Integration of Effort: Securing Critical Infrastructure from Cyberattack

被引:4
|
作者
Atkins, Sean [1 ]
Lawson, Chappell [2 ]
机构
[1] MIT, 77 Massachusetts Ave, Cambridge, MA 02139 USA
[2] MIT, Polit Sci, 77 Massachusetts Ave, Cambridge, MA 02139 USA
关键词
D O I
10.1111/puar.13493
中图分类号
C93 [管理学]; D035 [国家行政管理]; D523 [行政管理]; D63 [国家行政管理];
学科分类号
12 ; 1201 ; 1202 ; 120202 ; 1204 ; 120401 ;
摘要
Securing privately owned critical infrastructure from cyberattacks poses a novel challenge for the modern regulatory state. In this domain, the interests of the government are only partly aligned with those of nongovernmental owner-operators, necessitating some sort of state action. However, because (1) security conditions change swiftly and (2) the information and tools necessary for effective planning and response are distributed across the private and public sectors, standard regulatory tools are unlikely to produce security. "Integration of effort," which involves intensive strategic and operational collaboration between systemically important firms and the government, is a more promising approach.
引用
收藏
页码:771 / 775
页数:5
相关论文
共 50 条
  • [21] Securing the Industrial Internet of Things for Critical Infrastructure (IIoT-CI)
    O'Raw, John
    Laverty, David
    Morrow, D. John
    2019 IEEE 5TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2019, : 70 - 75
  • [22] A Linear Probabilistic Resilience Model for Securing Critical Infrastructure in Industry 5.0
    Abuhasel, Khaled Ali
    IEEE ACCESS, 2023, 11 : 80863 - 80873
  • [23] CPAC: Securing Critical Infrastructure with Cyber-Physical Access Control
    Etigowni, Sriharsha
    Tian, Dave
    Hernandez, Grant
    Zonouz, Saman
    Butler, Kevin
    32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016), 2016, : 139 - 152
  • [24] Securing Critical Infrastructure with Blockchain Technology: An Approach to Cyber-Resilience
    Govea, Jaime
    Gaibor-Naranjo, Walter
    Villegas-Ch, William
    COMPUTERS, 2024, 13 (05)
  • [25] Securing the information infrastructure
    Lunt, T
    COMMUNICATIONS OF THE ACM, 1996, 39 (06) : 130 - 130
  • [26] Ethical hardware reverse engineering for securing the digital supply chain in critical infrastructure
    Nygard, Arne Roar
    Katsikas, Sokratis K.
    INFORMATION AND COMPUTER SECURITY, 2024, 32 (03) : 365 - 377
  • [27] Securing oil and gas infrastructure
    Bajpai, S.
    Gupta, J. P.
    JOURNAL OF PETROLEUM SCIENCE AND ENGINEERING, 2007, 55 (1-2) : 174 - 186
  • [28] Securing the Internet routing infrastructure
    Papadimitratos, P
    Haas, ZJ
    IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (10) : 60 - 68
  • [29] Strengthening Infrastructure - securing the Future!
    Meyer, Lars
    BAUINGENIEUR, 2013, 88 : A3 - A3
  • [30] Securing the network for industrial infrastructure
    Truican, I
    Dan, S.
    Kristaly, D. M.
    Bujdei, C.
    ANNALS OF DAAAM FOR 2007 & PROCEEDINGS OF THE 18TH INTERNATIONAL DAAAM SYMPOSIUM: INTELLIGENT MANUFACTURING & AUTOMATION: FOCUS ON CREATIVITY, RESPONSIBILITY, AND ETHICS OF ENGINEERS, 2007, : 779 - 780