International Policy Framework for Protecting Critical Information Infrastructure: A Discussion Paper Outlining Key Policy Issues
@inproceedings{Brown2005InternationalPF, title={International Policy Framework for Protecting Critical Information Infrastructure: A Discussion Paper Outlining Key Policy Issues}, author={Billy C Brown and Eric Goetz and Pascal Verhoest and S. Helmus and H.A.M. Luiijf and Robert Bruce and Scott B. C. Dynes and Hans Brechbuhl}, year={2005} }
Cyber security is a uniquely challenging policy issue with a wide range of public and private stakeholders within countries and beyond national boundaries. This executive summary and the full discussion paper delineate the need on a high priority basis to address cyber security issues and develop an effective and comprehensive national and international policy framework for protecting the information and communication technology (ICT)-based critical information infrastructures of nations. The…
Figures and Tables from this paper
13 Citations
Parliamentary oversight of Cyber Security and Critical Information Infrastructures in Developing Countries
- Computer Science2013 Science and Information Conference
- 2013
The role of Parliamentary oversight over the Cyber Security health and Critical Information Infrastructure Protection of a country, with special reference to Developing Countries, is investigated.
Sharing Cyber Security Information : Good Practice Stemming from the Dutch Public-Private-Participation Approach
- Computer Science
- 2015
The aim of this Good Practice on information sharing is to assist public and private policy-makers, middle management, researchers, and cyber security practitioners, and to steer them away from pitfalls to find their own effective and efficient arrangements for information sharing.
Protecting Critical Information Infrastructure: Developing Cybersecurity Policy
- Computer ScienceInf. Technol. Dev.
- 2010
A network model of the interactions required for effective cybersecurity is presented and guidance is provided to ICT Ministers in developing countries about the multidimensional aspects of cybersecurity policy concerns.
How to prepare for the next waves of Information Assurance issues
- Computer Science
- 2006
Looking back, by looking back, can predict the upcoming operational and maintenance issues in critical information infrastructure assurance.
Dominant Factors in National Information Security Policies
- Political Science
- 2010
A generic framework can be used as a guide for the improvement of existing national information security policies in different countries and for the future development of such policies in countries where they do not yet exist.
A view of trust and information system security under the perspective of critical infrastructure protection
- Computer ScienceIngénierie des Systèmes d Inf.
- 2017
The transdisciplinary view of trust research on information system security under the perspective of CIP is presented, and the definitions that are necessary for a common understanding of the concepts of critical infrastructures and trust are given.
Extensible threat taxonomy for critical infrastructures
- Computer ScienceInt. J. Crit. Infrastructures
- 2008
The idea and the development of a novel extensible and generic threat taxonomy for Critical Infrastructures (CIs) and it is shown that activism, sabotage and terror threats should be regarded as an expression of human intent combined with other existing threats.
Cyber (In-)security of Industrial Control Systems: A Societal Challenge
- Computer ScienceSAFECOMP
- 2015
The threats are explored, some examples of cyber incidents with ICS are provided, and the ICS security challenges to the authors' societies are discussed.
Does the Merton model apply to the specific circumstances of emerging markets
- Economics, Business
- 2014
The purpose was to investigate whether the Merton
Model works in emerging markets and if it
does how efficient it works there compared to in
mature markets. Findings show that the Merton model…
Public–Private Collaboration: Cybercrime, Cybersecurity and National Security
- Computer Science, Political Science
- 2015
This chapter argues that the best way to provide cybersecurity is the evolvement of the existing channels for collaboration and building trust between industry and governments.
References
SHOWING 1-5 OF 5 REFERENCES
The economics of information security investment
- Economics, Computer ScienceTSEC
- 2002
An economic model is presented that determines the optimal amount to invest to protect a given set of information and takes into account the vulnerability of the information to a security breach and the potential loss should such a breach occur.
Business continuity planning
- Business
- 2002
The 11 September tragedy in the USA has provided a wake up call to remind businesses of the need for adequate disaster recovery and business continuity planning. A business continuity plan must be…
Risk Analysis and Risk Management in an Uncertain World 1
- SociologyRisk analysis : an official publication of the Society for Risk Analysis
- 2002
The tragic attacks of September 11 and the bioterrorist threats with respect to anthrax that followed have raised a set of issues regarding how we deal with events where there is considerable…
Quality Assurance Management
- Business
- 1993
Part 1 What managing quality means: what is quality and how can it be managed? quality in marketing quality in specification and design quality in purchasing quality in production after-sales…
Interdependent Security: The Case of Identical Agents
- 2002