Technical Framework Research on Critical Information Infrastructure Cybersecurity Classified Protection

被引:0
|
作者
Ren Weihong [1 ]
Yuan Jing [1 ]
Jiang Lei [1 ]
Zhao Tai [1 ]
机构
[1] Minist Publ Secur, Res Inst 3, Beijing, Peoples R China
关键词
Critical Infrastructure; Critical Information Infrastructure; Classified Protection; Management and control capability; Security control;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The technical framework of critical information infrastructure cybersecurity classified protection in this paper is established from the three levels of decision-making, managers and executives which ensures the information security technical framework of an organization is consistent with its strategic business objectives. At the same time, on the base of testing and evaluation for security classified protection, evaluation of management and control capability is conducive to evaluate the information security situation of an organization. The assessment of management and control capability combines the strategic business objectives and classified protection which is beneficial to promote organization's innovation and initiative.
引用
收藏
页码:1177 / 1181
页数:5
相关论文
共 50 条
  • [41] Reframing South Korea's National Cybersecurity Governance System in Critical Information Infrastructure
    Kim, Do-Kyung
    Kim, Soon-Yang
    KOREAN JOURNAL OF DEFENSE ANALYSIS, 2021, 33 (04): : 689 - 713
  • [42] Managing trust in critical infrastructure protection information sharing systems
    Sabo, JT
    ISSE 2004 - SECURING ELECTRONIC BUSINESS PROCESSES, 2004, : 271 - 280
  • [43] Dedicated geographical information system in the context of critical infrastructure protection
    Kulawiak, Marcin
    Bikonis, Krzysztof
    Stepnowski, Andrzej
    PROCEEDINGS OF THE 2008 1ST INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, 2008, : 157 - 162
  • [44] IMPLEMENTING CRITICAL INFORMATION INFRASTRUCTURE PROTECTION STRUCTURES IN DEVELOPING COUNTRIES
    Ellefsen, Ian
    von Solms, Sebastiaan
    CRITICAL INFRASTRUCTURE PROTECTION VI, 2012, 390 : 17 - 29
  • [45] A Review of Cybersecurity Risk and Consequences for Critical Infrastructure
    Touhiduzzaman, Md
    Gourisetti, Sri Nikhil Gupta
    Eppinger, Crystal
    Somani, Abhishek
    2019 RESILIENCE WEEK (RWS), 2019, : 7 - 13
  • [46] Gamification of Cybersecurity for Workforce Development in Critical Infrastructure
    Ashley, Travis D.
    Kwon, Roger
    Gourisetti, Sri Nikhil Gupta
    Katsis, Charalampos
    Bonebrake, Christopher A.
    Boyd, Paul A.
    IEEE ACCESS, 2022, 10 : 112487 - 112501
  • [47] A Systematic Approach to Checking Cybersecurity for Critical Infrastructure
    Costa, Felipe Sabino, 1600, Access Intelligence LLC (165):
  • [48] Evaluation Method for Information Security Levels of CIIP (Critical Information Infrastructure Protection)
    Park, Soon-Tai
    Shin, Jong-Whoi
    Min, Bog-Ki
    Lee, Ik-Sub
    Lee, Gang-Shin
    Lee, Jae-Il
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 14, 2006, 14 : 37 - 40
  • [49] Critical Infrastructure Protection: Beyond the Hybrid Port and Airport Firmware Security Cybersecurity applications on transport
    Chiappetta, Andrea
    Cuozzo, Gianni
    2017 5TH IEEE INTERNATIONAL CONFERENCE ON MODELS AND TECHNOLOGIES FOR INTELLIGENT TRANSPORTATION SYSTEMS (MT-ITS), 2017, : 206 - 211
  • [50] Critical infrastructure protection
    George, Richard
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2008, 1 : 4 - 5