{"id":324923,"date":"2024-10-19T22:32:17","date_gmt":"2024-10-19T22:32:17","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pas-962017-tc\/"},"modified":"2024-10-25T21:09:29","modified_gmt":"2024-10-25T21:09:29","slug":"bsi-pas-962017-tc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pas-962017-tc\/","title":{"rendered":"BSI PAS 96:2017 – TC"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
84<\/td>\n | Contents <\/td>\n<\/tr>\n | ||||||
85<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
87<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
88<\/td>\n | 1 Scope 2 Terms and definitions <\/td>\n<\/tr>\n | ||||||
91<\/td>\n | 3 Types of threat <\/td>\n<\/tr>\n | ||||||
95<\/td>\n | 4 Understanding the attacker <\/td>\n<\/tr>\n | ||||||
97<\/td>\n | 5 Threat Assessment Critical Control Point (TACCP) <\/td>\n<\/tr>\n | ||||||
100<\/td>\n | 6 Assessment <\/td>\n<\/tr>\n | ||||||
103<\/td>\n | 7 Critical controls <\/td>\n<\/tr>\n | ||||||
105<\/td>\n | 8 Response to an incident <\/td>\n<\/tr>\n | ||||||
106<\/td>\n | 9 Review of food protection arrangements <\/td>\n<\/tr>\n | ||||||
107<\/td>\n | Annex A (informative) TACCP case studies <\/td>\n<\/tr>\n | ||||||
128<\/td>\n | Annex B (informative) Sources of information and intelligence about emerging risks to food supply <\/td>\n<\/tr>\n | ||||||
130<\/td>\n | Annex C (informative) Complementary approaches to food and drink protection <\/td>\n<\/tr>\n | ||||||
131<\/td>\n | Annex D (informative) 10 Steps to cyber security: A board level responsibility <\/td>\n<\/tr>\n | ||||||
132<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Tracked Changes. Guide to protecting and defending food and drink from deliberate attack<\/b><\/p>\n |