Event-based Security Policy and Formal Model of Critical Information Infrastructures Protecting Mechanism

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Architectural Model for Information Security Analysis of Critical Information Infrastructures

Critical Information Infrastructures (CII) are computer systems and networks that support and control operations of many critical infrastructures that our society depends on, such as power plants, electrical grids, and water and waste facilities. Since the operations of CII also effect physical world, they are a good example of large-scale, critical cyber-physical systems. In recent years, CII ...

متن کامل

Approach to security assessment of critical infrastructures' information systems

This article presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary syste...

متن کامل

Cyber Security Threats to Safety-critical, Space-based Infrastructures

Space-based systems play an important role within national critical infrastructures. They are being integrated into advanced air-traffic management applications, rail signalling systems, energy distribution software etc. Unfortunately, the end users of communications, location sensing and timing applications often fail to understand that these infrastructures are vulnerable to a wide range of s...

متن کامل

Model-Based Security Event Management

With the growing size and complexity of current ICT infrastructures, it becomes increasingly challenging to gain an overview of potential security breaches. Security Information and Event Management systems which aim at collecting, aggregating and processing securityrelevant information are therefore on the rise. However, the event model of current systems mostly describes network events and th...

متن کامل

Chapter 2 CYBERSPACE POLICY FOR CRITICAL INFRASTRUCTURES

The first step in preparing any battlespace is to define the domain for attack and maneuver. The various military service components have directed authority to focus their efforts in specific domains of operations (e.g., naval operations are mainly in the maritime domain). However, cyberspace operations pose challenges because they span multiple operational domains. This paper focuses on U.S. c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Proceedings of Telecommunication Universities

سال: 2019

ISSN: 1813-324X

DOI: 10.31854/1813-324x-2019-5-4-99-105