Critical Information Infrastructure Protection and Resilience in the ICT Sector
Title | Critical Information Infrastructure Protection and Resilience in the ICT Sector PDF eBook |
Author | Théron, Paul |
Publisher | IGI Global |
Pages | 373 |
Release | 2013-02-28 |
Genre | Business & Economics |
ISBN | 1466629657 |
With the progression of technological breakthroughs creating dependencies on telecommunications, the internet, and social networks connecting our society, CIIP (Critical Information Infrastructure Protection) has gained significant focus in order to avoid cyber attacks, cyber hazards, and a general breakdown of services. Critical Information Infrastructure Protection and Resilience in the ICT Sector brings together a variety of empirical research on the resilience in the ICT sector and critical information infrastructure protection in the context of uncertainty and lack of data about potential threats and hazards. This book presents a variety of perspectives on computer science, economy, risk analysis, and social sciences; beneficial to academia, governments, and other organisations engaged or interested in CIIP, Resilience and Emergency Preparedness in the ICT sector.
Information Security for Global Information Infrastructures
Title | Information Security for Global Information Infrastructures PDF eBook |
Author | Sihan Qing |
Publisher | Springer |
Pages | 518 |
Release | 2013-03-09 |
Genre | Computers |
ISBN | 0387355154 |
IFIP/SEC2000, being part of the 16th IFIP World Computer Congress (WCC2000), is being held in Beijing, China from August 21 to 25, 2000. SEC2000 is the annual conference of TCll (Information Security) of the International Federation of Information Processing. The conference focuses on the seamless integration of information security services as an integral part of the Global Information Infrastructure in the new millenniUm. SEC2000 is sponsored by the China Computer Federation (CCF), IFIP/TCll, and Engineering Research Centre for Information Security Technology, Chinese Academy of Sciences (ERCIST, CAS). There were 180 papers submitted for inclusion, 50 papers among them have been accepted as long papers and included in this proceeding, 81 papers have been accepted as short papers and published in another proceeding. All papers presented in this conference were reviewed blindly by a minimum of two international reviewers. The authors' affiliations of the 180 submissions and the accepted 131 papers range over 26 and 25 countries or regions, respectively. We would like to appreciate all who have submitted papers to IFIP/SEC2000, and the authors of accepted papers for their on-time preparation of camera-ready fmal versions. Without their contribution there would be no conference. We wish to express our gratitude to all program committee members and other reviewers for their hard work in reviewing the papers in a short time and for contributing to the conference in different ways. We would like to thank Rein Venter for his time and expertise in compiling the fmal version of the proceedings.
Securing Critical Information Infrastructure
Title | Securing Critical Information Infrastructure PDF eBook |
Author | Munish Sharma |
Publisher | |
Pages | 116 |
Release | 2017 |
Genre | Computer crimes |
ISBN | 9789382169741 |
Basic services such as electricity, transportation, mobile communication and banking are the core infrastructures on which modern societies and economies rest. The seamless functioning of these critical information infrastructures is essential for the social and economic development and well-being of a nation-state. Recent developments in the cyber domain have unearthed a whole new dimension of security attributing to underlying vulnerabilities and interdependencies. The exploitation of these vulnerabilities in the different layers of cyber architecture, serve different objectives of nation-states, terror outfits and criminal syndicates. Despite the best of technology, management as well as security policies and practices at a nation-state's disposal, it is practically impossible to secure all critical elements of infrastructure against all odds. This monograph delves into the various aspects of definitions and understandings of critical information infrastructure and explores the threat actors, perspectives and trends in the emerging practice of critical information infrastructure protection.
Global Information Infrastructure
Title | Global Information Infrastructure PDF eBook |
Author | Andrzej Targowski |
Publisher | IGI Global |
Pages | 424 |
Release | 1996-01-01 |
Genre | Computers |
ISBN | 9781878289322 |
Global Information Infrastructure: The Birth, Vision and Architecture addresses three levels of the information superhighway in terms of their information content and technological implementations. This book is a futuristic view of the major components of the new global world.
Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions
Title | Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions PDF eBook |
Author | Knapp, Kenneth J. |
Publisher | IGI Global |
Pages | 458 |
Release | 2009-04-30 |
Genre | Computers |
ISBN | 1605663271 |
"This book provides a valuable resource by addressing the most pressing issues facing cyber-security from both a national and global perspective"--Provided by publisher.
Handbook of Research on Cyber Crime and Information Privacy
Title | Handbook of Research on Cyber Crime and Information Privacy PDF eBook |
Author | Cruz-Cunha, Maria Manuela |
Publisher | IGI Global |
Pages | 753 |
Release | 2020-08-21 |
Genre | Computers |
ISBN | 1799857298 |
In recent years, industries have transitioned into the digital realm, as companies and organizations are adopting certain forms of technology to assist in information storage and efficient methods of production. This dependence has significantly increased the risk of cyber crime and breaches in data security. Fortunately, research in the area of cyber security and information protection is flourishing; however, it is the responsibility of industry professionals to keep pace with the current trends within this field. The Handbook of Research on Cyber Crime and Information Privacy is a collection of innovative research on the modern methods of crime and misconduct within cyber space. It presents novel solutions to securing and preserving digital information through practical examples and case studies. While highlighting topics including virus detection, surveillance technology, and social networks, this book is ideally designed for cybersecurity professionals, researchers, developers, practitioners, programmers, computer scientists, academicians, security analysts, educators, and students seeking up-to-date research on advanced approaches and developments in cyber security and information protection.
Safety and Security Issues in Technical Infrastructures
Title | Safety and Security Issues in Technical Infrastructures PDF eBook |
Author | Rehak, David |
Publisher | IGI Global |
Pages | 499 |
Release | 2020-04-17 |
Genre | Computers |
ISBN | 1799830608 |
In the modern age of urbanization, the mass population is becoming progressively reliant on technical infrastructures. These industrial buildings provide integral services to the general public including the delivery of energy, information and communication technologies, and maintenance of transport networks. The safety and security of these structures is crucial as new threats are continually emerging. Safety and Security Issues in Technical Infrastructures is a pivotal reference source that provides vital research on the modernization of occupational security and safety practices within information technology-driven buildings. While highlighting topics such as explosion process safety, nanotechnology, and infrastructural risk analysis, this publication explores current risks and uncertainties and the raising of comprehensive awareness for experts in this field. This book is ideally designed for security managers, safety personnel, civil engineers, architects, researchers, construction professionals, strategists, educators, material scientists, property owners, and students.