Protecting Critical Infrastructure by Identifying Pathways of Exposure to Risk

被引:0
|
作者
O'Neill, Philip [1 ]
机构
[1] Univ Waterloo, Waterloo, ON, Canada
关键词
D O I
暂无
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
Increasingly, our critical infrastructure is managed and controlled by computers and the information networks that connect them. Cyber-terrorists and other malicious actors understand the economic and social impact that a successful attack on these systems could have. While it is imperative that we defend against such attacks, it is equally imperative that we realize how best to react to them. This article presents the strongest-path method of analyzing all potential pathways of exposure to risk - no matter how indirect or circuitous they may be - in a network model of infrastructure and operations. The method makes direct use of expert knowledge about entities and dependency relationships without the need for any simulation or any other models. By using path analysis in a directed graph model of critical infrastructure, planners can model and assess the effects of a potential attack and develop resilient responses.
引用
收藏
页码:34 / 40
页数:7
相关论文
共 50 条
  • [1] Protecting critical infrastructure
    Council on Competitiveness, Washington, DC, United States
    Issues Sci Technol, 2006, 2 (10-11):
  • [2] Protecting critical infrastructure
    Van Opstal, D
    ISSUES IN SCIENCE AND TECHNOLOGY, 2006, 22 (02) : 10 - 11
  • [3] The challenge of protecting critical infrastructure
    Auerswald, P
    Branscomb, LM
    La Porte, TM
    Michel-Kerjan, E
    ISSUES IN SCIENCE AND TECHNOLOGY, 2005, 22 (01) : 77 - 83
  • [4] Exposure to environmental tobacco smoke - Identifying and protecting those at risk
    Davis, RM
    JAMA-JOURNAL OF THE AMERICAN MEDICAL ASSOCIATION, 1998, 280 (22): : 1947 - 1949
  • [5] Protecting Critical Energy Infrastructure Through Intelligence
    Rudner, Martin
    INTERNATIONAL JOURNAL OF INTELLIGENCE AND COUNTERINTELLIGENCE, 2008, 21 (04) : 635 - 660
  • [7] Functional quantitative security risk analysis (QSRA) to assist in protecting critical process infrastructure
    van Staalduinen, Mark Adrian
    Khan, Faisal
    Gadag, Veeresh
    Reniers, Genserik
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2017, 157 : 23 - 34
  • [8] Identifying the Criteria for Critical Infrastructure Selection
    Hamzah, Ezdihar
    Bin Jaafar, Mohd Nadzri
    Bin Ali, Hishamuddin
    INNOVATION MANAGEMENT AND SUSTAINABLE ECONOMIC COMPETITIVE ADVANTAGE: FROM REGIONAL DEVELOPMENT TO GLOBAL GROWTH, VOLS I - VI, 2015, 2015, : 3400 - 3406
  • [9] Data-Driven Approach to Protecting Critical Infrastructure
    Hurley, John
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2017), 2017, : 509 - 513
  • [10] Virtual Private Groups for Protecting Critical Infrastructure Networks
    O'Brien, Richard C.
    Payne, Charles N., Jr.
    CATCH 2009: CYBERSECURITY APPLICATIONS AND TECHNOLOGY CONFERENCE FOR HOMELAND SECURITY, PROCEEDINGS, 2009, : 118 - 123