Advertisement

Overview of Critical Information Infrastructure Protection

  • Javier Lopez
  • Roberto Setola
  • Stephen D. Wolthusen
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7130)

Abstract

The present volume aims to provide an overview of the current understanding of the so-called Critical Infrastructure (CI), and particularly the Critical Information Infrastructure (CII), which not only forms one of the constituent sectors of the overall CI, but also is unique in providing an element of interconnection between sectors as well as often also intra-sectoral control mechanisms.

One problem faced by research on C(I)I is the extreme range of scales at which security problems may arise. This is true for the time dimension where policy-level decisions such as the deployment of physical infrastructure like roads and high-tension transmission lines have impacts measured in decades whilst industrial control systems must provide guaranteed and secure real-time responses in the millisecond range. It is, moreover, also the case for the physical extent of infrastructures where single physical facilities such as vaccine plants may be a vital element of national or supra-national infrastructures, but where the trans-national electrical power or natural gas transmission networks span entire continents.

The book hence surveys not only key high-level concepts and selected technical research areas with an emphasis on control systems as a highly active research area, but also seeks to include policy aspects as well as a discussion on models for validation and verification. This is rounded off by several studies of specific issues and challenges faced by individual CI sectors including the telecommunications, electricity, transportation, and financial services sectors.

Keywords

Smart Grid Critical Infrastructure Next Generation Network Infrastructure Protection SCADA System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Albert, R., Albert, I., Nakarado, G.L.: Structural Vulnerability of the North American Power Grid. Physical Review E – Statistical, Nonlinear, and Soft Matter Physics 69(2), 025103 (2004), doi:10.1103/PhysRevE.69.025103CrossRefGoogle Scholar
  2. 2.
    Albert, R., Jeong, H., Barabási, A.L.: Error and Attack Tolerance of Complex Networks. Nature 406, 378–382 (2000), doi:10.1038/35019019CrossRefGoogle Scholar
  3. 3.
    Brömmelhörster, J., Fabry, S., Wirtz, N. (eds.): Internationale Aktivitäten zum Schutz Kritischer Infrastrukturen. Bundesamt für Sicherheit in der Informationstechnik, Bonn, Germany (2004)Google Scholar
  4. 4.
    Cohen, R., Erez, K., ben Avraham, D., Havlin, S.: Breakdown of the Internet under Intentional Attack. Physical Review Letters 86(16), 3682–3685 (2001), doi:10.1103/PhysRevLett.86.3682CrossRefGoogle Scholar
  5. 5.
    Falliere, N., Murchu, L., Chien, E.: Stuxnet Dossier. Symantec Security Response (2011)Google Scholar
  6. 6.
    Marsh, R.T. (ed.): Critical Infrastructures: Protecting America’s Infrastructures. United States Government Printing Office, Washington D.C., USA (1997); Report of the President’s Commission on Critical Infrastructure ProtectionGoogle Scholar
  7. 7.
    United States Department of Defense: Department of Defense Strategy for Operating in Cyberspace. U.S. Government Printing Office (2011)Google Scholar
  8. 8.
    Wenger, A., Mauer, V., Dunn, M. (eds.): International CIIP Handbook 2008/2009. Center for Security Studies, ETH Zurich, Zurich, Switzerland (2008)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Javier Lopez
    • 1
  • Roberto Setola
    • 2
  • Stephen D. Wolthusen
    • 3
    • 4
  1. 1.Computer Science Department, E.T.S. Ingenieria InformaticaUniversity of MalagaMalagaSpain
  2. 2.Faculty of EngineeringUniversitá Campus Bio-Medico di RomaRomeItaly
  3. 3.Department of MathematicsRoyal Holloway, University of LondonEghamUnited Kingdom
  4. 4.Norwegian Information Security LaboratoryGjøvik University CollegeGjøvikNorway

Personalised recommendations