Technical Framework Research on Critical Information Infrastructure Cybersecurity Classified Protection

被引:0
|
作者
Ren Weihong [1 ]
Yuan Jing [1 ]
Jiang Lei [1 ]
Zhao Tai [1 ]
机构
[1] Minist Publ Secur, Res Inst 3, Beijing, Peoples R China
来源
Proceedings of the 2016 4th International Conference on Machinery, Materials and Information Technology Applications | 2016年 / 71卷
关键词
Critical Infrastructure; Critical Information Infrastructure; Classified Protection; Management and control capability; Security control;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The technical framework of critical information infrastructure cybersecurity classified protection in this paper is established from the three levels of decision-making, managers and executives which ensures the information security technical framework of an organization is consistent with its strategic business objectives. At the same time, on the base of testing and evaluation for security classified protection, evaluation of management and control capability is conducive to evaluate the information security situation of an organization. The assessment of management and control capability combines the strategic business objectives and classified protection which is beneficial to promote organization's innovation and initiative.
引用
收藏
页码:1177 / 1181
页数:5
相关论文
共 50 条
  • [1] Security of Classified Information as Part of the National Critical Infrastructure Protection: Macedonian Experience
    Slaveski, Stojan
    Bakreski, Oliver
    COMPREHENSIVE APPROACH AS SINE QUA NON FOR CRITICAL INFRASTRUCTURE PROTECTION, 2015, 39 : 107 - 119
  • [2] CRITICAL INFRASTRUCTURE PROTECTION: SYSTEMS AND INFORMATION FRAMEWORK OF THE CZECH REPUBLIC
    Dvorak, Antonin
    Lisa, Ales
    Mildeova, Stanislava
    Zahradnicek, Pavel
    IDIMT-2016- INFORMATION TECHNOLOGY, SOCIETY AND ECONOMY STRATEGIC CROSS-INFLUENCES, 2016, 45 : 115 - 122
  • [3] The Protection of Critical Infrastructure Objects - Technical Principles
    Manas, Pavel
    DURABILITY OF CRITICAL INFRASTRUCTURE, MONITORING AND TESTING, ICDCF 2016, 2017, : 239 - 248
  • [4] Framework for critical information infrastructure protection in smart government: a case study in Indonesia
    Putro, Prasetyo Adi Wibowo
    Sensuse, Dana Indra
    Wibowo, Wahyu Setiawan Setiawan
    INFORMATION AND COMPUTER SECURITY, 2024, 32 (01) : 112 - 129
  • [5] Compliance analysis of business information system under classified protection 2.0 of cybersecurity
    Jiang, Xin
    Ding, Yanqing
    Ma, Xiudan
    Li, Xumao
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE OF INFORMATION AND COMMUNICATION TECHNOLOGY, 2021, 183 : 87 - 93
  • [6] Systemic challenges for critical information infrastructure protection
    Masera, M
    Cyberspace Security and Defense: Research Issues, 2005, 196 : 57 - 73
  • [7] Research on non-technical source of critical information infrastructure based on cyber security
    You, Zhiyong
    Tao, Yuan
    Qu, Jie
    PROCEEDINGS OF 2024 INTERNATIONAL CONFERENCE ON COMPUTER AND MULTIMEDIA TECHNOLOGY, ICCMT 2024, 2024, : 395 - 400
  • [8] Assets focus risk management framework for critical infrastructure cybersecurity risk management
    Kure, Halima Ibrahim
    Islam, Shareeful
    IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS, 2019, 4 (04) : 332 - 340
  • [9] Critical energy infrastructure and the evolution of cybersecurity
    Sanders, Peyton
    Bronk, Chris
    Bazilian, Morgan D.
    ELECTRICITY JOURNAL, 2022, 35 (10):
  • [10] Critical Information Infrastructure Protection: How comprehensive should it be?
    von Solms, S. H.
    2013 5TH INTERNATIONAL CONFERENCE ON ADAPTIVE SCIENCE AND TECHNOLOGY (ICAST 2013), 2013,