{"title":"调查关键基础设施的潜在漏洞和前进方向-加强安全性和弹性的建议","authors":"","doi":"10.33140/bscr.02.01.03","DOIUrl":null,"url":null,"abstract":"In this research, firstly critical infrastructures (CIs) that are found in Ethiopia are identified. Then, potential security vulnerabilities of these CIs are identified by performing strategic and tactical level risk and vulnerability assessments. To perform the stated assessments, questionnaires were prepared using different standards. Moreover, on-site interviews, existing document and literature reviews were conducted. By performing the above research methodologies, the security vulnerabilities of selected CIs were thoroughly investigated. Finally, factors that contribute to the security vulnerabilities are critically identified and way forward recommendations are given to fill the identified security gaps and vulnerabilities.","PeriodicalId":72393,"journal":{"name":"Biomedical science and clinical research","volume":"23 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Investigating Potential Vulnerability of Critical Infrastructure and Way Forward – Recommendations to Enhance Security and Resilience\",\"authors\":\"\",\"doi\":\"10.33140/bscr.02.01.03\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this research, firstly critical infrastructures (CIs) that are found in Ethiopia are identified. Then, potential security vulnerabilities of these CIs are identified by performing strategic and tactical level risk and vulnerability assessments. To perform the stated assessments, questionnaires were prepared using different standards. Moreover, on-site interviews, existing document and literature reviews were conducted. By performing the above research methodologies, the security vulnerabilities of selected CIs were thoroughly investigated. Finally, factors that contribute to the security vulnerabilities are critically identified and way forward recommendations are given to fill the identified security gaps and vulnerabilities.\",\"PeriodicalId\":72393,\"journal\":{\"name\":\"Biomedical science and clinical research\",\"volume\":\"23 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-01-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Biomedical science and clinical research\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.33140/bscr.02.01.03\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Biomedical science and clinical research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.33140/bscr.02.01.03","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Investigating Potential Vulnerability of Critical Infrastructure and Way Forward – Recommendations to Enhance Security and Resilience
In this research, firstly critical infrastructures (CIs) that are found in Ethiopia are identified. Then, potential security vulnerabilities of these CIs are identified by performing strategic and tactical level risk and vulnerability assessments. To perform the stated assessments, questionnaires were prepared using different standards. Moreover, on-site interviews, existing document and literature reviews were conducted. By performing the above research methodologies, the security vulnerabilities of selected CIs were thoroughly investigated. Finally, factors that contribute to the security vulnerabilities are critically identified and way forward recommendations are given to fill the identified security gaps and vulnerabilities.