Skip to main content

Overview of Critical Information Infrastructure Protection

  • Chapter
Critical Infrastructure Protection

Abstract

The present volume aims to provide an overview of the current understanding of the so-called Critical Infrastructure (CI), and particularly the Critical Information Infrastructure (CII), which not only forms one of the constituent sectors of the overall CI, but also is unique in providing an element of interconnection between sectors as well as often also intra-sectoral control mechanisms.

One problem faced by research on C(I)I is the extreme range of scales at which security problems may arise. This is true for the time dimension where policy-level decisions such as the deployment of physical infrastructure like roads and high-tension transmission lines have impacts measured in decades whilst industrial control systems must provide guaranteed and secure real-time responses in the millisecond range. It is, moreover, also the case for the physical extent of infrastructures where single physical facilities such as vaccine plants may be a vital element of national or supra-national infrastructures, but where the trans-national electrical power or natural gas transmission networks span entire continents.

The book hence surveys not only key high-level concepts and selected technical research areas with an emphasis on control systems as a highly active research area, but also seeks to include policy aspects as well as a discussion on models for validation and verification. This is rounded off by several studies of specific issues and challenges faced by individual CI sectors including the telecommunications, electricity, transportation, and financial services sectors.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Albert, R., Albert, I., Nakarado, G.L.: Structural Vulnerability of the North American Power Grid. Physical Review E – Statistical, Nonlinear, and Soft Matter Physics 69(2), 025103 (2004), doi:10.1103/PhysRevE.69.025103

    Article  Google Scholar 

  2. Albert, R., Jeong, H., Barabási, A.L.: Error and Attack Tolerance of Complex Networks. Nature 406, 378–382 (2000), doi:10.1038/35019019

    Article  Google Scholar 

  3. Brömmelhörster, J., Fabry, S., Wirtz, N. (eds.): Internationale Aktivitäten zum Schutz Kritischer Infrastrukturen. Bundesamt für Sicherheit in der Informationstechnik, Bonn, Germany (2004)

    Google Scholar 

  4. Cohen, R., Erez, K., ben Avraham, D., Havlin, S.: Breakdown of the Internet under Intentional Attack. Physical Review Letters 86(16), 3682–3685 (2001), doi:10.1103/PhysRevLett.86.3682

    Article  Google Scholar 

  5. Falliere, N., Murchu, L., Chien, E.: Stuxnet Dossier. Symantec Security Response (2011)

    Google Scholar 

  6. Marsh, R.T. (ed.): Critical Infrastructures: Protecting America’s Infrastructures. United States Government Printing Office, Washington D.C., USA (1997); Report of the President’s Commission on Critical Infrastructure Protection

    Google Scholar 

  7. United States Department of Defense: Department of Defense Strategy for Operating in Cyberspace. U.S. Government Printing Office (2011)

    Google Scholar 

  8. Wenger, A., Mauer, V., Dunn, M. (eds.): International CIIP Handbook 2008/2009. Center for Security Studies, ETH Zurich, Zurich, Switzerland (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Lopez, J., Setola, R., Wolthusen, S.D. (2012). Overview of Critical Information Infrastructure Protection. In: Lopez, J., Setola, R., Wolthusen, S.D. (eds) Critical Infrastructure Protection. Lecture Notes in Computer Science, vol 7130. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28920-0_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28920-0_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28919-4

  • Online ISBN: 978-3-642-28920-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics