Integration of Effort: Securing Critical Infrastructure from Cyberattack

被引:4
|
作者
Atkins, Sean [1 ]
Lawson, Chappell [2 ]
机构
[1] MIT, 77 Massachusetts Ave, Cambridge, MA 02139 USA
[2] MIT, Polit Sci, 77 Massachusetts Ave, Cambridge, MA 02139 USA
关键词
D O I
10.1111/puar.13493
中图分类号
C93 [管理学]; D035 [国家行政管理]; D523 [行政管理]; D63 [国家行政管理];
学科分类号
12 ; 1201 ; 1202 ; 120202 ; 1204 ; 120401 ;
摘要
Securing privately owned critical infrastructure from cyberattacks poses a novel challenge for the modern regulatory state. In this domain, the interests of the government are only partly aligned with those of nongovernmental owner-operators, necessitating some sort of state action. However, because (1) security conditions change swiftly and (2) the information and tools necessary for effective planning and response are distributed across the private and public sectors, standard regulatory tools are unlikely to produce security. "Integration of effort," which involves intensive strategic and operational collaboration between systemically important firms and the government, is a more promising approach.
引用
收藏
页码:771 / 775
页数:5
相关论文
共 50 条
  • [31] MPC for Securing Internet Infrastructure
    Shrishak, Kris
    Shulman, Haya
    2020 50TH ANNUAL IEEE-IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS-SUPPLEMENTAL VOLUME (DSN-S), 2020, : 47 - 48
  • [32] Hacktivism: Securing the national infrastructure
    Milone, MG
    BUSINESS LAWYER, 2002, 58 (01): : 383 - 413
  • [33] Better Securing an Infrastructure for Telework
    Butcher-Powell, Loreen Marie
    JOURNAL OF CASES ON INFORMATION TECHNOLOGY, 2006, 8 (04) : 71 - 86
  • [34] Securing the electric power infrastructure
    Katz, J. S.
    Allor, P. G.
    Dougherty, S. A.
    Duffy, S. P.
    Riccetti, S.
    Chantz, H. D.
    Kisch, M.
    Oxford, B. S.
    Snowdon, J. L.
    IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2016, 60 (01)
  • [35] Protecting Critical Infrastructure for Disasters: NLP-Based Automated Information Retrieval to Generate Hypothetical Cyberattack Scenarios
    Salley, Christin
    Mohammadi, Neda
    Taylor, John E.
    JOURNAL OF INFRASTRUCTURE SYSTEMS, 2024, 30 (03)
  • [36] Establishing Cyber Resilience in Embedded Systems for Securing Next-Generation Critical Infrastructure
    Siddiqui, Fahad
    Hagan, Matthew
    Sezer, Sakir
    32ND IEEE INTERNATIONAL SYSTEM ON CHIP CONFERENCE (IEEE SOCC 2019), 2019, : 218 - 223
  • [37] Securing Critical Infrastructure in Smart Cities: Providing Scalable Access Control for Constrained Devices
    Buschsieweke, Marian
    Guenes, Mesut
    2017 IEEE 28TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2017,
  • [38] Securing Critical Infrastructure Through Innovative Use Of Merged Hierarchical Deep Neural Networks
    Gupta, Lay
    2021 18TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2021,
  • [39] A Robust Information Life Cycle Management Framework for Securing and Governing Critical Infrastructure Systems
    Moulos, Vrettos
    Chatzikyriakos, George
    Kassouras, Vassilis
    Doulamis, Anastasios
    Doulamis, Nikolaos
    Leventakis, Georgios
    Florakis, Thodoris
    Varvarigou, Theodora
    Mitsokapas, Evangelos
    Kioumourtzis, Georgios
    Klirodetis, Petros
    Psychas, Alexandros
    Marinakis, Achilleas
    Sfetsos, Thanasis
    Koniaris, Alexios
    Liapis, Dimitris
    Gatzioura, Anna
    INVENTIONS, 2018, 3 (04)
  • [40] A Novel IDS Securing Industrial Control System of Critical Infrastructure Using Deception Technology
    Zhang, Shaobo
    Liu, Yuhang
    Yang, Dequan
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2022, 14 (02)