TY - GEN
T1 - C-SAW
T2 - 9th IFIP TC 9 International Conference on Human Choice and Computers International Conference, HCC 2010 and 1st IFIP TC 11 International Conference on Critical Information Infrastructure Protection, CIP 2010 held as a part of 21st IFIP World Computer Congress, WCC 2010
AU - Ellefsen, Ian
AU - Von Solms, Sebastiaan
N1 - Publisher Copyright:
© IFIP International Federation for Information Processing 2010.
PY - 2010
Y1 - 2010
N2 - The importance of Critical Information Infrastructure Protection (CIIP) cannot be overlooked, as many critical systems utilise information infrastructures in order to operate. However, should these information infrastructures be targeted by cyber attacks, it would severely affect the effectiveness of many of these critical systems. Attacks on information infrastructures are not be limited to a single geographic location, all nations suffer from a collective vulnerability through interconnection, and as such nobody is immune to cyber attacks. Many nations have created internal structures to manage and react to cyber attacks on their information infrastructure. However, these structures might not always be suitable to deploy in areas where there is no CIIP mechanisms in place. In this paper we aim to present a model for a CIIP structure that will provide protection for critical information infrastructures in a manner that is cost-effective and focused on the gradual, effective deployment of a CIIP structure.
AB - The importance of Critical Information Infrastructure Protection (CIIP) cannot be overlooked, as many critical systems utilise information infrastructures in order to operate. However, should these information infrastructures be targeted by cyber attacks, it would severely affect the effectiveness of many of these critical systems. Attacks on information infrastructures are not be limited to a single geographic location, all nations suffer from a collective vulnerability through interconnection, and as such nobody is immune to cyber attacks. Many nations have created internal structures to manage and react to cyber attacks on their information infrastructure. However, these structures might not always be suitable to deploy in areas where there is no CIIP mechanisms in place. In this paper we aim to present a model for a CIIP structure that will provide protection for critical information infrastructures in a manner that is cost-effective and focused on the gradual, effective deployment of a CIIP structure.
KW - C-SAW
KW - CIIP
KW - Critical information infrastructure protection
UR - http://www.scopus.com/inward/record.url?scp=84874414387&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-15479-9_30
DO - 10.1007/978-3-642-15479-9_30
M3 - Conference contribution
AN - SCOPUS:84874414387
SN - 9783642154782
T3 - IFIP Advances in Information and Communication Technology
SP - 315
EP - 325
BT - What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience - 9th IFIP TC 9 International Conference, HCC9 2010 and 1st IFIP TC 11 International Conference, CIP 2010 Held as Part of WCC 2010, Proceedings
A2 - Hercheui, Magda David
A2 - Hilty, Lorenz M.
A2 - Berleur, Jacques
PB - Springer New York LLC
Y2 - 20 September 2010 through 23 September 2010
ER -