IEEE Invited Paper - An Overview of Cyber Security Considerations and Vulnerabilities in Critical Infrastructure Systems and Potential Automated Mitigation - A Review

R. Mazzolin, Asad Madni
{"title":"IEEE Invited Paper - An Overview of Cyber Security Considerations and Vulnerabilities in Critical Infrastructure Systems and Potential Automated Mitigation - A Review","authors":"R. Mazzolin, Asad Madni","doi":"10.55708/js0104002","DOIUrl":null,"url":null,"abstract":": Executive leadership in government, military and industry are faced with many difficult challenges when trying to understand the complex interaction of public and government security policies, the vulnerabilities in the wide array of key technologies supporting critical infrastructure upon which society is vitally dependent, and the identification of key cyber security trends that will need to be considered in the future. This invited paper discusses public policy issues related to the threat environment and provides a comprehensive description of the various cyber vulnerabilities and risks arising from a broad range of technologies supporting critical infrastructure and highlights key requirements and design principles desired from next generation automated defence capabilities. This document provides a unique review of key aspects related to these separate but interrelated subject areas that will hopefully provide greater context, background and clarity for senior decision makers responsible for shaping development agendas for their organizations.","PeriodicalId":156864,"journal":{"name":"Journal of Engineering Research and Sciences","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Engineering Research and Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.55708/js0104002","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

: Executive leadership in government, military and industry are faced with many difficult challenges when trying to understand the complex interaction of public and government security policies, the vulnerabilities in the wide array of key technologies supporting critical infrastructure upon which society is vitally dependent, and the identification of key cyber security trends that will need to be considered in the future. This invited paper discusses public policy issues related to the threat environment and provides a comprehensive description of the various cyber vulnerabilities and risks arising from a broad range of technologies supporting critical infrastructure and highlights key requirements and design principles desired from next generation automated defence capabilities. This document provides a unique review of key aspects related to these separate but interrelated subject areas that will hopefully provide greater context, background and clarity for senior decision makers responsible for shaping development agendas for their organizations.
IEEE特邀论文-关键基础设施系统中的网络安全考虑和漏洞以及潜在的自动化缓解概述-综述
在试图理解公共和政府安全政策的复杂相互作用、支持社会至关重要的关键基础设施的各种关键技术的脆弱性以及确定未来需要考虑的关键网络安全趋势时,政府、军事和工业的行政领导面临着许多困难的挑战。这篇特邀论文讨论了与威胁环境相关的公共政策问题,并全面描述了支持关键基础设施的广泛技术所产生的各种网络漏洞和风险,并强调了下一代自动化防御能力所需的关键要求和设计原则。本文件对与这些独立但相互关联的主题领域相关的关键方面进行了独特的回顾,希望能为负责为其组织制定发展议程的高级决策者提供更大的背景、背景和清晰度。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信