Security protection for critical infrastructure

Warren, M. J. and Busuttil, T. B. 2008, Security protection for critical infrastructure. In Quigley, Marian (ed), Encyclopedia of information ethics and security, Information Science Reference IGI Global, Hershey, Pa., pp.609-615.

Attached Files
Name Description MIMEType Size Downloads

Title Security protection for critical infrastructure
Author(s) Warren, M. J.ORCID iD for Warren, M. J.
Busuttil, T. B.
Title of book Encyclopedia of information ethics and security
Editor(s) Quigley, Marian
Publication date 2008
Chapter number 89
Total chapters 95
Start page 609
End page 615
Total pages 7
Publisher Information Science Reference IGI Global
Place of Publication Hershey, Pa.
Keyword(s) Hacker
Summary Understanding and managing information infrastructure (II) security risks is a priority to most organizations dealing with information technology and information warfare (IW) scenarios today (Libicki, 2000). Traditional security risk analysis (SRA) was well suited to these tasks within the paradigm of computer security, where the focus was on securing tangible items such as computing and communications equipment (NCS,1996; Cramer, 1998). With the growth of information interchange and reliance on information infrastructure, the ability to understand where vulnerabilities lie within an organization, regardless of size, has become extremely difficult (NIPC, 1996). To place a value on the information that is owned and used by an organization is virtually an impossible task. The suitability of risk analysis to assist in managing IW and information infrastructure-related security risks is unqualified, however studies have been undertaken to build frameworks and methodologies for modeling information warfare attacks (Molander, Riddile, & Wilson, 1996; Johnson, 1997; Hutchinson & Warren, 2001) which will assist greatly in applying risk analysis concepts and methodologies to the burgeoning information technology security paradigm, information warfare.
ISBN 1591409888
Language eng
Field of Research 080609 Information Systems Management
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category B1 Book chapter
Copyright notice ©2007, Information Science Reference
Persistent URL

Document type: Book Chapter
Collection: School of Information and Business Analytics
Connect to link resolver
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 1 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 913 Abstract Views, 3 File Downloads  -  Detailed Statistics
Created: Fri, 14 Aug 2009, 13:42:39 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact