Protecting critical information infrastructures

被引:5
|
作者
Rathmell, A [1 ]
机构
[1] Kings Coll London, Informat Assurance Advisory Council, London WC2R 2LS, England
关键词
Critical infrastructure protection;
D O I
10.1016/S0167-4048(01)01020-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As governments and corporations learn to operate in the Information Age environment, it is becoming ever more evident that the Information Society will not progress unless it is built on secure foundations. The dependability and robustness of large scale networked information systems is already a cause for concern but the rapid growth of E-business and E-government, which are critically dependent on these infrastructures, has placed trustworthiness firmly onto the corporate and political agenda. However, devising policies to protect critical information infrastructures will require not only new thinking but also new modes of partnership across sectors and across borders. Ways need to be found of engaging all actors, and encouraging thrill to work together to secure information infrastructures through enlightened self-interest. This paper explores the complex requirements of partnership, ill the hope that an understanding of the issues carl help stakeholders in the Information Society to better protect themselves and their logical neighbours. The 'information revolution' is centred around the drive to research, develop, produce and exploit advanced Information and Communication Technologies (ICT). Key technological developments include the digitization of information, the widespread penetration of computing, increases in computing power, the merging of computing with telecommunications and increases in bandwidth that enable ubiquitous networking. Taken together, these developments ill information gathering, processing. storage, retrieval and dissemination provide the technological underpinnings for the emergence of Information Societies in which the nature and role and information are radically different from the Cast. As with previous technological 'revolutions', technology itself is not necessarily the primary variable leading to change. Rather, the organizational, conceptual and doctrinal impacts of the technologies provide the medium by which technological change translates into wider social change. For commerce, a decade of back office automation is giving way to a drive to automate the front-end, both between businesses and between business and the consumer. The network effect and the highly competitive nature of this type of business are driving the revolution onwards. For governments, the information revolution makes possible the modernization of government, hence in the UK, the Blair government's drives for "joined-up government" and "government.direct."(2) The notion is that both the core businesses of central government and the services delivered to the public can be enhanced by the adoption of networked technologies supported by appropriate procedures and structures. This 'information revolution' has a number of security implications: . Nation states, economies and citizens are becoming ever more reliant on Networked Information Systems (NIS) which are vulnerable to attack. As dependence increases, so the results of attacks become potentially more disruptive. The nature of these systems and the possible modes of cyber-attack, meanwhile, mean that the capability of carrying out attacks is proliferating and that it is tremendously difficult to identify attackers and to distinguish between electronic vandals at one end of the spectrum and nation state aggressors at the other. . Economic globalization, the proliferation of information technologies and developments in the global media mean that, on the one hand, it is increasingly hard for states to impose controls on the media to which their citizens are exposed. On the other, arguably, it is increasingly easy for states or groups to use propaganda, disinformation or psychological operations in order to achieve their strategic, political or economic goals. . The information revolution land other strategic pressures on Western armed forces) is leading to a Revolution in military affairs. This involves the exploitation of advanced technologies to develop new doctrines, organizations and modes of war that allow conventional armed forces to be smaller, more lethal, operate at a higher tempo and to react more rapidly over long distances.(3)
引用
收藏
页码:43 / 52
页数:10
相关论文
共 50 条
  • [1] Research on Critical Infrastructures and Critical Information Infrastructures
    Yusufovna, Feruza Sattarova
    Alisherovich, Farkhod Alisherov
    Choi, Minkyu
    Cho, Eun-Suk
    Abdurashidovich, Furkhat Tadjibayev
    Kim, Tai-hoon
    2009 SYMPOSIUM ON BIO-INSPIRED LEARNING AND INTELLIGENT SYSTEMS FOR SECURITY (BLISS 2009), 2009, : 97 - +
  • [2] Protecting Critical Cloud Infrastructures with Predictive Capability
    Yau, Stephen S.
    Buduru, Arun Balaji
    Nagaraja, Vinjith
    2015 IEEE 8TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, 2015, : 1119 - 1124
  • [3] INTEROPERABLE SIMULATION FOR PROTECTING PORT AS CRITICAL INFRASTRUCTURES
    Bruzzone, Agostino
    Tremori, Alberto
    Longo, Francesco
    14TH INTERNATIONAL CONFERENCE ON HARBOR, MARITIME AND MULTIMODAL LOGISTICS MODELLING AND SIMULATION (HMS 2012), 2012, : 175 - 180
  • [4] Protecting critical infrastructures through behavioural observation
    Hurst, William
    Merabti, Madjid
    Iram, Shamaila
    Fergus, Paul
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2014, 10 (02) : 174 - 192
  • [5] Interoperable simulation for protecting port as critical infrastructures
    DIME, University of Genoa, Italy
    不详
    Int. Conf. Harbor, Marit. Multimodal Logist. Model. Simul., HMS, Held Int. Multidiscip. Model. Simul. Multiconference, I3M, (175-180):
  • [6] Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information
    Zhang, Chi
    Emmanuel Ramirez-Marquez, Jose
    IIE TRANSACTIONS, 2013, 45 (03) : 244 - 258
  • [7] A system design for surveillance systems protecting critical infrastructures
    Jungert, Erland
    Hallberg, Niklas
    Wadstromer, Niclas
    JOURNAL OF VISUAL LANGUAGES AND COMPUTING, 2014, 25 (06): : 650 - 657
  • [8] Protecting the infrastructures
    Neumann, PG
    COMMUNICATIONS OF THE ACM, 1998, 41 (01) : 128 - 128
  • [9] Emergent information security in critical infrastructures
    Daskapan, Semir
    Vree, Willem G.
    Wagenaar, Rene W.
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2006, 2 (2-3) : 247 - 260
  • [10] Privacy Handling for Critical Information Infrastructures
    Ulltveit-Moe, Nils
    Gjosaeter, Terje
    Assev, Sigurd M.
    Koien, Geir M.
    Oleshchuk, Vladimir
    2013 11TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2013, : 688 - 694