National Information Infrastructure Security and Cyber Terrorism in the Process of Industrializations

被引:0
|
作者
Li Yanzhao
机构
关键词
D O I
10.1109/IAS.2009.132
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the development of technology, the interdependence of various infrastructures has increased, which also enhanced their vulnerabilities. The national information infrastructure security concerns the nation's stability and economic security. Risk assessment methodology was introduced into the safeguard of the information infrastructure that is the preference of terrorist attack. Through the analysis of the wants of terrorists, the four steps of risk management was studied in detail using many factual examples. The Macroscopic and microscopic countermeasures was found out, which attributed to adopting counteractions to reduce the vulnerability from and relieve the risk of the system suffering from terrorism attack.
引用
收藏
页码:532 / 535
页数:4
相关论文
共 50 条
  • [21] Intelligence, terrorism, and national security
    Cronin, B
    ANNUAL REVIEW OF INFORMATION SCIENCE AND TECHNOLOGY, 2005, 39 : 395 - 432
  • [22] From information security to cyber security
    von Solms, Rossouw
    van Niekerk, Johan
    COMPUTERS & SECURITY, 2013, 38 : 97 - 102
  • [23] Security assessment of the electricity infrastructure under terrorism
    Tranchita, Carolina
    Hadjsaid, Nouredine
    Torres, Alvaro
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2009, 5 (03) : 245 - 264
  • [24] NCSecMM: A National Cyber Security Maturity Model for an Interoperable "National Cyber Security" Framework
    El Kettani, Mohamed Dafir Ech-Cherif
    Debbagh, Taieb
    9TH EUROPEAN CONFERENCE ON E-GOVERNMENT, PROCEEDINGS, 2009, : 236 - +
  • [25] Research on non-technical source of critical information infrastructure based on cyber security
    You, Zhiyong
    Tao, Yuan
    Qu, Jie
    PROCEEDINGS OF 2024 INTERNATIONAL CONFERENCE ON COMPUTER AND MULTIMEDIA TECHNOLOGY, ICCMT 2024, 2024, : 395 - 400
  • [26] System-Information and Cognitive Technologies of Man-Made Infrastructure Cyber Security
    Sikora L.S.
    Lysa N.K.
    Tsikalo Y.I.
    Fedevych O.Y.
    Journal of Cyber Security and Mobility, 2023, 12 (03): : 389 - 414
  • [27] National Cyber Security in South Africa: A Letter to the Minister of Cyber Security
    von Solms, Rossouw
    von Solms, Basie
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 369 - 374
  • [28] Cyber security as the basis for the national security of Ukraine
    Tarasenko, Oleh
    Mirkovets, Dmytro
    Shevchyshen, Artem
    Nahorniuk-Danyliuk, Oleksandr
    Yermakov, Yurii
    CUESTIONES POLITICAS, 2022, 40 (73): : 583 - 599
  • [29] Development of Cyber Security Testbed for Critical Infrastructure
    Jarmakiewicz, Jacek
    Maslanka, Krzysztof
    Parobczak, Krzysztof
    2015 INTERNATIONAL CONFERENCE ON MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS (ICMCIS), 2015,
  • [30] Concept for Increasing Security of National Information Technology Infrastructure and Private Clouds
    Melnikov, D. A.
    Durakovsky, A. P.
    Dvoryankin, S., V
    Gorbatov, V. S.
    2017 IEEE 5TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD 2017), 2017, : 155 - 160