecurity awareness survey and provides a view on spam, its causes, and means to address spam. The report also provides a sampling of outreach activities that governments have taken to improve their overall societal posture toward cybersecurity.

Table of contents

electronic file
ITEM DETAILARTICLEPRICE
ENGLISH
PDF format  
  Free of chargeDOWNLOAD
 
Mobi format for Kindle  
  Free of chargeDOWNLOAD
 
ePub format for iPad, Nook, Sony Reader, and others  
  Free of chargeDOWNLOAD
ARABIC
PDF format  
  Free of chargeDOWNLOAD
 
Mobi format for Kindle  
  Free of chargeDOWNLOAD
 
ePub format for iPad, Nook, Sony Reader, and others  
  Free of chargeDOWNLOAD
CHINESE
PDF format  
  Free of chargeDOWNLOAD
 
Mobi format for Kindle  
  Free of chargeDOWNLOAD
 
ePub format for iPad, Nook, Sony Reader, and others  
  Free of chargeDOWNLOAD
SPANISH
PDF format  
  Free of chargeDOWNLOAD
 
Mobi format for Kindle  
  Free of chargeDOWNLOAD
 
ePub format for iPad, Nook, Sony Reader, and others  
  Free of chargeDOWNLOAD
FRENCH
PDF format  
  Free of chargeDOWNLOAD
 
Mobi format for Kindle  
  Free of chargeDOWNLOAD
 
ePub format for iPad, Nook, Sony Reader, and others  
  Free of chargeDOWNLOAD
RUSSIAN
PDF format  
  Free of chargeDOWNLOAD
 
Mobi format for Kindle  
  Free of chargeDOWNLOAD
 
ePub format for iPad, Nook, Sony Reader, and others  
  Free of chargeDOWNLOAD