Protection of Critical Infrastructure in National Cyber Security Strategies

被引:0
作者
Izycki, Eduardo [1 ]
Colli, Rodrigo [2 ]
机构
[1] Univ Brasilia UnB, Int Relat Inst, Brasilia, DF, Brazil
[2] Inst Secur Cabinet, Brasilia, DF, Brazil
来源
PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019) | 2019年
关键词
national cyber security strategy; cyber security; critical infrastructures;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A group of eighty six nations has published National Cyber Security Strategies (NCSS). The NCSSs present similarities in basic concepts, in the identification of cyber threats and in the delimitation of strategic objectives. The present article analyzes and compares the NCSSs in respect to the similarities shown within the scope of protection of critical infrastructures (CI). The convergence points identified in the article are: the protection of CIs as a strategic objective; the definition of what constitutes a CI; the services and facilities deemed CI; the existence of a national CI protection program; the need to congregate public and private stakeholders; and the need to build resilience into CI systems. The conclusion points out the countries that have shown through their NCSSs interest in international cooperation for the protection of CIs. This can be achieved by means of joint training, information exchange on threats and incidents against CIs, and in the medium term, the regulation of the use of cyber weapons against CIs.
引用
收藏
页码:219 / 228
页数:10
相关论文
共 13 条
[1]  
Alexander K, 2012, CONFRONTATION, P201
[2]   The Cousins of Stuxnet: Duqu, Flame, and Gauss [J].
Bencsath, Boldizsar ;
Pek, Gabor ;
Buttyan, Levente ;
Felegyhazi, Mark .
FUTURE INTERNET, 2012, 4 (04) :971-1003
[3]  
Commonwealth Telecommunications Organization, 2015, COMM APPR DEV NAT CY
[4]  
European Network and Information Security Agency, 2015, NAT CYB SEC STRAT PR
[5]  
ITU, 2017, GLOB CYB IND 2017
[6]   Nineteen national cyber security strategies [J].
Luiijf, Eric ;
Besseling, Kim .
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2013, 9 (1-2) :3-31
[7]  
Luiijf H.A.M., 2013, LECT NOTES COMPUTER, V6983
[8]  
Organisation for Economic Co-Operation and Development, 2012, OECD DIGITAL EC PAPE, V211
[9]  
Richardson John Charles, 2011, STUXNET CYBERWARFARE, DOI [10.2139/ssrn.1892888, DOI 10.2139/SSRN.1892888]
[10]  
Sabillon R., 2016, INT J COMPUTER SCI S, V5, P67