• Corpus ID: 153002569

International Policy Framework for Protecting Critical Information Infrastructure: A Discussion Paper Outlining Key Policy Issues

  title={International Policy Framework for Protecting Critical Information Infrastructure: A Discussion Paper Outlining Key Policy Issues},
  author={Billy C Brown and Eric Goetz and Pascal Verhoest and S. Helmus and H.A.M. Luiijf and Robert Bruce and Scott B. C. Dynes and Hans Brechbuhl},
Cyber security is a uniquely challenging policy issue with a wide range of public and private stakeholders within countries and beyond national boundaries. This executive summary and the full discussion paper delineate the need on a high priority basis to address cyber security issues and develop an effective and comprehensive national and international policy framework for protecting the information and communication technology (ICT)-based critical information infrastructures of nations. The… 

Figures and Tables from this paper

Parliamentary oversight of Cyber Security and Critical Information Infrastructures in Developing Countries

  • S. von Solms
  • Computer Science
    2013 Science and Information Conference
  • 2013
The role of Parliamentary oversight over the Cyber Security health and Critical Information Infrastructure Protection of a country, with special reference to Developing Countries, is investigated.

Sharing Cyber Security Information : Good Practice Stemming from the Dutch Public-Private-Participation Approach

The aim of this Good Practice on information sharing is to assist public and private policy-makers, middle management, researchers, and cyber security practitioners, and to steer them away from pitfalls to find their own effective and efficient arrangements for information sharing.

Protecting Critical Information Infrastructure: Developing Cybersecurity Policy

A network model of the interactions required for effective cybersecurity is presented and guidance is provided to ICT Ministers in developing countries about the multidimensional aspects of cybersecurity policy concerns.

How to prepare for the next waves of Information Assurance issues

Looking back, by looking back, can predict the upcoming operational and maintenance issues in critical information infrastructure assurance.

Dominant Factors in National Information Security Policies

A generic framework can be used as a guide for the improvement of existing national information security policies in different countries and for the future development of such policies in countries where they do not yet exist.

A view of trust and information system security under the perspective of critical infrastructure protection

  • B. Rajaonah
  • Computer Science
    Ingénierie des Systèmes d Inf.
  • 2017
The transdisciplinary view of trust research on information system security under the perspective of CIP is presented, and the definitions that are necessary for a common understanding of the concepts of critical infrastructures and trust are given.

Extensible threat taxonomy for critical infrastructures

The idea and the development of a novel extensible and generic threat taxonomy for Critical Infrastructures (CIs) and it is shown that activism, sabotage and terror threats should be regarded as an expression of human intent combined with other existing threats.

Cyber (In-)security of Industrial Control Systems: A Societal Challenge

The threats are explored, some examples of cyber incidents with ICS are provided, and the ICS security challenges to the authors' societies are discussed.

Does the Merton model apply to the specific circumstances of emerging markets

The purpose was to investigate whether the Merton Model works in emerging markets and if it does how efficient it works there compared to in mature markets. Findings show that the Merton model

Public–Private Collaboration: Cybercrime, Cybersecurity and National Security

This chapter argues that the best way to provide cybersecurity is the evolvement of the existing channels for collaboration and building trust between industry and governments.



The economics of information security investment

An economic model is presented that determines the optimal amount to invest to protect a given set of information and takes into account the vulnerability of the information to a security breach and the potential loss should such a breach occur.

Business continuity planning

The 11 September tragedy in the USA has provided a wake up call to remind businesses of the need for adequate disaster recovery and business continuity planning. A business continuity plan must be

Risk Analysis and Risk Management in an Uncertain World 1

  • H. Kunreuther
  • Sociology
    Risk analysis : an official publication of the Society for Risk Analysis
  • 2002
The tragic attacks of September 11 and the bioterrorist threats with respect to anthrax that followed have raised a set of issues regarding how we deal with events where there is considerable

Quality Assurance Management

Part 1 What managing quality means: what is quality and how can it be managed? quality in marketing quality in specification and design quality in purchasing quality in production after-sales

Interdependent Security: The Case of Identical Agents

  • 2002