Chapter 2  –  Further elements of systems, protocols, and tools to minimise the impact of ICT risk