Abstract
The importance of Critical Information Infrastructure Protection (CIIP) cannot be overlooked, as many critical systems utilise information infrastructures in order to operate. However, should these information infrastructures be targeted by cyber attacks, it would severely affect the effectiveness of many of these critical systems. Attacks on information infrastructures are not be limited to a single geographic location, all nations suffer from a collective vulnerability through interconnection, and as such nobody is immune to cyber attacks. Many nations have created internal structures to manage and react to cyber attacks on their information infrastructure. However, these structures might not always be suitable to deploy in areas where there is no CIIP mechanisms in place. In this paper we aim to present a model for a CIIP structure that will provide protection for critical information infrastructures in a manner that is cost-effective and focused on the gradual, effective deployment of a CIIP structure.
Chapter PDF
References
Ahamad, M.: Emerging Cyber Threats Report for 2009. Tech. rep., Georgia Tech Information Security Center (2008), http://www.gtiscsecuritysummit.com/pdf/CyberThreatsReport2009.pdf
Brownlee, N., Guttman, E.: RFC2350: Expectations for Computer Security Incident Response. RFC (June 1998), http://www.ietf.org/rfc/rfc2350.txt
Drummond, D.: A new approach to China. Electronic (January 2010), http://googleblog.blogspot.com/2010/01/new-approach-to-china.html
ENISA: Baseline capabilities for national / governmental CERTs. Tech. Rep. (December 2009), http://www.enisa.europa.eu/act/cert/support/baseline-capabilities
Harrison, J., Towsend, K.: An Update on WARPs. ENISA Quarterly Review 4(4), 13–14 (2008), http://www.warp.gov.uk/Marketing/enisa_quarterly_12_08.pdf
ICANN: Factsheet: Root server attack on 6 February 2007. Electronic (March 2007), http://www.icann.org/announcements/factsheet-dns-attack-08mar07.pdf
Korns, S., Kastenberg, J.: Georgia’s Cyber Left Hook. Parameters 38, 60–76 (2008), http://www.carlisle.army.mil/usawc/Parameters/08winter/korns.pdf
Kossakowski, K., Stikvoort, D.: A Trusted CSIRT Introducer in Europe. M&I/Stelvio, Amersfoort, The Netherlands, 2nd edn. (February 2000), http://www.kossakowski.de/ti-v2.pdf
Richards, J.: Denial-of-Service: The Estonian Cyberwar and Its Implications for U.S. National Security. International Affairs Review 18(2) (2009), http://www.iar-gwu.org/node/65
Vixie, P., Sneeringer, G., Schleifer, M.: Events of October 21, 2002. Electronic (November 2002), http://d.root-servers.org/october21.txt
West-Brown, M., Stikvoort, D., Kossakowski, K., Killcrece, G., Ruefle, R., Zajicek, M.: Handbook for Computer Security Response Teams (CSIRTs), 2nd edn. Carnegie Mellon Software Engineering Institute, Pittsburgh (April 2003), http://www.cert.org/archive/pdf/csirt-handbook.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 IFIP
About this paper
Cite this paper
Ellefsen, I., von Solms, S. (2010). C-SAW: Critical Information Infrastructure Protection through Simplification. In: Berleur, J., Hercheui, M.D., Hilty, L.M. (eds) What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience. HCC CIP 2010 2010. IFIP Advances in Information and Communication Technology, vol 328. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15479-9_30
Download citation
DOI: https://doi.org/10.1007/978-3-642-15479-9_30
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-15478-2
Online ISBN: 978-3-642-15479-9
eBook Packages: Computer ScienceComputer Science (R0)