Búsqueda

Mapping a path to cyber attribution consensus

<?xml version="1.0" encoding="UTF-8"?><modsCollection xmlns="http://www.loc.gov/mods/v3" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-8.xsd">
<mods version="3.8">
<titleInfo>
<nonSort xml:space="preserve">Mapp </nonSort>
<title>ing a path to cyber attribution consensus</title>
</titleInfo>
<name type="personal" usage="primary" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20200018698">
<namePart>Carter, Rachel Anne </namePart>
<nameIdentifier>MAPA20200018698</nameIdentifier>
</name>
<name type="personal" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20170006435">
<namePart>Enoizi, Julian</namePart>
<nameIdentifier>MAPA20170006435</nameIdentifier>
</name>
<name type="corporate" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080445805">
<namePart>Embedded Finance & Super App Strategies</namePart>
<nameIdentifier>MAPA20080445805</nameIdentifier>
</name>
<name type="corporate" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20200018704">
<namePart>The International Forum of Terrorism Risk (Re)Insurance Pools</namePart>
<nameIdentifier>MAPA20200018704</nameIdentifier>
</name>
<typeOfResource>text</typeOfResource>
<originInfo>
<place>
<placeTerm type="code" authority="marccountry">che</placeTerm>
</place>
<issuance>monographic</issuance>
<place>
<placeTerm type="text">Zurich</placeTerm>
</place>
<publisher>The Geneva Association</publisher>
<publisher>IFTRIP</publisher>
<dateIssued>2021</dateIssued>
</originInfo>
<language>
<languageTerm type="code" authority="iso639-2b">eng</languageTerm>
</language>
<physicalDescription>
<form authority="marcform">print</form>
<extent>36 p.</extent>
</physicalDescription>
<abstract displayLabel="Summary">The rapid pace of digital transformation, accelerated by COVID-19, is driving increased demand for cyber risk protection. There are a number of ways in which cyber risk protection can be achieved which include a high level of cyber hygiene, implementing and investing in standards for cyber security, not merely in terms of initial security measures but also a strategy for maintaining and upgrading security. Insurance is one mechanism, which focuses on the economic protection of a business if it experiences a cyberattack. Even though insuring cyber risk is challenging, not least due to the potential for large accumulations of loss, insurance as part of a broader security strategy can reduce overall losses. It can encourage behaviour that promotes the robustness of online systems and incentivises good cyber hygiene. </abstract>
<note type="statement of responsibility">Rachel Anne Carter, Julian Enoizi</note>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20140023066">
<topic>Ciberataques</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080557515">
<topic>Cibernética</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20140022700">
<topic>Ciberseguridad</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080552367">
<topic>Reaseguro</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20160007633">
<topic>Ciberriesgos</topic>
</subject>
<classification authority="">861</classification>
<recordInfo>
<recordContentSource authority="marcorg">MAP</recordContentSource>
<recordCreationDate encoding="marc">171205</recordCreationDate>
<recordChangeDate encoding="iso8601">20210409110513.0</recordChangeDate>
<recordIdentifier source="MAP">MAP20210011146</recordIdentifier>
<languageOfCataloging>
<languageTerm type="code" authority="iso639-2b">spa</languageTerm>
</languageOfCataloging>
</recordInfo>
</mods>
</modsCollection>