2015
DOI: 10.1016/j.ijcip.2014.12.002
|View full text |Cite
|
Sign up to set email alerts
|

Critical infrastructure protection: Requirements and challenges for the 21st century

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
125
0
4

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 242 publications
(129 citation statements)
references
References 43 publications
0
125
0
4
Order By: Relevance
“…All of the responding businesses used one or more PCS systems, sometimes more than ten different systems. 3 Since this paper focuses on cybersecurity governance, it only briefly summarizes the -primarily technical -survey findings. 4 Group interviews were held in the form of two workshops with experts and representatives of corporations.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…All of the responding businesses used one or more PCS systems, sometimes more than ten different systems. 3 Since this paper focuses on cybersecurity governance, it only briefly summarizes the -primarily technical -survey findings. 4 Group interviews were held in the form of two workshops with experts and representatives of corporations.…”
Section: Methodsmentioning
confidence: 99%
“…5 The NICC performs facilitative roles such as to monitor; inform; develop preventative instruments; advise government and business; and coordinate action [35]. With regard to PCS security, the NICC publishes factsheets, information brochures and organizes information meetings to 3 Corporations with more than one PCS system were asked to fill in the survey for their most important system. 4 The survey was carried out by Laura Lormann-Zwartelé as part of her master's thesis research and supervised by the author.The full report (in Dutch) is available upon request.…”
Section: Public-private Collaborationmentioning
confidence: 99%
“…Hospital organizations are considered as critical infrastructure (CI) to nation states [3,25]. As a critical infrastructure, hospital organizations are prone to security threats that can affect health policies, public health, healthcare services, surgical procedures, electronic patient records, patient privacy, doctor-patient communication, etc.…”
Section: Futures Digital Hospitalmentioning
confidence: 99%
“…This is especially emphasized when taking in to the account services with high security requirements such as critical infrastructure services. Hence, the analysis of security issues in cloud attracted broad research interest [13], [14], [15], [16], [17], [18], [19], [20], [21], [13]. However, majority of the research community concluded that the current security methods and techniques in cloud are not mature enough to reliably support hosting services in cloud.…”
Section: A Critical Infrastructure Security Challengesmentioning
confidence: 99%
“…[21] based on their detailed security analysis for various critical infrastructure providers, outlined major security issues in the cloud that hinder the migration of critical infrastructure services. Alcaraz and Zeadally in their survey [13] highlighted the vital role of critical infrastructures in modern society. However, they elaborated security challenges of critical infrastructure assets are mainly focusing on the industrial control systems (SCADA).…”
Section: A Critical Infrastructure Security Challengesmentioning
confidence: 99%