Protecting critical information infrastructures

被引:5
|
作者
Rathmell, A [1 ]
机构
[1] Kings Coll London, Informat Assurance Advisory Council, London WC2R 2LS, England
关键词
Critical infrastructure protection;
D O I
10.1016/S0167-4048(01)01020-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As governments and corporations learn to operate in the Information Age environment, it is becoming ever more evident that the Information Society will not progress unless it is built on secure foundations. The dependability and robustness of large scale networked information systems is already a cause for concern but the rapid growth of E-business and E-government, which are critically dependent on these infrastructures, has placed trustworthiness firmly onto the corporate and political agenda. However, devising policies to protect critical information infrastructures will require not only new thinking but also new modes of partnership across sectors and across borders. Ways need to be found of engaging all actors, and encouraging thrill to work together to secure information infrastructures through enlightened self-interest. This paper explores the complex requirements of partnership, ill the hope that an understanding of the issues carl help stakeholders in the Information Society to better protect themselves and their logical neighbours. The 'information revolution' is centred around the drive to research, develop, produce and exploit advanced Information and Communication Technologies (ICT). Key technological developments include the digitization of information, the widespread penetration of computing, increases in computing power, the merging of computing with telecommunications and increases in bandwidth that enable ubiquitous networking. Taken together, these developments ill information gathering, processing. storage, retrieval and dissemination provide the technological underpinnings for the emergence of Information Societies in which the nature and role and information are radically different from the Cast. As with previous technological 'revolutions', technology itself is not necessarily the primary variable leading to change. Rather, the organizational, conceptual and doctrinal impacts of the technologies provide the medium by which technological change translates into wider social change. For commerce, a decade of back office automation is giving way to a drive to automate the front-end, both between businesses and between business and the consumer. The network effect and the highly competitive nature of this type of business are driving the revolution onwards. For governments, the information revolution makes possible the modernization of government, hence in the UK, the Blair government's drives for "joined-up government" and "government.direct."(2) The notion is that both the core businesses of central government and the services delivered to the public can be enhanced by the adoption of networked technologies supported by appropriate procedures and structures. This 'information revolution' has a number of security implications: . Nation states, economies and citizens are becoming ever more reliant on Networked Information Systems (NIS) which are vulnerable to attack. As dependence increases, so the results of attacks become potentially more disruptive. The nature of these systems and the possible modes of cyber-attack, meanwhile, mean that the capability of carrying out attacks is proliferating and that it is tremendously difficult to identify attackers and to distinguish between electronic vandals at one end of the spectrum and nation state aggressors at the other. . Economic globalization, the proliferation of information technologies and developments in the global media mean that, on the one hand, it is increasingly hard for states to impose controls on the media to which their citizens are exposed. On the other, arguably, it is increasingly easy for states or groups to use propaganda, disinformation or psychological operations in order to achieve their strategic, political or economic goals. . The information revolution land other strategic pressures on Western armed forces) is leading to a Revolution in military affairs. This involves the exploitation of advanced technologies to develop new doctrines, organizations and modes of war that allow conventional armed forces to be smaller, more lethal, operate at a higher tempo and to react more rapidly over long distances.(3)
引用
收藏
页码:43 / 52
页数:10
相关论文
共 50 条
  • [21] Effectively protecting critical infrastructures against cyber attacks: Against blackout
    Kritische infrastrukturen wirkungsvoll vor cyber-angriffen schützen: Wider den blackout
    Alsbih, Amir, 2018, VDI Fachmedien GmBbH & Co. (70): : 1 - 2
  • [22] ARCHITECTURAL MODEL FOR INFORMATION SECURITY ANALYSIS OF CRITICAL INFORMATION INFRASTRUCTURES
    Ma, Zhendong
    Smith, Paul
    Skopik, Florian
    IDIMT-2013: INFORMATION TECHNOLOGY HUMAN VALUES, INNOVATION AND ECONOMY, 2013, 42 : 197 - 204
  • [23] An efficient steganographic approach for protecting communication in the Internet of Things (IoT) critical infrastructures
    Bairagi, Anupam Kumar
    Khondoker, Rahamatullah
    Islam, Rafiqul
    INFORMATION SECURITY JOURNAL, 2016, 25 (4-6): : 197 - 212
  • [24] Threat Hunting System for Protecting Critical Infrastructures Using a Machine Learning Approach
    Lozano, Mario Aragones
    Llopis, Israel Perez
    Domingo, Manuel Esteve
    MATHEMATICS, 2023, 11 (16)
  • [25] A Machine Learning-Driven Threat Hunting Architecture for Protecting Critical Infrastructures
    Lozano, Mario Aragones
    Llopis, Israel Perez
    Alarcon, Alfonso Climente
    Domingo, Manuel Esteve
    2023 19TH INTERNATIONAL CONFERENCE ON THE DESIGN OF RELIABLE COMMUNICATION NETWORKS, DRCN, 2023,
  • [26] NAPOLI FUTURA: Novel Approaches for Protecting Critical Infrastructures from Cyber Attacks
    Avallone, Stefano
    Carrozza, Gabriella
    Cinque, Marcello
    Della Corte, Raffaele
    Marotta, Antonio
    Pecchia, Antonio
    Savignano, Agostino
    2014 IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW), 2014, : 33 - 36
  • [27] Approach to security assessment of critical infrastructures' information systems
    Leszczyna, R.
    Fovino, I. N.
    Masera, M.
    IET INFORMATION SECURITY, 2011, 5 (03) : 135 - 144
  • [28] Design of a Platform for Information Exchange on Protection of Critical Infrastructures
    Ferigato, Carlo
    Masera, Marcelo
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2008, 5141 : 337 - 348
  • [29] Distributed Information and Control System for Emergencies in Critical Infrastructures
    Valeev, Sagit
    Kondratyeva, Natalya
    2016 IEEE 10TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT), 2016, : 58 - 61
  • [30] Introduction to the Issue on Signal and Information Processing for Critical Infrastructures
    Kundur, D.
    Contreras, J.
    Srinivasan, D.
    Gatsis, N.
    Wang, M.
    Peeta, S.
    IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2018, 12 (04) : 575 - 577