Security protection for critical infrastructure

Warren, M. J. and Busuttil, T. B. 2008, Security protection for critical infrastructure, in Encyclopedia of information ethics and security, Information Science Reference IGI Global, Hershey, Pa., pp.609-615.

Attached Files
Name Description MIMEType Size Downloads

Title Security protection for critical infrastructure
Author(s) Warren, M. J.
Busuttil, T. B.
Title of book Encyclopedia of information ethics and security
Editor(s) Quigley, Marian
Publication date 2008
Chapter number 89
Total chapters 95
Start page 609
End page 615
Total pages 7
Publisher Information Science Reference IGI Global
Place of Publication Hershey, Pa.
Keyword(s) Hacker
internet
Risk
security
threat
vulnerability
Summary Understanding and managing information infrastructure (II) security risks is a priority to most organizations dealing with information technology and information warfare (IW) scenarios today (Libicki, 2000). Traditional security risk analysis (SRA) was well suited to these tasks within the paradigm of computer security, where the focus was on securing tangible items such as computing and communications equipment (NCS,1996; Cramer, 1998). With the growth of information interchange and reliance on information infrastructure, the ability to understand where vulnerabilities lie within an organization, regardless of size, has become extremely difficult (NIPC, 1996). To place a value on the information that is owned and used by an organization is virtually an impossible task. The suitability of risk analysis to assist in managing IW and information infrastructure-related security risks is unqualified, however studies have been undertaken to build frameworks and methodologies for modeling information warfare attacks (Molander, Riddile, & Wilson, 1996; Johnson, 1997; Hutchinson & Warren, 2001) which will assist greatly in applying risk analysis concepts and methodologies to the burgeoning information technology security paradigm, information warfare.
ISBN 9781591409878
9781591409885
Language eng
Field of Research 080609 Information Systems Management
HERDC Research category B1 Book chapter
Copyright notice ©2007, Information Science Reference
Persistent URL http://hdl.handle.net/10536/DRO/DU:30016995

Document type: Book Chapter
Collection: School of Information and Business Analytics
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Access Statistics: 406 Abstract Views, 2 File Downloads  -  Detailed Statistics
Created: Fri, 14 Aug 2009, 13:42:39 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.