Critical Information Infrastructure Protection
Source:
Information & Security: An International Journal,Volume: 17,
p.105-119
(2005)
Keywords:
Critical Information Infrastructure Protection, Information Security, Malware Attacks, National Cybersecurity, VulnerabilitiesAbstract:
The article provides a brief description of critical information infrastructure and analyzes the extent to which organizations depend on the proper functioning of banking and financial services, electricity, fuel and water supply networks, as well as information and telecommunication networks. The consequences of attacks on specific elements of these infrastructures are examined, as well as the initiatives and problems that arise with their protection on national and international level. Special attention is paid to the state of critical infrastructure protection in Bulgaria, with analysis of the reasons for its poor level and recommendations for improvement.
23
Views
149
Downloads
2022 1st International Conference on 6G Networking (6GNet)
(2022):
International Journal of Legal Discourse
(2021):
Seventh Framework Programme Information & Communication Technologies Trustworthy ICT, Network of Excellence
(2011):
Jurnal Penelitian Pos dan informatika
6,
no. 1
(2016):
Institute of Computer Science, Cyber Security Curriculum
Master’s Thesis
(2016):
"Modelo de Segurança da Informação para Organizações Militares em Ambiente de Guerra de Informação."
Proelium (Revista Científica da Academia Militar)
VII
(2012):
31-66.
School of Computing Science, College of Science and Engineering
Doctor of Philosophy
(2016):
Potchefstroom Electronic Law Journal
16,
no. 1
(2013):
"A Proposed Framework to Measure Growth of Critical Information Infrastructure Protection in Africa."
Conference: International Conference on Emerging Trends in Network and Computer Communication
(2014):
Iccws 2015 - The Proceedings of the 10th International Conference on Cyber Warfare and Security
(2015):
Regional Department of Defense Resources Management Studies
(2014):
Critical Information Infrastructures Security. CRITIS 2016. Lecture Notes in Computer Science
(2017):
75-87.
International Journal of Critical Infrastructure Protection
25
(2019):
50-61.
Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection
(2013):
262-285.
2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications
(2012):
2015 5th World Congress on Information and Communication Technologies (WICT)
(2015):
2015 Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec)
(2015):
Information & Communications Technology Law
19,
no. 1
(2010):
"A proposed framework to measure growth of Critical Information Infrastructure Protection in Africa."
2015 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)
(2015):
e-Infrastructure and e-Services for Developing Countries. AFRICOMM 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
(2012):
ICCWS 2016 11th International Conference on Cyber Warfare and Security
(2016):
Jurnal Penelitian Pos & Informatika
6,
no. 1
(2016):
Buletin Pos dan Telekomunikasi
13,
no. 1
(2015):
43-60.
Terrorism Online: Politics, Law and Technology
(2015):
Potchefstroom Electronic Law Journal
16,
no. 1
(2013):
Environmental Impact Assessment Review
72
(2018):
1-11.
School of Science and Technology
Master of Science in Information Systems and Technology
(2017):
"A Conceptual Model for the Development of a National Cybersecurity Index: An Integrated Framework."
Twenty-first Americas Conference on Information Systems
(2015):
Land Use Policy
30,
no. 1
(2013):
Elsevier.
2nd Annual Symposium on Information Assurance, Academic Track of 10th Annual NYS Cyber Security Conference Empire State Plaza Albany
(2007):