Environmental risks : cyber security and critical industries
<?xml version="1.0" encoding="UTF-8"?><modsCollection xmlns="http://www.loc.gov/mods/v3" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-8.xsd">
<mods version="3.8">
<titleInfo>
<title>Environmental risks</title>
<subTitle>: cyber security and critical industries</subTitle>
</titleInfo>
<name type="corporate" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20200001416">
<namePart>AXA XL</namePart>
<nameIdentifier>MAPA20200001416</nameIdentifier>
</name>
<typeOfResource>text</typeOfResource>
<originInfo>
<place>
<placeTerm type="code" authority="marccountry">usa</placeTerm>
</place>
<issuance>monographic</issuance>
<place>
<placeTerm type="text">Exton</placeTerm>
</place>
<publisher>AXA XL</publisher>
<dateIssued>2020</dateIssued>
</originInfo>
<language>
<languageTerm type="code" authority="iso639-2b">eng</languageTerm>
</language>
<physicalDescription>
<form authority="marcform">print</form>
<extent>16 p.</extent>
</physicalDescription>
<abstract displayLabel="Summary">Cyber security along with physical security is vital to critical industries such as: energy, transportation, telecommunications, financial services, energy production and transmission, public services/utilities, and chemical and manufacturing industries. Most businesses have some vulnerability to a cyber incident, but particularly if they rely on complex supervisory control and data acquisition (SCADA) systems. This paper examines the various types of cyber intrusions and attacks and how they can pose a significant pollution liability risk. Cyber crime can result in loss of control of critical equipment and warning systems and has the potential to cause damage to human health and the environment from catastrophic spills, waste discharges, and air emissions. These events can cause fires, explosions and hazardous material releases that result in bodily injury, property damage, environmental remediation expense, and significant legal liability claims. The paper concludes with guidance on best management practices, risk management controls, prevention steps, and essential elements of a cyber security program.</abstract>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20140022700">
<topic>Ciberseguridad</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080587628">
<topic>Riesgo tecnológico</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20100017982">
<topic>Riesgos emergentes</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080624804">
<topic>Protección del medio ambiente</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080615284">
<topic>Riesgos medioambientales</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080591182">
<topic>Gerencia de riesgos</topic>
</subject>
<classification authority="">861</classification>
<relatedItem type="series">
<titleInfo>
<title>XL Insurance</title>
</titleInfo>
</relatedItem>
<recordInfo>
<recordContentSource authority="marcorg">MAP</recordContentSource>
<recordCreationDate encoding="marc">200214</recordCreationDate>
<recordChangeDate encoding="iso8601">20200727084935.0</recordChangeDate>
<recordIdentifier source="MAP">MAP20200025337</recordIdentifier>
<languageOfCataloging>
<languageTerm type="code" authority="iso639-2b">eng</languageTerm>
</languageOfCataloging>
</recordInfo>
</mods>
</modsCollection>