C-SAW: Critical Information Infrastructure Protection through Simplification

被引:0
作者
Ellefsen, Ian [1 ]
von Solms, Sebastiaan [1 ]
机构
[1] Univ Johannesburg, Acad Informat Technol, ZA-2006 Auckland Pk, South Africa
来源
WHAT KIND OF INFORMATION SOCIETY? GOVERNANCE, VIRTUALITY, SURVEILLANCE, SUSTAINABILITY, RESILIENCE | 2010年 / 328卷
关键词
Critical Information Infrastructure Protection; CIIP; C-SAW;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The importance of Critical Information Infrastructure Protection (CIIP) cannot be overlooked, as many critical systems utilise information infrastructures in order to operate. However, should these information infrastructures be targeted by cyber attacks, it would severely affect the effectiveness of many of these critical systems. Attacks on information infrastructures are not be limited to a single geographic location, all nations suffer from a collective vulnerability through interconnection, and as such nobody is immune to cyber attacks. Many nations have created internal structures to manage and react to cyber attacks on their information infrastructure. However, these structures might not always be suitable to deploy in areas where there is no CIIP mechanisms in place. In this paper we aim to present a model for a CIIP structure that will provide protection for critical information infrastructures in a manner that is cost-effective and focused on the gradual, effective deployment of a CIIP structure.
引用
收藏
页码:315 / 325
页数:11
相关论文
共 11 条
  • [1] Ahamad Mustaque, 2008, EMERGING CYBER THREA
  • [2] [Anonymous], 2010, NEW APPROACH CHINA
  • [3] Brownlee N, 1998, RFC2350
  • [4] ENISA, 2009, BAS CAP NAT GOV CERT
  • [5] Harrison J., 2008, ENISA Q REV, V4, P13
  • [6] ICANN, 2007, Factsheet root server attack on 6 february 2007
  • [7] Korns S.W., 2008, Parameters, V38, P60
  • [8] Kossakowski Klaus-Peter, 2000, TRUSTED CSIRT INTRO
  • [9] Richards J., 2009, International Affairs Review, V18
  • [10] Vixie P., 2002, EVENTS OCTOBER 21 20