Advertisement

Critical Infrastructure Protection in Brazil - Threat Identification and Analysis

  • João H. A. Franco
  • Sérgio L. Ribeiro
  • Sandra M. C. Tome
  • Christiane M. S. Cuculo
  • Marcos B. Trindade
  • Leonardo M. Lage
  • Regina M. F. Souza
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6027)

Abstract

This paper describes the Methodology for Threat Identification and Analysis (MIdA2) and its application to Brazil’s critical telecommunication infrastructure. As this effort is part of a bigger project, Brazil’s critical telecommunication infrastructure protection, other methodologies related to MIdA2 are also briefly presented to give the reader a broader perspective.

Keywords

Critical telecommunication infrastructure protection vulnerability identification impact assessment risk assessment 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Alberts, C.J., Behrens, S.G., Pethia, R.D., Wilson, W.R.: Operationally Critical Threat, Asset, and Vulnerability Evaluation SM (OCTAVESM) Framework, Version 1.0 (CMU/SEI-99-TR-017). Software Engineering Institute, Carnegie Mellon University, Pittsburgh, USA (1999)Google Scholar
  2. 2.
    CCTA Risk Analysis and Management Method-CRAMM, http://www.cramm.com
  3. 3.
    Vidalis, S., Blyth, A.: Understanding and Developing a Threat Assessment Model, http://www.glam.ac.uk/socschool/research/publications/technical/CS-02-3.pdf
  4. 4.
    Franco, J.H.A., Ribeiro, S.L.: Estratégia de proteção da infraestrutura crítica de telecomunicações. CPqD Internal Report, Campinas, Brazil (2008)Google Scholar
  5. 5.
    Souza, R.M.F.: Critical telecommunication infrastructure protection project. info@CITEL, vol. 33 (2007), http://www.citel.oas.org/newsletter/2007/marzo/infraestructura_i.asp
  6. 6.
    Ribeiro, S.L., Nakamura, E.T., Bezerra, E.K.: Critical Infrastructure Protection in Brazil. In: 1st IEEE International Workshop on Critical Infrastructure Protection, Darmstadt, Germany (2005)Google Scholar
  7. 7.
    ISO/IEC 17799:2005. Information technology. Code of practice for information security management. International Organization for Standardization-ISO, Geneva, Switzerland (2005)Google Scholar
  8. 8.
    Critical Telecommunication Infrastructure Protection – Application of MI2C. Contribution CCP.I-TEL 1095/07. Inter-American Telecommunication Commission-CITEL, Mendoza, Argentina (2007)Google Scholar
  9. 9.
    Critical Telecommunication Infrastructure Protection in Brazil – Application of MI2C. Contribution CCP.I-TEL 1448/08. Inter-American Telecommunication Commission-CITEL, Puerto Iguazu, Argentina (2008)Google Scholar
  10. 10.
    IPCC terminology about certainty, http://www.sej.org/resource/IPCC_terminology.htm

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • João H. A. Franco
    • 1
  • Sérgio L. Ribeiro
    • 1
  • Sandra M. C. Tome
    • 1
  • Christiane M. S. Cuculo
    • 1
  • Marcos B. Trindade
    • 1
  • Leonardo M. Lage
    • 1
  • Regina M. F. Souza
    • 2
  1. 1.Fundação CPqD – Centro de Pesquisa e Desenvolvimento em TelecomunicaçõesCampinasBrazil
  2. 2.Agência Nacional de Telecomunicações – AnatelBrasíliaBrazil

Personalised recommendations