Search

Illuminating cyber crime : systemic risk scenario: major cyber attack

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000cam a22000004  4500</leader>
    <controlfield tag="001">MAP20230021118</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20231214123807.0</controlfield>
    <controlfield tag="008">231023s2023    gbr||||       ||| ||eng d</controlfield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">spa</subfield>
      <subfield code="d">MAP</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">861</subfield>
    </datafield>
    <datafield tag="245" ind1="1" ind2="0">
      <subfield code="a">Illuminating cyber crime</subfield>
      <subfield code="b">: systemic risk scenario: major cyber attack</subfield>
    </datafield>
    <datafield tag="260" ind1=" " ind2=" ">
      <subfield code="a">London</subfield>
      <subfield code="b">Lloyds</subfield>
      <subfield code="c">[2023]</subfield>
    </datafield>
    <datafield tag="300" ind1=" " ind2=" ">
      <subfield code="a">3 p.</subfield>
    </datafield>
    <datafield tag="520" ind1=" " ind2=" ">
      <subfield code="a">The threat of a cyber attack is ever present. Even the best-protected organisations can be stopped in their tracks, falling victim to the crippling cascade of digital disruption. To help you understand the most severe impacts of this threat and the steps you can take to improve your resilience, we've created a hypothetical but plausible scenario that describes a major cyber attack on global payments infrastructure and analysed the potential impact that this could have on the economy over the next five years</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140022700</subfield>
      <subfield code="a">Ciberseguridad</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140023066</subfield>
      <subfield code="a">Ciberataques</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080591182</subfield>
      <subfield code="a">Gerencia de riesgos</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20200022701</subfield>
      <subfield code="a">Evaluación de impacto</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140016556</subfield>
      <subfield code="a">Resiliencia</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080606091</subfield>
      <subfield code="a">Estrategia empresarial</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080612023</subfield>
      <subfield code="a">Predicciones económicas</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20100016923</subfield>
      <subfield code="a">Riesgo sistémico</subfield>
    </datafield>
    <datafield tag="710" ind1="2" ind2=" ">
      <subfield code="0">MAPA20080435387</subfield>
      <subfield code="a">Lloyd's</subfield>
    </datafield>
    <datafield tag="856" ind1="0" ind2="0">
      <subfield code="y">MÁS INFORMACIÓN</subfield>
      <subfield code="u">
mailto:centrodocumentacion@fundacionmapfre.org?subject=Consulta%20de%20una%20publicaci%C3%B3n%20&body=Necesito%20m%C3%A1s%20informaci%C3%B3n%20sobre%20este%20documento%3A%20%0A%0A%5Banote%20aqu%C3%AD%20el%20titulo%20completo%20del%20documento%20del%20que%20desea%20informaci%C3%B3n%20y%20nos%20pondremos%20en%20contacto%20con%20usted%5D%20%0A%0AGracias%20%0A
</subfield>
    </datafield>
  </record>
</collection>