Critical Information Infrastructure Protection Model and Methodology, Based on National and NATO Study

被引:1
|
作者
Petrov, Lachezar [1 ]
Stoianov, Nikolai [2 ]
Tagarev, Todor [2 ]
机构
[1] Minist Def Republ Bulgaria, CIS Directorate, Policy & CIS Dev Planning Branch, Sofia, Bulgaria
[2] Bulgarian Def Inst, 2 Prof Tsvetan Lazarov Blvd, Sofia 1592, Bulgaria
关键词
Cyber security; Critical information infrastructure; Cyber model;
D O I
10.1007/978-3-319-59415-6_34
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
National and international security, our financial, industrial as well as economic prosperity, healthcare system and national well-being as a whole are dependent on critical infrastructures, which could be described as highly interdependent. Many examples are available such as the national electrical grid, oil and natural gas systems, telecommunication and information networks, transportation networks, water systems, and banking and financial systems. Keeping them in reliable and secure state and study their dependencies is paramount for every government or organization. There is an urgent need of their classification. Creation and development of model and methodology which could describe their behaviors is going to make this world safer. The presented here model and based on it study and initial results are steps toward reliable and secure critical information infrastructure.
引用
收藏
页码:350 / 357
页数:8
相关论文
共 50 条
  • [21] Critical Information Infrastructure Protection: How comprehensive should it be?
    von Solms, S. H.
    2013 5TH INTERNATIONAL CONFERENCE ON ADAPTIVE SCIENCE AND TECHNOLOGY (ICAST 2013), 2013,
  • [22] Information and Analytical Support for the Protection of Important Critical Information Infrastructure Objects
    Berdyugin, V
    Dronova, L.
    ADVANCES IN AUTOMATION, 2020, 641 : 953 - 964
  • [23] Freedom of information implications of information sharing networks for critical infrastructure protection
    Lane, Bill
    Corones, Stephen
    Hedge, Susan
    Clapperton, Dale
    AUSTRALIAN JOURNAL OF ADMINISTRATIVE LAW, 2008, 15 (04):
  • [24] Vulnerability assessment methodology and some methodical aspects of critical infrastructure protection
    Bochkov, Alexander, V
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2019, 10 (SUPPL 1) : 45 - 57
  • [25] Vulnerability assessment methodology and some methodical aspects of critical infrastructure protection
    Alexander V. Bochkov
    International Journal of System Assurance Engineering and Management, 2019, 10 : 45 - 57
  • [26] Virginia's Critical Infrastructure Protection Study
    Jones, EV
    Lyford, J
    Qazi, NK
    Solan, NJ
    Haimes, YY
    2003 IEEE SYSTEMS & INFORMATION ENGINEERING DESIGN SYMPOSIUM, 2003, : 177 - 182
  • [27] Managing trust in critical infrastructure protection information sharing systems
    Sabo, JT
    ISSE 2004 - SECURING ELECTRONIC BUSINESS PROCESSES, 2004, : 271 - 280
  • [28] CRITICAL INFRASTRUCTURE PROTECTION: SYSTEMS AND INFORMATION FRAMEWORK OF THE CZECH REPUBLIC
    Dvorak, Antonin
    Lisa, Ales
    Mildeova, Stanislava
    Zahradnicek, Pavel
    IDIMT-2016- INFORMATION TECHNOLOGY, SOCIETY AND ECONOMY STRATEGIC CROSS-INFLUENCES, 2016, 45 : 115 - 122
  • [29] Dedicated geographical information system in the context of critical infrastructure protection
    Kulawiak, Marcin
    Bikonis, Krzysztof
    Stepnowski, Andrzej
    PROCEEDINGS OF THE 2008 1ST INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, 2008, : 157 - 162
  • [30] IMPLEMENTING CRITICAL INFORMATION INFRASTRUCTURE PROTECTION STRUCTURES IN DEVELOPING COUNTRIES
    Ellefsen, Ian
    von Solms, Sebastiaan
    CRITICAL INFRASTRUCTURE PROTECTION VI, 2012, 390 : 17 - 29