@inproceedings{fa1c172fd68d4fa8bb636baa39c718bc,
title = "Critical information infrastructure protection: How comprehensive should it be?",
abstract = "It is a fact that any computer or device connected to the Internet can potentially be infected by malicious software. This paper investigates this risk further, and makes the basic statement that any Internet connected computer in a country should be seen as part of that country's critical information infrastructure protection program because such a computer can be herded into a botnet and used against that country.",
keywords = "Critical Information Infrastructure, Critical Information Infrastructure Protection, Critical Information Systems, botnets)",
author = "{Von Solms}, {S. H.}",
year = "2013",
doi = "10.1109/ICASTech.2013.6707516",
language = "English",
isbn = "9781479930678",
series = "IEEE International Conference on Adaptive Science and Technology, ICAST",
publisher = "IEEE Computer Society",
booktitle = "ICAST 2013 - 5th International Conference on Adaptive Science and Technology",
address = "United States",
note = "5th International Conference on Adaptive Science and Technology: The Future is Now: Adaptive Science and Technology Unbound, ICAST 2013 ; Conference date: 25-11-2013 Through 27-11-2013",
}