2022
DOI: 10.21203/rs.3.rs-1892615/v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Investigating Potential Vulnerability of Critical Infrastructure and way forward – recommendations to enhance security and resilience

Abstract: In this research, firstly critical infrastructures (CIs) that are found in Ethiopia are identified. Then, potential security vulnerabilities of these CIs are identified by performing strategic and tactical level risk and vulnerability assessments. To perform the stated assessments, questionnaires were prepared using different standards. Moreover, on-site interviews, existing document and literature reviews were conducted. By performing the above research methodologies, the security vulnerabilities of selected … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…Open and transparent data-sharing practices enhance the quality and comprehensiveness of available data and foster a collective understanding of interdependencies across the sector. Collaboration among industry players, researchers, and regulatory bodies catalyzes enriching methodologies, refining models, and collectively addressing the challenges associated with assessing and mitigating interdependencies (Figure 3) [12].…”
Section: Geospatial Visualization Of Interdependenciesmentioning
confidence: 99%
See 2 more Smart Citations
“…Open and transparent data-sharing practices enhance the quality and comprehensiveness of available data and foster a collective understanding of interdependencies across the sector. Collaboration among industry players, researchers, and regulatory bodies catalyzes enriching methodologies, refining models, and collectively addressing the challenges associated with assessing and mitigating interdependencies (Figure 3) [12].…”
Section: Geospatial Visualization Of Interdependenciesmentioning
confidence: 99%
“…It is important to note that the following case studies are presented for illustrative and educational purposes. Due to the hypothetical nature of these scenarios and the unavailability of specific data, the cases are crafted to emphasize the application of [12].…”
Section: Case Studies 31 Datamentioning
confidence: 99%
See 1 more Smart Citation
“…Literature review: The most relevant previously published journals, conference proceedings, industrial standards were investigated and reviewed thoroughly [20][21][22][23][24].…”
Section: On-site Interviewmentioning
confidence: 99%
“…The cybersecurity governance framework does have a vital role in accomplishing the security objectives of an organization for both existing problems and future challenges [8][9][10]. To address current security issues, the security governance framework should examine and consider the following points [11,12]:…”
Section: Introductionmentioning
confidence: 99%