A risk analysis approach to critical information infrastructure protection

Busuttil, T. and Warren, Matthew 2004, A risk analysis approach to critical information infrastructure protection, in 5th Australian Information Warfare and Security Conference 2004 : From information warfare to information operations, Edith Cowan University, School of Management Information Systems, We-B Centre, Churchlands, W.A., pp. 1-11.

Attached Files
Name Description MIMEType Size Downloads

Title A risk analysis approach to critical information infrastructure protection
Author(s) Busuttil, T.
Warren, Matthew
Conference name Australian Information Warfare & Security. Conference (5th : 2004 : Perth, W.A.)
Conference location Perth, Western Australia
Conference dates 25-26 November 2004
Title of proceedings 5th Australian Information Warfare and Security Conference 2004 : From information warfare to information operations
Editor(s) Stockdale, Craig
Stockdale, Rosemary
Publication date 2004
Conference series Australian Information Warfare & Security Conference
Start page 1
End page 11
Publisher Edith Cowan University, School of Management Information Systems, We-B Centre
Place of publication Churchlands, W.A.
Keyword(s) critical information infrastructure
security risk analysis
information security
Summary Critical Information Infrastructure (CII) has become a priority for all levels of management, It is one of the key components of efficient business and business continuity plans. There is a need for a new security methodology to deal with the new and unique attack threats and vulnerabilities associated with the new information technology security paradigm. Critical Information Infrastructure Protection - Risk Analysis Methodology
(ClIP-RAM), is a new security risk analysis method which copes with the shift from computer/information security to critical information infrastructure protection. This type of methodology is the next step toward handling information technology security risk at all levels from upper management information security down to firewall configurations. The paper will present the methodology of the new techniques and their application to critical information infrastructure protection. The associated advantages of this methodology will also be discussed.
ISBN 0729805697
9780729805698
Language eng
Field of Research 080609 Information Systems Management
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category E1 Full written paper - refereed
ERA Research output type E Conference publication
Persistent URL http://hdl.handle.net/10536/DRO/DU:30005429

Document type: Conference Paper
Collection: School of Information and Business Analytics
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Access Statistics: 507 Abstract Views, 0 File Downloads  -  Detailed Statistics
Created: Mon, 07 Jul 2008, 09:49:37 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.