Abstract
The present volume aims to provide an overview of the current understanding of the so-called Critical Infrastructure (CI), and particularly the Critical Information Infrastructure (CII), which not only forms one of the constituent sectors of the overall CI, but also is unique in providing an element of interconnection between sectors as well as often also intra-sectoral control mechanisms.
One problem faced by research on C(I)I is the extreme range of scales at which security problems may arise. This is true for the time dimension where policy-level decisions such as the deployment of physical infrastructure like roads and high-tension transmission lines have impacts measured in decades whilst industrial control systems must provide guaranteed and secure real-time responses in the millisecond range. It is, moreover, also the case for the physical extent of infrastructures where single physical facilities such as vaccine plants may be a vital element of national or supra-national infrastructures, but where the trans-national electrical power or natural gas transmission networks span entire continents.
The book hence surveys not only key high-level concepts and selected technical research areas with an emphasis on control systems as a highly active research area, but also seeks to include policy aspects as well as a discussion on models for validation and verification. This is rounded off by several studies of specific issues and challenges faced by individual CI sectors including the telecommunications, electricity, transportation, and financial services sectors.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Albert, R., Albert, I., Nakarado, G.L.: Structural Vulnerability of the North American Power Grid. Physical Review E – Statistical, Nonlinear, and Soft Matter Physics 69(2), 025103 (2004), doi:10.1103/PhysRevE.69.025103
Albert, R., Jeong, H., Barabási, A.L.: Error and Attack Tolerance of Complex Networks. Nature 406, 378–382 (2000), doi:10.1038/35019019
Brömmelhörster, J., Fabry, S., Wirtz, N. (eds.): Internationale Aktivitäten zum Schutz Kritischer Infrastrukturen. Bundesamt für Sicherheit in der Informationstechnik, Bonn, Germany (2004)
Cohen, R., Erez, K., ben Avraham, D., Havlin, S.: Breakdown of the Internet under Intentional Attack. Physical Review Letters 86(16), 3682–3685 (2001), doi:10.1103/PhysRevLett.86.3682
Falliere, N., Murchu, L., Chien, E.: Stuxnet Dossier. Symantec Security Response (2011)
Marsh, R.T. (ed.): Critical Infrastructures: Protecting America’s Infrastructures. United States Government Printing Office, Washington D.C., USA (1997); Report of the President’s Commission on Critical Infrastructure Protection
United States Department of Defense: Department of Defense Strategy for Operating in Cyberspace. U.S. Government Printing Office (2011)
Wenger, A., Mauer, V., Dunn, M. (eds.): International CIIP Handbook 2008/2009. Center for Security Studies, ETH Zurich, Zurich, Switzerland (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Lopez, J., Setola, R., Wolthusen, S.D. (2012). Overview of Critical Information Infrastructure Protection. In: Lopez, J., Setola, R., Wolthusen, S.D. (eds) Critical Infrastructure Protection. Lecture Notes in Computer Science, vol 7130. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28920-0_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-28920-0_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-28919-4
Online ISBN: 978-3-642-28920-0
eBook Packages: Computer ScienceComputer Science (R0)