PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Increasing Protection and Resilience of Critical Infrastructures – Current challenges and approaches

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
In this paper we present current key challenges with respect to Critical Infrastructure Protection and to their resiliency. As our world becomes more and more interconnected via open networks with the cyberspace, many new challenges arise. Therefore, we frame the problem within three distinctive domains: real world natural events, human (organisational and legal), and cyber one. Within our analysis we present how current technologies, tools and methodologies can be used to address certain problems within those domains. Moreover, we stress the fact that there is a limited number of initiatives that aim at proposing the holistic (all hazard) approach addressing all the domains at once.
Rocznik
Strony
79--84
Opis fizyczny
Bibliogr. 27 poz., rys.
Twórcy
autor
  • Institute of Computer Science and Telecommunications, UTP University of Science and Technology, Bydgoszcz, Poland
autor
  • Institute of Computer Science and Telecommunications, UTP University of Science and Technology, Bydgoszcz, Poland
  • Institute of Computer Science and Telecommunications, UTP University of Science and Technology, Bydgoszcz, Poland
  • Adam Mickiewicz University, Poznań, Poland
autor
  • Adam Mickiewicz University, Poznań, Poland
  • Institute of Computer Science and Telecommunications, UTP University of Science and Technology, Bydgoszcz, Poland
Bibliografia
  • [1] Berenson, J. et al. (2012). The Roadmap to Secure Control System in the Transportation Sector. The Roadmap to Secure Control Systems in the Transportation Sector Working Group.
  • [2] Choraś M., Flizikowski A., Kozik R., Renk R. & Hołubowicz W. (2009). Ontology-Based Reasoning Combined with Inference Engine for SCADA-ICT Interdependencies, Vulnerabilities and Threats Analysis. In Pre-Proc. of 4th International Workshop on Critical Information Infrastructures Security, CRITIS'09, Bonn, Germany, 203-214, Fraunhofer IAIS.
  • [3] Coppolino, L., D׳antonio, S. & Romano, L. (2014). Exposing vulnerabilities in electric power grids: An experimental approach. International Journal of Critical Infrastructure Protection, Vol. 7, issue 1, 51-60.
  • [4] Coppolino, L., D’Antonio, S., Elia, I.A. & Romano, L. (2011). Security Analysis of Smart Grid Data Collection Technologies. Computer Safety, Reliability, and Security Lecture Notes in Computer Science Vol. 6894, 143-156
  • [5] Coppolino, L., D’Antonio, S., Formicola, V. & Romano, L. (2013). Enhancing SIEM technology to protect critical infrastructures. Critical Information Infrastructures Security Lecture Notes in Computer Science Vol. 7722, 10-21.
  • [6] Coppolino, L., D'Antonio, S., Garofalo, A. & Romano, L. (2013). Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks. P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), 2013 Eighth International Conference on.
  • [7] Eisenhauer, J., Donnelly, P., Ellis, M. & O’Brien, M. (2006). Roadmap to Secure Control Systems in the Energy Sector. U.S. Department of Energy, U.S. Department of Homeland Security.
  • [8] EU cyber security strategy (2013). http://www.enisa.europa.eu/media/newsitems/ne w-eu-cybersecurity-strategy-directive-announced
  • [9] FP7 CIPRNet project homepage https://www.ciprnet.eu
  • [10] FP7 CockpitCI project homepage http://www.cockpitci.eu
  • [11] Jereza, K. et al. (2011). Roadmap to Achieve Energy Delivery Systems Cybersecurity. ESCSWG (Energy Sector Control Systems Working Group).
  • [12] Johnson, S., Larson, B., Edwards, D. & Morley, K. (2008). Roadmap to Secure Control Systems in the Water Sector. Water Sector Coordinating Council Cyber Security Working Group (WSCCCWG).
  • [13] Klimburg, A. (Ed.) (2012). National cyber security framework manual. NATO Cooperative Cyber Defense Center of Excellence.
  • [14] Lee, S.J., Mo, M. & Seong, P.H. (2007). Development of an Integrated Decision Support System to Aid the Cognitive Activities of Operators in Main Control Rooms of Nuclear Power Plants. Proc. of IEEE Symposium on Computational Intelligence in Multicriteria Decision Making (MCDM), 146--152.
  • [15] Luiijf, E., Besseling, K. & De Graaf, P. (2013). Nineteen national cyber security strategies. International Journal of Critical Infrastructures, Vol. 9 No. 1/2.
  • [16] Luiijf, E.A.M. & Klaver, M. H A (2005). Critical infrastructure awareness required by civil emergency planning. Critical Infrastructure Protection, First IEEE International Workshop on.
  • [17] Markatos, E. & Balzarotti, D. (2013). The Red Book: A Roadmap for Systems Security Research. SysSec (FP7 NoE Project).
  • [18] NIST (National Institute of Standards and Technology) (2014). NIST Roadmap for Improving Critical Infrastructure Cybersecurity.
  • [19] Pederson, P., Roxey, T. & Gray, J. (2011). Crosssector Roadmap for Cybersecurity of Control Systems. ICSJWG (Industrial Control Systems Joint Working Group).
  • [20] Risk Management Solutions, Inc. (2005). 1995 Kobe Earthquake 10-year Retrospective. Newark, CA.
  • [21] RoMA project - Resilience Enhancement of Metropolitan Areas. http://www.cis.uniroma1.it/en/node/5619
  • [22] U.S. Department of Homeland Security (2009). A Roadmap for Cybersecurity Research.
  • [23] U.S. Department of Homeland Security (2010). Dams Sector Roadmap to Secure Control Systems.
  • [24] UK Cabinet Office (2011). The UK Cyber Security Strategy: Protecting and promoting the UK in a digital world.
  • [25] XiaoFeng, D., YuJiong, G. & Kun, Y. (2008). Study on Intelligent Maintenance Decision Support System Using for Power Plant Equipment. Proc. of the IEEE International Conference on Automation and Logistics Qingdao, China, 96-100.
  • [26] Xie, L., Wang, Z. & Bian, L. (2008). The Research of Oiled Flood Precaution Decision Support System. Proc. of International Seminar on Business and Information Management, ISBIM '08, vol.2, 236-239.
  • [27] Zhang B., Wu G. & Shang S. (2008). Research on Decision Support System of Water Pollution Control Based on Immune Agent. Proc. of International Symposium on Computer Science and Computational Technology, ISCSCT, vol.1, 114-117.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-032c5431-da6c-463e-81e4-4b0e7a948a77
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.