Cybercrime and the Security of Critical Infrastructures

被引:0
|
作者
Skopik, Florian [1 ]
Bleier, Thomas [1 ]
机构
[1] AIT Austrian Inst Technol, Seibersdorf, Austria
来源
ERCIM NEWS | 2012年 / 91期
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In recent years, the Internet has rapidly expanded to a massive economic sphere of activity - not only for the new economy, where Internet-based businesses have grown from startups to multinational and billon-dollar enterprises, faster than any businesses before, but also for the "dark side" of entrepreneurship. Exploiting weaknesses in information and communications technology (ICT) systems has become a profitable business model. In order to better cope with these threats, we argue that tight cooperation between all parties in the digital society is necessary. The project CAIS deals with the implementation of a cyber attack information system on a national level, whose ultimate goal is to strengthen the resilience of today's interdependent networked services and increase their overall availability and trustworthiness.
引用
收藏
页码:26 / 28
页数:3
相关论文
共 50 条
  • [1] Cyber security of critical infrastructures
    Maglaras, Leandros A.
    Kim, Ki-Hyung
    Janicke, Helge
    Ferrag, Mohamed Amine
    Rallis, Stylianos
    Fragkou, Pavlina
    Maglaras, Athanasios
    Cruz, Tiago J.
    ICT EXPRESS, 2018, 4 (01): : 42 - 45
  • [2] Cyber Security of Networked Critical Infrastructures
    Abu-Nimeh, Saed
    Foo, Ernest
    Fovino, Igor Nai
    Govindarasu, Manimaran
    Morris, Thomas
    IEEE NETWORK, 2013, 27 (01): : 3 - 4
  • [3] PolyOrBAC: A security framework for Critical Infrastructures
    Abou El Kalam, A.
    Deswarte, Y.
    Baina, A.
    Kaaniche, M.
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2009, 2 (04) : 154 - 169
  • [4] Emergent information security in critical infrastructures
    Daskapan, Semir
    Vree, Willem G.
    Wagenaar, Rene W.
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2006, 2 (2-3) : 247 - 260
  • [5] Insider Threats to IT Security of Critical Infrastructures
    Gaidarski, Ivan
    Minchev, Zlatogor
    Studies in Big Data, 2021, 84 : 381 - 394
  • [6] Collaboration in Security Assessments for Critical Infrastructures
    Koester, Friedrich
    Klaas, Michael
    Nguyen, Hanh Quyen
    Braendle, Markus
    Obermeier, Sebastian
    Brenner, Walter
    CRIS: 4TH INTERNATIONAL CONFERENCE ON CRITICAL INFRASTRUCTURE, 2009, : 59 - 65
  • [7] Critical Information Infrastructures Security Modeling
    Erokhin, Sergey
    Petukhov, Andrey
    Pilyugin, Pavel
    PROCEEDINGS OF THE 24TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT), 2019, : 82 - 88
  • [8] A Security Assessment Methodology for Critical Infrastructures
    Caselli, Marco
    Kargl, Frank
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY (CRITIS 2014), 2016, 8985 : 332 - 343
  • [9] On the Effectiveness of Security Countermeasures for Critical Infrastructures
    Hausken, Kjell
    He, Fei
    RISK ANALYSIS, 2016, 36 (04) : 711 - 726
  • [10] Security Strategy Analysis for Critical Information Infrastructures
    Manuel Torres, Jose
    Olav Sveen, Finn
    Maria Sarriegi, Jose
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2009, 5508 : 247 - 257