Improve of Evaluation Method for Information Security Levels of CIIP (Critical Information Infrastructure Protection)

ثبت نشده
چکیده

As the disfunctions of the information society and social development progress, intrusion problems such as malicious replies, spam mail, private information leakage, phishing, and pharming, and side effects such as the spread of unwholesome information and privacy invasion are becoming serious social problems. Illegal access to information is also becoming a problem as the exchange and sharing of information increases on the basis of the extension of the communication network. On the other hand, as the communication network has been constructed as an international, global system, the legal response against invasion and cyber-attack from abroad is facing its limit. In addition, in an environment where the important infrastructures are managed and controlled on the basis of the information communication network, such problems pose a threat to national security. Countermeasures to such threats are developed and implemented on a yearly basis to protect the major infrastructures of information communication. As a part of such measures, we have developed a methodology for assessing the information protection level which can be used to establish the quantitative object setting method required for the improvement of the information protection level. Keywords—Information Security Evaluation Methodology, Critical Information Infrastructure Protection.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Critical Information Infrastructure Protection (CIIP) Policies in Selected Countries: Findings of the CIIP Handbook

The International Critical Information Infrastructure Protection Handbook addresses the subject of critical information infrastructure protection (CIIP), a growingly important topic on the security policy agenda. The CIIP Handbook focuses on aspects of CIIP related to security policy and methodology. The security policy perspective evaluates policy efforts for the protection of critical informa...

متن کامل

Models of critical information infrastructure protection

This paper advocates the need to conceptualize or model critical information infrastructure protection (CIIP) in order to explain regulatory choices made by governments regarding CIIP. Building on previous attempts, it proposes two models of CIIP: the national security model and the business continuity model. Each of these models is based on a different, sometimes contrasting, set of values, na...

متن کامل

The Detailed Evaluation Criteria for Designation of Critical Information Infrastructure in the field of Broadcasting and Communication

Increasing to dependency on information infrastructures involves various threats to cyber incidents. Most of nations or organizations work on protect to not only infrastructure but also information infrastructure. Korea established Critical Information Infrastructure Protection Act in 2001 that include 5 evaluation criteria for designation of National CII. This research makes a suggestion that ...

متن کامل

Critical Information Infrastructure Protection (CIIP) and Cyber Security in Africa - Has the CIIP and Cyber Security Rubicon Been Crossed?

This paper reviews some very negative views, made over the last few years, about Critical Information Infrastructure Protection (CIIP) and Cyber Security in Africa. The paper addresses the expressed negative views that Africa can become the vehicle or platform from where cyber-attacks could be launched against the rest of the world. The paper evaluates the reasons for such negative views and th...

متن کامل

Implementing Critical Information Infrastructure Protection Structures in Developing Countries

The development of a national critical information infrastructure protection (CIIP) structure is essential to safeguard critical systems from cyber attacks and other threats. As developing nations leverage Internet technologies, it is imperative that they develop their own national CIIP structures to ensure reliable operations, incident response and resilience in the face of attacks. This paper...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012