Incident handling during attack on Critical Information Infrastructure Handbook

In this exercise, the participants should learn to conduct incident handling procedures related to Critical Information Infrastructure (CII) and Supervisory Control and Data Acquisition (SCADA) systems and be prepared to address incidents and overcome obstacles.

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information