2010 IEEE International Conference on Technologies for Homeland Security (HST) 2010
DOI: 10.1109/ths.2010.5654965
|View full text |Cite
|
Sign up to set email alerts
|

Cyber security for emergency management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(11 citation statements)
references
References 14 publications
0
11
0
Order By: Relevance
“…Lack of reliable communications may result in greater loss of life, as rescuers cannot coordinate effectively and the public is not warned in a timely manner. In [71], Walker has suggested that the EM community would most likely be incapable of an effective response to a terrorist attack on a major metropolitan area if a cyber attack had previously crippled the communication and data networks on which EM relies. However, it is not only the availability of communications that needs to be maintained.…”
Section: Communication Mediamentioning
confidence: 99%
See 2 more Smart Citations
“…Lack of reliable communications may result in greater loss of life, as rescuers cannot coordinate effectively and the public is not warned in a timely manner. In [71], Walker has suggested that the EM community would most likely be incapable of an effective response to a terrorist attack on a major metropolitan area if a cyber attack had previously crippled the communication and data networks on which EM relies. However, it is not only the availability of communications that needs to be maintained.…”
Section: Communication Mediamentioning
confidence: 99%
“…EMIS need to ensure the interoperability of all the functions they support [71], which implies the use of an inherent trust model within them [104]. Yet, EMIS typically consist of a combination of purpose-built and commercial off-the-shelf communication mechanisms and software, such as document readers, multimedia players and of course the operating system itself, each with their own and often well-known security flaws that make them vulnerable to malware and exploits.…”
Section: Information Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…The topic has, in result, become a key issue for debate in many governments and in growing frequency by chief executive officers (CEO) of global corporations [29], [30], as well as, being at the forefront of many news articles. In the early months of 2013, the USA defence secretary Leon Panetta highlighted the risk cyber-attacks could have on a nation, comparing the potential impact of a successful attack to that of the terrorist attacks of 9/11 [31].…”
Section: Growing Cyber-threatmentioning
confidence: 99%
“…The common sector is oil and gas, the power grid manufacturing, defense and public infrastructures are fully relying on the advancement of CPS. Therefore, cyber-physical systems security has become a matter for societal, infrastructures and economic to every country in the world due to the tremendous number of electronic devices that are interconnected via networks communication [2]- [4]. Latest reports have shown that cyber-attacks are aimed to destroy nation"s systems that used for country development.…”
Section: Introductionmentioning
confidence: 99%