• Corpus ID: 153002569

International Policy Framework for Protecting Critical Information Infrastructure: A Discussion Paper Outlining Key Policy Issues

@inproceedings{Brown2005InternationalPF,
  title={International Policy Framework for Protecting Critical Information Infrastructure: A Discussion Paper Outlining Key Policy Issues},
  author={Billy C Brown and Eric Goetz and Pascal Verhoest and S. Helmus and H.A.M. Luiijf and Robert Bruce and Scott B. C. Dynes and Hans Brechbuhl},
  year={2005}
}
Cyber security is a uniquely challenging policy issue with a wide range of public and private stakeholders within countries and beyond national boundaries. This executive summary and the full discussion paper delineate the need on a high priority basis to address cyber security issues and develop an effective and comprehensive national and international policy framework for protecting the information and communication technology (ICT)-based critical information infrastructures of nations. The… 

Figures and Tables from this paper

Parliamentary oversight of Cyber Security and Critical Information Infrastructures in Developing Countries
This paper investigates the role of Parliamentary oversight over the Cyber Security health and Critical Information Infrastructure Protection (CIIP) of a country, with special reference to Developing
Sharing Cyber Security Information : Good Practice Stemming from the Dutch Public-Private-Participation Approach
The failure of a national critical infrastructure may seriously impact the health and well-being of citizens, the economy, the environment, and the functioning of the government. Moreover, critical
Public–Private Collaboration: Cybercrime, Cybersecurity and National Security
This chapter analyses theoretical and practical implications of different forms of self- and co-regulation in the field of cybersecurity. In the past decade, the approaches to cybersecurity and
Protecting Critical Information Infrastructure: Developing Cybersecurity Policy
TLDR
A network model of the interactions required for effective cybersecurity is presented and guidance is provided to ICT Ministers in developing countries about the multidimensional aspects of cybersecurity policy concerns.
How to prepare for the next waves of Information Assurance issues
L'histore se repete. In general, each development wave of new technology shows a lack of security. The same lack of security can be found in the area of information and communications technology
Dominant Factors in National Information Security Policies
TLDR
A generic framework can be used as a guide for the improvement of existing national information security policies in different countries and for the future development of such policies in countries where they do not yet exist.
Information Security Systems vs. Critical Information Infrastructure Protection Systems - Similarities and Differences
The paper concerns similarities and differences between the information security management systems (ISMS) and the critical information infrastructure protection systems (CIIP), to predict the extent
A view of trust and information system security under the perspective of critical infrastructure protection
  • B. Rajaonah
  • Computer Science
    Ingénierie des Systèmes d Inf.
  • 2017
TLDR
The transdisciplinary view of trust research on information system security under the perspective of CIP is presented, and the definitions that are necessary for a common understanding of the concepts of critical infrastructures and trust are given.
Extensible threat taxonomy for critical infrastructures
TLDR
The idea and the development of a novel extensible and generic threat taxonomy for Critical Infrastructures (CIs) and it is shown that activism, sabotage and terror threats should be regarded as an expression of human intent combined with other existing threats.
Cyber (In-)security of Industrial Control Systems: A Societal Challenge
  • E. Luiijf
  • Engineering, Computer Science
    SAFECOMP
  • 2015
TLDR
The threats are explored, some examples of cyber incidents with ICS are provided, and the ICS security challenges to the authors' societies are discussed.
...
1
2
...

References

SHOWING 1-6 OF 6 REFERENCES
The economics of information security investment
TLDR
An economic model is presented that determines the optimal amount to invest to protect a given set of information and takes into account the vulnerability of the information to a security breach and the potential loss should such a breach occur.
Business continuity planning
The 11 September tragedy in the USA has provided a wake up call to remind businesses of the need for adequate disaster recovery and business continuity planning. A business continuity plan must be
Risk analysis and risk management in an uncertain world.
  • H. Kunreuther
  • Engineering, Medicine
    Risk analysis : an official publication of the Society for Risk Analysis
  • 2002
The tragic attacks of September 11 and the bioterrorist threats with respect to anthrax that followed have raised a set of issues regarding how we deal with events where there is considerable
Quality Assurance Management
Part 1 What managing quality means: what is quality and how can it be managed? quality in marketing quality in specification and design quality in purchasing quality in production after-sales
Intrusion Detection
  • R. Bace
  • Computer Science
    Encyclopedia of Social Network Analysis and Mining. 2nd Ed.
  • 2018
Interdependent Security: The Case of Identical Agents
  • 2002