National Information Infrastructure Security and Cyber Terrorism in the Process of Industrializations

被引:0
作者
Li Yanzhao
机构
来源
FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS | 2009年
关键词
D O I
10.1109/IAS.2009.132
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the development of technology, the interdependence of various infrastructures has increased, which also enhanced their vulnerabilities. The national information infrastructure security concerns the nation's stability and economic security. Risk assessment methodology was introduced into the safeguard of the information infrastructure that is the preference of terrorist attack. Through the analysis of the wants of terrorists, the four steps of risk management was studied in detail using many factual examples. The Macroscopic and microscopic countermeasures was found out, which attributed to adopting counteractions to reduce the vulnerability from and relieve the risk of the system suffering from terrorism attack.
引用
收藏
页码:532 / 535
页数:4
相关论文
共 10 条
[1]  
AMIN M, 2002, SECURITY PRIVACY, V35, P8
[2]  
[Anonymous], NAT TRANSM GRID STUD
[3]  
*COMM SCI TECHN CO, MAK NAT SAF
[4]   Confronting the risks of terrorism: making the right decisions [J].
Garrick, BJ ;
Hall, JE ;
Kilger, M ;
McDonald, JC ;
O'Toole, T ;
Probst, PS ;
Parker, ER ;
Rosenthal, R ;
Trivelpiece, AW ;
Van Arsdale, LA ;
Zebroski, EL .
RELIABILITY ENGINEERING & SYSTEM SAFETY, 2004, 86 (02) :129-176
[5]  
Haimes Y., 1998, WILEY S SYST ENGN
[6]  
Haimes YY, 1999, RISK ANAL, V19, P153, DOI 10.1111/j.1539-6924.1999.tb00396.x
[7]  
Malik I., 1996, COMPUTER HACKING DET
[8]  
Tendler S., 1996, TIMES UK 0325
[9]  
White House, 2003, STRENGTH INT BETT PR
[10]  
1994, TERRORISTS HDB