Deakin University
Browse

Supply chain management security : the weak link of Australian critical infrastructure protection

conference contribution
posted on 2009-01-01, 00:00 authored by Matthew Warren, Shona Leitch
Secure management of Australia’s commercial Critical Infrastructure presents ongoing challenges to both the owners of this infrastructure as well as to the Australian Federal government. The security management process is currently managed through high-level information sharing via collaboration, but does this situation suit the commercial sector? One of the issues facing Australia is that the majority of critical infrastructure resides under the control of the business sector and certain aspects such of the critical infrastructure such as Supply Chain Management (SCM) systems are distributed entities that span a number of commercial organisations. Another issue is that these SCM systems can be used for the transportation of varied items, such as retail items or food. This paper will explore the security issue related to food SCM systems and their relationship to critical infrastructure. The paper will focuses upon the security and risk issues associated with SCM system protection within the realms of critical infrastructure protection. The paper will review the security standard ISO 28000 - Supply Chain Security Management Standard. The paper will propose a new conceptual security risk analysis approach that will form the basis of a future Security Risk Analysis approach. This new approach will be aimed at protecting SCM systems.

History

Event

European Conference on Information Warfare and Security (8th : 2009 : Lisbon, Portugal)

Publisher

Academic Publishing

Location

Braga, Portugal

Place of publication

Reading, England

Start date

2009-07-06

End date

2009-07-07

ISBN-13

9781906638344

Language

eng

Publication classification

E1 Full written paper - refereed

Copyright notice

2009, Academic Publishing

Title of proceedings

ECIW 2009 : Proceedings of the 8th European Conference on Information Warfare and Security

Usage metrics

    Research Publications

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC