293,064 research outputs found

    The Role of Public and Private Sectors: How to Promote National Cybersecurity Strategies and Critical Infrastructure Protection in Southeastern Europe

    Get PDF
    This paper seeks to address the important role of public and private interests in protecting critical infrastructure in Southeastern Europe, providing examples from Serbia. While the public sector does have a role in protecting critical infrastructure needs, it is the private sector which holds major oversight of the critical infrastructures of the region, therefore having an important role in maintaining their functionality and protection. The literature in this field argues for more collaboration and information sharing between the public and private sectors of the region, though the task is not as simple as it appears given the varying aspirations of each country and their approaches to critical infrastructure protection and designation. The main argument of this paper calls for tailored approaches to public and private sector cooperation in each country with some oversight from a regional agency meant for general guidance. The tailored approach provides for a more effective solution as it considers the needs of each individual country, looks at the existing situation in each country, and provides for more effective collaboration between public and private sectors. For this paper, field experts also provided an overview of the current cybersecurity situation in the region, the roles of public and private sectors, and what can be done moving forward. This information serves to explain the main argument and why the tailored approach is needed to improve the state of cyber critical infrastructure in the region in light of current and emerging threats, which are also discussed

    Australian commercial-critical infrastructure management protection

    Full text link
    Secure management of Australia\u27s commercial critical infrastructure presents ongoing challenges to owners and the government. Although managed via a high-level information sharing collaboration of government and business, critical infrastructure protection is further complicated by the lack of a lower-level scalable model exhibiting its various levels, sectors and sub-sectors. This research builds on the work of Marasea (2003) to establish a descriptive critical infrastructure model and also considers the influence and proposed modelling of critical infrastructure dependency inter-relationships.<br /

    Technical Report on Deploying a highly secured OpenStack Cloud Infrastructure using BradStack as a Case Study

    Full text link
    Cloud computing has emerged as a popular paradigm and an attractive model for providing a reliable distributed computing model.it is increasing attracting huge attention both in academic research and industrial initiatives. Cloud deployments are paramount for institution and organizations of all scales. The availability of a flexible, free open source cloud platform designed with no propriety software and the ability of its integration with legacy systems and third-party applications are fundamental. Open stack is a free and opensource software released under the terms of Apache license with a fragmented and distributed architecture making it highly flexible. This project was initiated and aimed at designing a secured cloud infrastructure called BradStack, which is built on OpenStack in the Computing Laboratory at the University of Bradford. In this report, we present and discuss the steps required in deploying a secured BradStack Multi-node cloud infrastructure and conducting Penetration testing on OpenStack Services to validate the effectiveness of the security controls on the BradStack platform. This report serves as a practical guideline, focusing on security and practical infrastructure related issues. It also serves as a reference for institutions looking at the possibilities of implementing a secured cloud solution.Comment: 38 pages, 19 figures

    Foreword

    Get PDF

    Autonomic computing architecture for SCADA cyber security

    Get PDF
    Cognitive computing relates to intelligent computing platforms that are based on the disciplines of artificial intelligence, machine learning, and other innovative technologies. These technologies can be used to design systems that mimic the human brain to learn about their environment and can autonomously predict an impending anomalous situation. IBM first used the term ‘Autonomic Computing’ in 2001 to combat the looming complexity crisis (Ganek and Corbi, 2003). The concept has been inspired by the human biological autonomic system. An autonomic system is self-healing, self-regulating, self-optimising and self-protecting (Ganek and Corbi, 2003). Therefore, the system should be able to protect itself against both malicious attacks and unintended mistakes by the operator

    The power of creative thinking in situations of uncertainties: the almost impossible task of protecting critical infrastructures

    Get PDF
    A good and scientific analysis starts with a closer look at the conceptualisation at hand. The definition of CIP is not easy because of its wide range. This paper examines infrastructures that are critical and need protection. Each word entails a specific connotation and is characterized by several components
    • …
    corecore