Share This Article:

Computer – Based Infrastructure Sector Interdependencies and Security Implications

Abstract Full-Text HTML Download Download as PDF (Size:44KB) PP. 735-738
DOI: 10.4236/ijcns.2011.411090    2,933 Downloads   5,245 Views  

ABSTRACT

Traditionally, the analysis of sector interdependencies has involved the characterization of all infrastructure-to-infrastructure interconnections and some of the main infrastructure integrals that, once lost or be tampered with, will compromise the performance and security issues with the other interconnected infrastructures. Therefore, the paper dwells much on the security implications which may be associated with these infrastructure sector interdependencies. This paper also discusses some of the major risk considerations, analytical approaches, researches and the necessary developments needed as well as the interdisciplinary ranges through which the necessary skills are required in the construction of comprehensive sector interdependencies.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

A. Obukohwo, "Computer – Based Infrastructure Sector Interdependencies and Security Implications," International Journal of Communications, Network and System Sciences, Vol. 4 No. 11, 2011, pp. 735-738. doi: 10.4236/ijcns.2011.411090.

References

[1] J. Sullivant, “Strategies for Protecting National Critical Assets,” Wiley, New York, 2007. doi:10.1002/9780470228371
[2] J. Bullock and D. Haddow, “Introduction to Homeland Security,” New Jersey: Prentice Hall, Upper Saddle River, 2006.
[3] M. Amin “Toward Self-Healing Infrastructure Systems,” IEEE Computer Application Power, Vol. 33, No. 8, 2000, pp. 45-53.
[4] Y. Haimes, “Risk Modeling, Assessment, and Manage- ment,” John Wiley & Sons, New York, 1998.
[5] Y. Haimes and P. Jiang, “Leontief-Based Model of Risk in Complex Interconnected Infrastructures,” Journal of Infrastructure Systems, Vol. 7, No. 1, 2001, pp. 23-27. doi:10.1061/(ASCE)1076-0342(2001)7:1(1)
[6] S. Rosenbush, “Satellites’s Death Puts Millions out of Touch,” USA Today, May 1998. www.ieeexplore.ieee.org
[7] D. Verton, “Black Ice: The Invisible Threat of Cyberterrorism,” McGraw Hill, Upper Saddle River, 2003.
[8] J. Willenssen, “Critical Infrastructure Protection Signify- cant Challenges in Safeguarding Interdependences,” Oxford University Press, Oxford, 2007.

  
comments powered by Disqus

Copyright © 2018 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.