Critical Information Infrastructure Protection (CIIP): Draft technical Report for the Australian Institute of Criminology
This chapter aims to examine vulnerability in Australia’s critical infrastructure assets and examine to what extent cyber-criminals or cyber-terrorists are able to manipulate or exploit weaknesses in the protection of these crucial services. Critical infrastructure is defined, followed by a consideration of the threats to the critical information infrastructure. The focus is on information communication technology (ICT) and the effectiveness of existing and potential countermeasures. Comprehensive Critical Information Infrastructure Protection (CIIP) planning processes have now been produced by many countries and best practices have emerged. The Crisis and Risk Network (CRN) CIIP Handbook and the situation reports of MELANI (the Swiss Agency ‘Reporting and Analysis Centre for Information Assurance) are good examples of the work being done. Significant problems remain in the evaluation and assessment of the integrity of these approaches in practice. Greater attention to potential weaknesses in SCADA (supervisory control and data acquisition) systems and rigorous penetration testing is required to ensure resilience in key critical infrastructure. Coupled with high costs to private businesses a lack of follow-through, poor continuity and co-ordination plus shallow or incomplete adoption of countermeasures have been cited as major problems in developing a resilient CIIP capacity.
Impact and interest:
Citation counts are sourced monthly from and citation databases.
These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.
Citations counts from theindexing service can be viewed at the linked Google Scholar™ search.
Full-text downloads displays the total number of times this work’s files (e.g., a PDF) have been downloaded from QUT ePrints as well as the number of downloads in the previous 365 days. The count includes downloads for all files if a work has more than one.
|Keywords:||cyber crime, critical information infrastructure protection, computer, related crime, aysmetric warfare, terrorism|
|Subjects:||Australian and New Zealand Standard Research Classification > STUDIES IN HUMAN SOCIETY (160000) > CRIMINOLOGY (160200) > Criminology not elsewhere classified (160299)|
|Divisions:||Current > QUT Faculties and Divisions > Faculty of Law|
|Copyright Owner:||Copyright 2006 (The authors)|
|Deposited On:||26 Feb 2007|
|Last Modified:||09 Jun 2010 12:37|
Repository Staff Only: item control page