Integration of Effort: Securing Critical Infrastructure from Cyberattack

被引:4
|
作者
Atkins, Sean [1 ]
Lawson, Chappell [2 ]
机构
[1] MIT, 77 Massachusetts Ave, Cambridge, MA 02139 USA
[2] MIT, Polit Sci, 77 Massachusetts Ave, Cambridge, MA 02139 USA
关键词
D O I
10.1111/puar.13493
中图分类号
C93 [管理学]; D035 [国家行政管理]; D523 [行政管理]; D63 [国家行政管理];
学科分类号
12 ; 1201 ; 1202 ; 120202 ; 1204 ; 120401 ;
摘要
Securing privately owned critical infrastructure from cyberattacks poses a novel challenge for the modern regulatory state. In this domain, the interests of the government are only partly aligned with those of nongovernmental owner-operators, necessitating some sort of state action. However, because (1) security conditions change swiftly and (2) the information and tools necessary for effective planning and response are distributed across the private and public sectors, standard regulatory tools are unlikely to produce security. "Integration of effort," which involves intensive strategic and operational collaboration between systemically important firms and the government, is a more promising approach.
引用
收藏
页码:771 / 775
页数:5
相关论文
共 50 条
  • [1] Securing Critical IT Infrastructure
    Scholz, James A.
    INFORMATION SECURITY JOURNAL, 2009, 18 (01): : 33 - 39
  • [2] Securing Critical Infrastructure
    Schukat, Michael
    2014 10TH INTERNATIONAL CONFERENCE ON DIGITAL TECHNOLOGIES (DT), 2014, : 298 - 304
  • [3] SECURING OUR CRITICAL INFRASTRUCTURE
    Tyler, Neil
    New Electronics, 2021, 54 (07): : 10 - 12
  • [4] Securing the Critical National Infrastructure
    Reid, John
    RUSI JOURNAL, 2007, 152 (03): : 14 - 17
  • [5] Securing manufacturing and critical infrastructure
    Busalachi, Dino
    Control Engineering, 2024, 71 (06)
  • [6] An Architecture for Securing Communications in Critical Infrastructure
    Callegari, Christian
    Forti, Alessandro Cantelli
    D'Amore, Giuseppe
    de la Hoz, Enrique
    Echarri, David
    Garcia-Ferreira, Ivan
    Lopez-Civera, German
    DCNET: PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - VOL. 1, 2016, : 111 - 120
  • [7] Securing Critical Infrastructure with Smart Grids
    Niglia, Alessandro
    2017 5TH IEEE INTERNATIONAL CONFERENCE ON MODELS AND TECHNOLOGIES FOR INTELLIGENT TRANSPORTATION SYSTEMS (MT-ITS), 2017, : 223 - 225
  • [8] Who is responsible for securing critical infrastructure?
    Everett C.
    Computer Fraud and Security, 2010, 2010 (10): : 5 - 8
  • [9] The SCADA challenge: securing critical infrastructure
    Gold, Steve
    Network Security, 2009, 2009 (08): : 18 - 20
  • [10] Securing Critical Infrastructure by Moving Target Defense
    Heydari, Vahid
    Yoo, Seong-Moo
    PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2016), 2016, : 382 - 390