Security Protection for Critical Infrastructure

Security Protection for Critical Infrastructure

M. J. Warren
Copyright: © 2007 |Pages: 7
ISBN13: 9781591409878|ISBN10: 159140987X|EISBN13: 9781591409885
DOI: 10.4018/978-1-59140-987-8.ch089
Cite Chapter Cite Chapter

MLA

Warren, M. J. "Security Protection for Critical Infrastructure." Encyclopedia of Information Ethics and Security, edited by Marian Quigley, IGI Global, 2007, pp. 609-615. https://doi.org/10.4018/978-1-59140-987-8.ch089

APA

Warren, M. J. (2007). Security Protection for Critical Infrastructure. In M. Quigley (Ed.), Encyclopedia of Information Ethics and Security (pp. 609-615). IGI Global. https://doi.org/10.4018/978-1-59140-987-8.ch089

Chicago

Warren, M. J. "Security Protection for Critical Infrastructure." In Encyclopedia of Information Ethics and Security, edited by Marian Quigley, 609-615. Hershey, PA: IGI Global, 2007. https://doi.org/10.4018/978-1-59140-987-8.ch089

Export Reference

Mendeley
Favorite

Abstract

Understanding and managing information infrastructure (II) security risks is a priority to most organizations dealing with information technology and information warfare (IW) scenarios today (Libicki, 2000). Traditional security risk analysis (SRA) was well suited to these tasks within the paradigm of computer security, where the focus was on securing tangible items such as computing and communications equipment (NCS,1996; Cramer, 1998). With the growth of information interchange and reliance on information infrastructure, the ability to understand where vulnerabilities lie within an organization, regardless of size, has become extremely difficult (NIPC, 1996). To place a value on the information that is owned and used by an organization is virtually an impossible task. The suitability of risk analysis to assist in managing IW and information infrastructure-related security risks is unqualified, however studies have been undertaken to build frameworks and methodologies for modeling information warfare attacks (Molander, Riddile, & Wilson, 1996; Johnson, 1997; Hutchinson & Warren, 2001) which will assist greatly in applying risk analysis concepts and methodologies to the burgeoning information technology security paradigm, information warfare.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.