2007
DOI: 10.1016/j.ress.2006.08.006
|View full text |Cite
|
Sign up to set email alerts
|

Safeguarding information intensive critical infrastructures against novel types of emerging failures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(8 citation statements)
references
References 10 publications
0
8
0
Order By: Relevance
“…The research is motivated by the creation of the CI sectors, which are described by the Department of Homeland Security (DHS) (Department of Homeland Security, 2014), as well as the need to strengthen and secure the nation's CI resources, as described in Presidential Policy Directive (PPD) 21 (President, 2013). The need to perform such analysis that focuses on the interdependencies of the resources stems from systems becoming more interlinked and dependent on each other, described by Balducelli et al (2007). This will motivate the needs to evaluate both the directionality and impact of the interdependencies.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The research is motivated by the creation of the CI sectors, which are described by the Department of Homeland Security (DHS) (Department of Homeland Security, 2014), as well as the need to strengthen and secure the nation's CI resources, as described in Presidential Policy Directive (PPD) 21 (President, 2013). The need to perform such analysis that focuses on the interdependencies of the resources stems from systems becoming more interlinked and dependent on each other, described by Balducelli et al (2007). This will motivate the needs to evaluate both the directionality and impact of the interdependencies.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The latter, incorporating the traditional risk and reliability importance measures, defined criticality as the combination of probability and importance (risk contribution) (Jenelius et al, 2006; van der Borst and Schoonakker, 2001). With the presentation of the difficulty of determining probabilities that terrorists would actually exploit a given vulnerability, vulnerability analysis has recently shown a special focus on critical infrastructures (Gheorghe et al, 2006;Johnson, 2007;Patterson and Apostolakis, 2007;Balducelli et al, 2007). However, care has to be taken when using vulnerability alone as a criticality parameter given that it might significantly vary with initiating events (i.e.…”
Section: Security Risk Assessmentmentioning
confidence: 99%
“…A computer-based simulation of a SCADA system [15] is realized and configured by Italian National Agency for New Technology (ENEA) through a set of computer machines connected to a LAN. Each machine is developed to simulate a specific functionality of a specific SCADA system.…”
Section: Scada Systemmentioning
confidence: 99%