Skip to main content

The Art of CIIP Strategy: Tacking Stock of Content and Processes

  • Chapter
Critical Infrastructure Protection

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7130))

Abstract

This chapter analyses and compares CI(I)P and cybersecurity strategies to discover key issues, developments, and trends and to make recommendations about strategy making in the field of CIIP. To this end, it will first define CIP, CIIP and cybersecurity. It will then show what kind of protection goals – statements about a desired state of security of a particular object/asset that is seen in need of protection from one or a variety of threats – are defined and what kind of countermeasures are foreseen. Third, it will move from the content to the process and will make recommendations about how an optimal strategy process in the field of CIIP should look like.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Collier, S., Lakoff, A.: The Vulnerability of Vital Systems: How ‘Critical Infrastructure’ Became a Security Problem. In: Dunn Cavelty, M., Kristensen, K.S. (eds.) The Politics of Securing the Homeland: Critical Infrastructure, Risk and Securitisation, pp. 40–62. Routledge, London (2008)

    Google Scholar 

  2. Dunn Cavelty, M.: Cyber-Security. In: Burgess, P. (ed.) The Routledge Handbook of New Security Studies, pp. 154–162. Routledge, London (2010)

    Google Scholar 

  3. President’s Commission on Critical Infrastructure Protection. Critical Foundations. Protecting America’s Infrastructures, US Government Printing Office, Washington DC (1997)

    Google Scholar 

  4. Brunner, E.M., Suter, M.: International CIIP Handbook 2008/2009. Center for Security Studies, Zurich (2008)

    Google Scholar 

  5. Claudle, S.L.: National Security Strategies: Security from What, from Whom, and by What Means. Journal of Homeland Security and Emergency Management 6(1), 10 (2009)

    Google Scholar 

  6. Mintzberg, H., Ahlstrand, B., Lampel, J.: Strategy Safari: A Guided Tour Through the Wilds of Strategic Management, p. 9. The Free Press, New York (1998)

    Google Scholar 

  7. Schneider, V., Hyner, D.: Security in Cyberspace. In: Koenig-Archibougi, M., Zürn, M. (eds.) New Modes of Governance in the Global System. Exploring Publicness, Delegation and Inclusiveness, Palgrave MacMilllan, pp. 154–176 (2005)

    Google Scholar 

  8. US Government. Cyberspace Policy Review. Assuring a Trusted and Resilient Information and Communication Infrastructure. US Government Printing Office, Washington DC (2009)

    Google Scholar 

  9. Ministry of Defence of Estonia. Cyber Security Strategy. Cyber Security Strategy Committee, Tallinn, p. 8 (2008)

    Google Scholar 

  10. Cabinet Office of the United Kingdom. Cyber Security Strategy of the United Kingdom. Safety, Security and Resilience in Cyber Space. The Stationery Office, London, p. 9 (2009)

    Google Scholar 

  11. US Government, Cyberspace Policy Review, p. 2

    Google Scholar 

  12. Cornish, P., Hughes, R., Livingstone, D.: Cyberspace and the National Security of the United Kingdom. Threats and Responses. Chatham House, London (2009)

    Google Scholar 

  13. Homeland Security Council. National Strategy for Homeland Security. US Government Printing Office, Washington DC, p. 1 (2007)

    Google Scholar 

  14. Ibid, p. 26

    Google Scholar 

  15. Dutch Ministry of the Interior and Kingdom Relation. National Security Strategy and Work Programme 2007-2008. Broese & Peereboom, The Hague, p. 16 (2007)

    Google Scholar 

  16. Ibid, p.13

    Google Scholar 

  17. Her Majesty the Queen in Right of Canada. National Strategy for Critical Infrastructure. Public Safety Canada, Ottawa, p. 25 (2009)

    Google Scholar 

  18. Cabinet Office of the United Kingdom. The National Security Strategy of the United Kingdom. Security in an Interdependent World. The Stationery Office, London p. 5 (2008)

    Google Scholar 

  19. Ibid, p. 26

    Google Scholar 

  20. Department of Homeland Security. National Infrastructure Protection Plan. Partnering to Enhance Protection and Resiliency. Government Printing Office, Washington DC, p. 1 (2009)

    Google Scholar 

  21. Her Majesty the Queen in Right of Canada. National Strategy for Critical Infrastructure p. 1 (2008)

    Google Scholar 

  22. Australian Government. Critical Infrastructure Resilience Strategy. Commonwealth of Australia, Barton, pp. 3ff (2010)

    Google Scholar 

  23. Brunner, E., Giroux, J.: Resilience: A Tool for Preparing and Managing Emergencies. CSS Analyses in Security Policy, No. 60, p. 1 (2009)

    Google Scholar 

  24. For a complete list of the sector-specific agencies, see: Department of Homeland Security, National Infrastructure Protection Plan, p. 19

    Google Scholar 

  25. Other plans can be retrieved, http://www.dhs.gov/files/programs/gc_1179866197607.shtm

  26. Department of Homeland Security. Information Technology. Critical Infrastructure and Key Resources Sector-Specific Plan as Input to the National Infrastructure Protection Plan. Government Printing Office, Washington DC, p. 11ff (2007)

    Google Scholar 

  27. Bundesministerium des Innern. Umsetzungsplan KRITIS des nationalen Plans zum Schutz der kritischen Informationsinfrastrukturen. Publikationsversand der Bundesregierung, Rostock (2007)

    Google Scholar 

  28. Cabinet Office of the United Kingdom, Cyber Security Strategy, pp. 12f

    Google Scholar 

  29. Swedish Civil Contingency Agency. Information Security in Sweden: Situational Assessment 2008. MSB, Karlstad, p. 3 (2008)

    Google Scholar 

  30. US Government, Cyberspace Policy Review, p. 2; Ministry of Defence of Estonia, Cyber Security Strategy of Estonia, p.10

    Google Scholar 

  31. US Government, Cyberspace Policy Review, p. 1

    Google Scholar 

  32. Swedish Civil Contingency Agency, Information Security in Sweden, p. 3

    Google Scholar 

  33. Cabinet Office of the United Kingdom , Cyber Security Strategy, pp. 14

    Google Scholar 

  34. US Government, Cyberspace Policy Review, p. 8

    Google Scholar 

  35. Ministry of Defence of Estonia, Cyber Security Strategy of Estonia, p.8

    Google Scholar 

  36. Ibid

    Google Scholar 

  37. Ibid.: p. vii

    Google Scholar 

  38. Cabinet Office of the United Kingdom, Cyber Security Strategy, pp. 12ff

    Google Scholar 

  39. Ministry of Defence of Estonia, Cyber Security Strategy of Estonia, p.10

    Google Scholar 

  40. Swedish Civil Contingency Agency, Information Security in Sweden, p. 17

    Google Scholar 

  41. Ministry of Defence of Estonia, Cyber Security Strategy of Estonia, p.17

    Google Scholar 

  42. Cabinet Office of the United Kingdom, Cyber Security Strategy, p. 12; Ministry of Defence of Estonia, Cyber Security Strategy of Estonia, p.10; Swedish Civil Contingency Agency, Information Security in Sweden, p. 17

    Google Scholar 

  43. President’s Commission on Critical Infrastructure Protection, Critical Foundations, p. x

    Google Scholar 

  44. US Government, Cyberspace Policy Review, p. 18

    Google Scholar 

  45. Dunn Cavelty, M., Suter, M.: Public-Private Partnerships are no Silver Bulled: An Expanded Governance Model For Critical Infrastructure Protection. International Journal of Critical Infrastructure Protection 2(4), 179–187 (2009)

    Article  Google Scholar 

  46. US Government, Cyberspace Policy Review, p. 38

    Google Scholar 

  47. Commission of the European Communities. Protecting Europe from Large Scale Cyber-attacks and Disruptions: Enhancing Preparedness, Security and Resilience. Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of Regions, Brussels, p. 6. (2009)

    Google Scholar 

  48. Ministry of Defence of Estonia, Cyber Security Strategy of Estonia, p.15

    Google Scholar 

  49. Cabinet Office of the United Kingdom , Cyber Security Strategy, p. 9

    Google Scholar 

  50. Obama followed this suggestion and appointed Howard Schmidt as the first cybersecurity coordinator of the White House in December 2009. Cf. The White House Blog (December 22, 2009), http://www.whitehouse.gov/blog/2009/12/22/introducing-new-cybersecurity-coordinator

  51. Up to now (Spring 2010) this center is still planned but not yet implemented. Cf. Infosecurity Magazine (March 12 2010), http://www.infosecurity-magazine.com/view/8020/uk-government-cyber-security-operations-centre-going-live-soon/

  52. Cabinet Office of the United Kingdom , Cyber Security Strategy, p. 16

    Google Scholar 

  53. President’s Commission on Critical Infrastructure Protection, Critical Foundations, p. xi

    Google Scholar 

  54. US Government, Cyberspace Policy Review, pp. 13f

    Google Scholar 

  55. Cabinet Office of the United Kingdom, Cyber Security Strategy, p. 18

    Google Scholar 

  56. Ministry of Defence of Estonia, Cyber Security Strategy of Estonia, p. 34

    Google Scholar 

  57. Portnoy, M., Goodman, S.: Global Initiatives to Secure Cyberspace. An Emerging Landscape. Springer, New York (2009)

    Book  Google Scholar 

  58. NATO Parliamentary Assembly. NATO and Cyber Defence. Committee Report of the 2009 Annual Session, Bruxelles, §38 (2009)

    Google Scholar 

  59. Such as, e.g: Department of Homeland Security. Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization and Protection. US Government Printing Office, Washington DC (2003)

    Google Scholar 

  60. Ann Brown, K.: Critical Path. A Brief History of Critical Infrastructure Protection in the, p. 82. George Mason University, Washington DC (2006)

    Google Scholar 

  61. https://www.navi-online.nl/content/24/SOVI+werkgroep (in Dutch)

  62. http://www.dhs.gov/files/committees/editorial_0353.shtm

  63. http://www.tisn.gov.au/www/tisn/content.nsf/Page/The_TISN

  64. http://www.dhs.gov/files/programs/gc_1179866197607.shtm

  65. Bundesministerium des Innern, Umsetzungsplan KRITIS.

    Google Scholar 

  66. http://www.itaa.org/information-security

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Dunn Cavelty, M., Suter, M. (2012). The Art of CIIP Strategy: Tacking Stock of Content and Processes. In: Lopez, J., Setola, R., Wolthusen, S.D. (eds) Critical Infrastructure Protection. Lecture Notes in Computer Science, vol 7130. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28920-0_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28920-0_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28919-4

  • Online ISBN: 978-3-642-28920-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics