293,064 research outputs found
The Role of Public and Private Sectors: How to Promote National Cybersecurity Strategies and Critical Infrastructure Protection in Southeastern Europe
This paper seeks to address the important role of public and private interests in protecting critical infrastructure in Southeastern Europe, providing examples from Serbia. While the public sector does have a role in protecting critical infrastructure needs, it is the private sector which holds major oversight of the critical infrastructures of the region, therefore having an important role in maintaining their functionality and protection. The literature in this field argues for more collaboration and information sharing between the public and private sectors of the region, though the task is not as simple as it appears given the varying aspirations of each country and their approaches to critical infrastructure protection and designation. The main argument of this paper calls for tailored approaches to public and private sector cooperation in each country with some oversight from a regional agency meant for general guidance. The tailored approach provides for a more effective solution as it considers the needs of each individual country, looks at the existing situation in each country, and provides for more effective collaboration between public and private sectors. For this paper, field experts also provided an overview of the current cybersecurity situation in the region, the roles of public and private sectors, and what can be done moving forward. This information serves to explain the main argument and why the tailored approach is needed to improve the state of cyber critical infrastructure in the region in light of current and emerging threats, which are also discussed
Recommended from our members
The Department of Homeland Security Intelligence Enterprise: Operational Overview and Oversight Challenges for Congress
This report provides an overview of the DHS IE both at headquarters and within the components. It examines how DHS IE is organized and supports key departmental activities to include homeland security analysis and threat warning; border security; critical infrastructure protection; support to, and the sharing of information with, state, local, tribal, and private sector partners. It also discusses several oversight challenges and options for Congress to consider on these issues
Australian commercial-critical infrastructure management protection
Secure management of Australia\u27s commercial critical infrastructure presents ongoing challenges to owners and the government. Although managed via a high-level information sharing collaboration of government and business, critical infrastructure protection is further complicated by the lack of a lower-level scalable model exhibiting its various levels, sectors and sub-sectors. This research builds on the work of Marasea (2003) to establish a descriptive critical infrastructure model and also considers the influence and proposed modelling of critical infrastructure dependency inter-relationships.<br /
Technical Report on Deploying a highly secured OpenStack Cloud Infrastructure using BradStack as a Case Study
Cloud computing has emerged as a popular paradigm and an attractive model for
providing a reliable distributed computing model.it is increasing attracting
huge attention both in academic research and industrial initiatives. Cloud
deployments are paramount for institution and organizations of all scales. The
availability of a flexible, free open source cloud platform designed with no
propriety software and the ability of its integration with legacy systems and
third-party applications are fundamental. Open stack is a free and opensource
software released under the terms of Apache license with a fragmented and
distributed architecture making it highly flexible. This project was initiated
and aimed at designing a secured cloud infrastructure called BradStack, which
is built on OpenStack in the Computing Laboratory at the University of
Bradford. In this report, we present and discuss the steps required in
deploying a secured BradStack Multi-node cloud infrastructure and conducting
Penetration testing on OpenStack Services to validate the effectiveness of the
security controls on the BradStack platform. This report serves as a practical
guideline, focusing on security and practical infrastructure related issues. It
also serves as a reference for institutions looking at the possibilities of
implementing a secured cloud solution.Comment: 38 pages, 19 figures
Autonomic computing architecture for SCADA cyber security
Cognitive computing relates to intelligent computing platforms that are based on the disciplines of artificial intelligence, machine learning, and other innovative technologies. These technologies can be used to design systems that mimic the human brain to learn about their environment and can autonomously predict an impending anomalous situation. IBM first used the term ‘Autonomic Computing’ in 2001 to combat the looming complexity crisis (Ganek and Corbi, 2003). The concept has been inspired by the human biological autonomic system. An autonomic system is self-healing, self-regulating, self-optimising and self-protecting (Ganek and Corbi, 2003). Therefore, the system should be able to protect itself against both malicious attacks and unintended mistakes by the operator
The power of creative thinking in situations of uncertainties: the almost impossible task of protecting critical infrastructures
A good and scientific analysis starts with a closer look at the conceptualisation at hand. The definition of CIP is not easy because of its wide range. This paper examines infrastructures that are critical and need protection. Each word entails a specific connotation and is characterized by several components
- …