Critical Information Infrastructures Management System and Security Issues Focusing on the Public Administrative Sector

被引:0
|
作者
Heo, Jun [1 ]
Yi, Wan Suk [1 ]
机构
[1] Korea Internet & Secur Agcy, Internet Serv Protect Team, Seoul, South Korea
关键词
Security; threats; administrative sector;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With Korea's transition to an advanced IT nation, its key infrastructures, including administration, transportation, healthcare, finance and communications, have become absolutely reliant on IT systems. This research examines systems in place in Korea for defense against cyber hacking and electronic invasions, and internal and external threats to the critical information infrastructure of the administrative sector, in which critical administrative service is provided to Koreans through e-government, and technical, physical and managerial measures to combat such threats are discussed.
引用
收藏
页码:179 / 183
页数:5
相关论文
共 50 条
  • [31] Information Security Management System Standards in Hungarian Public Administration
    Veronika, Nagy-Takacs
    Laszlo, Berenyi
    [J]. PROCEEDINGS OF CENTRAL AND EASTERN EUROPEAN EDEM AND EGOV DAYS 2022, CEEE GOV DAYS 2022: Hate Speech and Fake News-Fate or Issue to Tackle?, 2022, : 112 - 117
  • [32] SCADA Systems Cyber Security for Critical infrastructures: Case Studies in the Transport Sector
    Ismail, Suhaila
    Sitnikova, Elena
    Slay, Jill
    [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 425 - 433
  • [33] Software security management in critical infrastructures: a systematic literature review
    Eksi, Gulsum Ece
    Tekinerdogan, Bedir
    Catal, Cagatay
    [J]. TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2022, 30 (04) : 1142 - 1161
  • [34] Editorial: Issues in public sector risk management
    Smith, D
    Toft, B
    [J]. PUBLIC MONEY & MANAGEMENT, 1998, 18 (04) : 7 - 10
  • [35] A Bayesian network methodology for optimal security management of critical infrastructures
    Misuri, Alessio
    Khakzad, Nima
    Reniers, Genserik
    Cozzani, Valerio
    [J]. RELIABILITY ENGINEERING & SYSTEM SAFETY, 2019, 191
  • [36] Using public-key infrastructures for security and risk management
    Wing, P
    O'Higgins, B
    [J]. IEEE COMMUNICATIONS MAGAZINE, 1999, 37 (09) : 71 - 73
  • [37] ADMINISTRATIVE AND MANAGEMENT ISSUES IN PUBLIC-PRIVATE COLLABORATION
    EGNEW, RC
    [J]. BEHAVIORAL HEALTHCARE TOMORROW, 1995, 4 (02): : 25 - 29
  • [38] Integrating information security requirements in critical infrastructures: smart metering case
    AlAbdulkarim, Layla
    Lukszo, Zofia
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2010, 6 (02) : 187 - 209
  • [39] Commercializing Public Sector Information Privacy and Security Concerns
    Burdon, Mark
    [J]. IEEE TECHNOLOGY AND SOCIETY MAGAZINE, 2009, 28 (01) : 34 - 40
  • [40] A performance evaluation of information security training in public sector
    Park S.-K.
    Lee S.-H.
    Kim T.-Y.
    Jun H.-J.
    Kim T.-S.
    [J]. Journal of Computer Virology and Hacking Techniques, 2017, 13 (4) : 289 - 296