Reference Hub2
Risk Assessment of Multi-Order Dependencies between Critical Information and Communication Infrastructures

Risk Assessment of Multi-Order Dependencies between Critical Information and Communication Infrastructures

Panayiotis Kotzanikolaou, Marianthi Theoharidou, Dimitris Gritzalis
ISBN13: 9781466629646|ISBN10: 1466629649|EISBN13: 9781466629653
DOI: 10.4018/978-1-4666-2964-6.ch008
Cite Chapter Cite Chapter

MLA

Kotzanikolaou, Panayiotis, et al. "Risk Assessment of Multi-Order Dependencies between Critical Information and Communication Infrastructures." Critical Information Infrastructure Protection and Resilience in the ICT Sector, edited by Paul Théron and Sandro Bologna, IGI Global, 2013, pp. 153-172. https://doi.org/10.4018/978-1-4666-2964-6.ch008

APA

Kotzanikolaou, P., Theoharidou, M., & Gritzalis, D. (2013). Risk Assessment of Multi-Order Dependencies between Critical Information and Communication Infrastructures. In P. Théron & S. Bologna (Eds.), Critical Information Infrastructure Protection and Resilience in the ICT Sector (pp. 153-172). IGI Global. https://doi.org/10.4018/978-1-4666-2964-6.ch008

Chicago

Kotzanikolaou, Panayiotis, Marianthi Theoharidou, and Dimitris Gritzalis. "Risk Assessment of Multi-Order Dependencies between Critical Information and Communication Infrastructures." In Critical Information Infrastructure Protection and Resilience in the ICT Sector, edited by Paul Théron and Sandro Bologna, 153-172. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-2964-6.ch008

Export Reference

Mendeley
Favorite

Abstract

Assessing risk in information and communication infrastructures is a challenging topic due to the complexity of critical infrastructures (CIs) and of the various dependencies between such infrastructures. This chapter discusses the basic concepts of risk assessment for CIs. Moreover, it describes a recently proposed methodology for criticality assessment. The main goal of this methodology is to assess the risk of an infrastructure (or a sector of critical infrastructures), taking into account the dependencies between CIs and/or sectors. The methodology is compatible with current information systems practices. The basic characteristic of the presented methodology is that it attempts to capture both organization-oriented and society-oriented consequences of possible security events, a feature which is not always embedded in mainstream information security risk assessment methodologies.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.