UK cyber security and critical national infrastructure protection

被引:20
作者
Stoddart, Kristan [1 ,2 ,3 ,4 ]
机构
[1] Aberystwyth Univ, Dept Int Polit, Aberystwyth SY23 3FG, Dyfed, Wales
[2] CIISS, Sydney, NSW, Australia
[3] Higher Educ Acad, Sydney, NSW, Australia
[4] Royal Hist Soc, Brisbane, Qld, Australia
关键词
D O I
10.1111/1468-2346.12706
中图分类号
D81 [国际关系];
学科分类号
030207 ;
摘要
This article is intended to aid the UK government in protecting the UK from cyber attacks on its Critical National Infrastructure. With a National Cyber Security Centre now being established and an updated National Cyber Security Strategy due in 2016, it is vital for the UK government to take the right approach. This article seeks to inform this approach by outlining the scope of the problems Britain faces and what action the UK government is taking to combat these threats. In doing so, it offers a series of recommendations designed to further help mitigate these threats, drive up cyber resiliency and aid recovery plans should they be required. It argues that complete engagement and partnership with private sector owner-operators of Critical National Infrastructure are vital to the success of the government's National Cyber Security Strategy. It makes the case that for cyber resiliency to be fully effective, action is needed at national and global levels requiring states and private industry better to comprehend the threat environment and the risks facing Critical National Infrastructure from cyber attacks and those responsible for them. These are problems for all developed and developing states.
引用
收藏
页码:1079 / 1105
页数:27
相关论文
共 50 条
[31]   Critical Infrastructure Protection: The need for evolving standards Mutating cyber-space and security issues in ITS [J].
Santoro, Vincenzo ;
Pensato, L. .
2017 5TH IEEE INTERNATIONAL CONFERENCE ON MODELS AND TECHNOLOGIES FOR INTELLIGENT TRANSPORTATION SYSTEMS (MT-ITS), 2017, :219-222
[32]   'Cyber Gurus': A rhetorical analysis of the language of cybersecurity specialists and the implications for security policy and critical infrastructure protection [J].
Quigley, Kevin ;
Burns, Calvin ;
Stallard, Kristen .
GOVERNMENT INFORMATION QUARTERLY, 2015, 32 (02) :108-117
[33]   The Cyber-Security State of our Nation: A Critique of South Africa's Stance on Cyber-Security in Respect of the Protection of Critical Information Infrastructure [J].
Mohideen, Feroze .
PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2016), 2016, :235-243
[34]   National Information Infrastructure Security and Cyber Terrorism in the Process of Industrializations [J].
Li Yanzhao .
FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, :532-535
[36]   Cyber Security Risk Management in the SCADA Critical Infrastructure Environment [J].
Henrie, Morgan .
ENGINEERING MANAGEMENT JOURNAL, 2013, 25 (02) :38-45
[37]   Critical Infrastructure Protection from a National Perspective [J].
Brem, Stefan .
EUROPEAN JOURNAL OF RISK REGULATION, 2015, 6 (02) :191-199
[38]   Cyber-Threats to Critical National Infrastructure: An Intelligence Challenge [J].
Rudner, Martin .
INTERNATIONAL JOURNAL OF INTELLIGENCE AND COUNTERINTELLIGENCE, 2013, 26 (03) :453-481
[39]   ADMINISTRATIVE OVERSIGHT OF CRITICAL INFRASTRUCTURE AND SOCIAL SECURITY PROTECTION [J].
Magomedov, Andrii ;
Ivanov, Andrii ;
Pron, Lesia ;
Trostianska, Karyna ;
Forkun, Iryna .
AD ALTA-JOURNAL OF INTERDISCIPLINARY RESEARCH, 2024, 14 (01) :16-20
[40]   Integrated optoelectronics security system for critical infrastructure protection [J].
Zyczkowski, Marek ;
Szustakowski, Mieczyslaw ;
Ciurapinski, Wieslaw ;
Palka, Norbert ;
Kastek, Mariusz .
PRZEGLAD ELEKTROTECHNICZNY, 2010, 86 (10) :157-160