Cyber security management model for critical infrastructure
نویسندگان
چکیده
منابع مشابه
A Review of Cyber Security Techniques for Critical Infrastructure Protection
Security is the most important aspect of any infrastructure. Infrastructure may be of private organization or government organization and the economy of the nation depends on this infrastructure. A no. of approaches have been developed and proposed of researcher to ensure the security of critical infrastructure. This paper surveys the existing techniques for critical infrastructure protection. ...
متن کاملPerformance, Robustness, and Cyber Security of Critical Infrastructure Systems – A Cyber-Physical Systems Research Theme
Critical infrastructures are complex physical and cyber-based systems that form the lifeline of modern society, and their reliable and secure operation is of paramount importance to national security and economic vitality. The US President’s Commission on Critical Infrastructure Protection (CCIP) [1] has identified telecommunications, electric power systems, natural gas and oil, banking and fin...
متن کاملCritical Information Infrastructure Protection (CIIP) and Cyber Security in Africa - Has the CIIP and Cyber Security Rubicon Been Crossed?
This paper reviews some very negative views, made over the last few years, about Critical Information Infrastructure Protection (CIIP) and Cyber Security in Africa. The paper addresses the expressed negative views that Africa can become the vehicle or platform from where cyber-attacks could be launched against the rest of the world. The paper evaluates the reasons for such negative views and th...
متن کاملCyber Security of Smart Grid Infrastructure
Smart grid security is crucial to maintain stable and reliable power system operation during the contingency situation due to the failure of any critical power system component. Ensuring a ‘secured smart grid’ involves with a less possibility of power grid collapse or equipment malfunction. Due to lack of the proper ‘security measures’, a major blackout may occur which can even lead to a cascad...
متن کاملCyber Security as an Emergent Infrastructure
When I began studying computer security in late 1972 as a Ph.D. student at Purdue University, the field was in its infancy. There were few academics working in the area, no research conferences or journals devoted to the field, and no professional societies to join. Security papers were presented at conferences and published in journals that covered more established areas of computer science, s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Entrepreneurship and Sustainability Issues
سال: 2017
ISSN: 2345-0282
DOI: 10.9770/jesi.2017.4.4(12)