CIIP-RAM - a step-wise security risk analysis methodology for critical information infrastructure protection

Busuttil, T. B. and Warren, M. J. 2003, CIIP-RAM - a step-wise security risk analysis methodology for critical information infrastructure protection, in Proceedings 4th Australian Information Warfare and IT Security Conference - Enhancing Trust, [University of South Australia], [Adelaide, S. Aust.], pp. 91-103.

Attached Files
Name Description MIMEType Size Downloads

Title CIIP-RAM - a step-wise security risk analysis methodology for critical information infrastructure protection
Author(s) Busuttil, T. B.
Warren, M. J.
Conference name Australian Information Warfare and IT Security Conference (4th : 2003 : Adelaide, Australia)
Conference location Adelaide, Australia
Conference dates 20-21 November 2003
Title of proceedings Proceedings 4th Australian Information Warfare and IT Security Conference - Enhancing Trust
Editor(s) Slay, Jill
Publication date 2003
Start page 91
End page 103
Publisher [University of South Australia]
Place of publication [Adelaide, S. Aust.]
Keyword(s) critical information infrastructure
security risk analysis
informnation warfare
Summary Wilh the protection of critical information infrastructure becoming a priority for all levels of management. there is a need for a new security methodology to deal with the new and unique attack threats and vulnerabilities associated with the new information technology security paradigm. The fourth generation security risk analysis melhod which copes wilh the shift from computer/information security to critical information iinfrastructure protectionl is lhe next step toward handling security risk at all levels. The paper will present the methodology of
fourth generation models and their application to critical information infrastructure protection and the associated advantagess of this methodology.
Notes Invalid ISBN provided : 086803995
Language eng
Field of Research 080608 Information Systems Development Methodologies
HERDC Research category E1 Full written paper - refereed
Copyright notice ©2003, The authors
Persistent URL http://hdl.handle.net/10536/DRO/DU:30005070

Document type: Conference Paper
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Access Statistics: 346 Abstract Views, 1 File Downloads  -  Detailed Statistics
Created: Mon, 07 Jul 2008, 09:45:02 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.