CRITICAL INFORMATION INFRASTRUCTURE PROTECTION IN THE DEVELOPING WORLD

被引:0
|
作者
Ellefsen, Ian [1 ]
von Solms, Sebastiaan [1 ]
机构
[1] Univ Johannesburg, Johannesburg, South Africa
来源
CRITICAL INFRASTRUCTURE PROTECTION IV | 2010年 / 342卷
关键词
Critical information infrastructure protection; developing countries;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Critical information infrastructure protection (CIIP) has long been an area of concern, from its beginnings with the creation of the Internet to recent high-profile distributed denial-of-service attacks against critical systems. Critical systems rely heavily on information infrastructures; a disruption of the information infrastructure can hinder the operation of critical systems. The developed nations have mature CIIP solutions in place, but these solutions are not always suitable for developing countries, where unique challenges and requirements have to be addressed. Meanwhile, the developing nations are experiencing un-precedented growth of their information infrastructures. However, the lack of national CIIP efforts creates a situation for developing nations to become launch pads for cyber attacks. This paper discusses the need for CIIP in developing nations. It examines the current state and future development of information infrastructures in these nations and outlines a number of CIIP requirements.
引用
收藏
页码:29 / +
页数:4
相关论文
共 50 条
  • [31] Information-flawing filters in critical infrastructure protection: the deficient information basis in a Swedish approach
    Grosse, Christine
    Larsson, Aron
    Bjorkqvist, Olof
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2023, 19 (01) : 40 - 57
  • [32] Information security systems vs. critical information infrastructure protection systems - Similarities and differences
    Bialas, Andrzej
    DepCos-Relcomex 2006, 2006, : 60 - 67
  • [33] Framework for critical information infrastructure protection in smart government: a case study in Indonesia
    Putro, Prasetyo Adi Wibowo
    Sensuse, Dana Indra
    Wibowo, Wahyu Setiawan Setiawan
    INFORMATION AND COMPUTER SECURITY, 2024, 32 (01) : 112 - 129
  • [34] Protection Models of Critical Information Infrastructure Objects from Targeted Computer Attacks
    Shaburov, Andrey S.
    Alekseev, Vsevolod R.
    PROCEEDINGS OF THE 2019 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (EICONRUS), 2019, : 335 - 338
  • [35] Critical Information Infrastructure Protection Model and Methodology, Based on National and NATO Study
    Petrov, Lachezar
    Stoianov, Nikolai
    Tagarev, Todor
    ADVANCES IN DEPENDABILITY ENGINEERING OF COMPLEX SYSTEMS, 2018, 582 : 350 - 357
  • [36] Security of Classified Information as Part of the National Critical Infrastructure Protection: Macedonian Experience
    Slaveski, Stojan
    Bakreski, Oliver
    COMPREHENSIVE APPROACH AS SINE QUA NON FOR CRITICAL INFRASTRUCTURE PROTECTION, 2015, 39 : 107 - 119
  • [37] Methodology of Developing Laboratory Research Complexes on Critical Information Infrastructure Objects Security
    Shaburov, Andrey S.
    Alekseev, Vsevolod R.
    PROCEEDINGS OF THE 2021 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (ELCONRUS), 2021, : 641 - 646
  • [38] Developing a distributed system for infrastructure protection
    Cybenko, George
    Jiang, Guofei
    IT Professional, 2000, 2 (04) : 17 - 22
  • [39] Developing A Multicriterial Framework for Selecting A Critical Infrastructure Protection Strategy Based on Financial Instruments
    Bores, Radu
    EDUCATION EXCELLENCE AND INNOVATION MANAGEMENT: A 2025 VISION TO SUSTAIN ECONOMIC DEVELOPMENT DURING GLOBAL CHALLENGES, 2020, : 15410 - 15440
  • [40] Information Sharing and Trust Between Sharing Parties: Sharing Sensitive Information With Regards to Critical Information Infrastructure Protection
    Mohideen, Feroze
    Ellefsen, Ian
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 197 - 206