Critical Information Infrastructure Protection (CIIP): Draft technical Report for the Australian Institute of Criminology

Chantler, Alan N. & Broadhurst, Roderic (2006) Critical Information Infrastructure Protection (CIIP): Draft technical Report for the Australian Institute of Criminology. (Unpublished)


This chapter aims to examine vulnerability in Australia’s critical infrastructure assets and examine to what extent cyber-criminals or cyber-terrorists are able to manipulate or exploit weaknesses in the protection of these crucial services. Critical infrastructure is defined, followed by a consideration of the threats to the critical information infrastructure. The focus is on information communication technology (ICT) and the effectiveness of existing and potential countermeasures. Comprehensive Critical Information Infrastructure Protection (CIIP) planning processes have now been produced by many countries and best practices have emerged. The Crisis and Risk Network (CRN) CIIP Handbook and the situation reports of MELANI (the Swiss Agency ‘Reporting and Analysis Centre for Information Assurance) are good examples of the work being done. Significant problems remain in the evaluation and assessment of the integrity of these approaches in practice. Greater attention to potential weaknesses in SCADA (supervisory control and data acquisition) systems and rigorous penetration testing is required to ensure resilience in key critical infrastructure. Coupled with high costs to private businesses a lack of follow-through, poor continuity and co-ordination plus shallow or incomplete adoption of countermeasures have been cited as major problems in developing a resilient CIIP capacity.

Impact and interest:

Search Google Scholar™

Citation counts are sourced monthly from Scopus and Web of Science® citation databases.

These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.

Citations counts from the Google Scholar™ indexing service can be viewed at the linked Google Scholar™ search.

Full-text downloads:

1,708 since deposited on 26 Feb 2007
41 in the past twelve months

Full-text downloads displays the total number of times this work’s files (e.g., a PDF) have been downloaded from QUT ePrints as well as the number of downloads in the previous 365 days. The count includes downloads for all files if a work has more than one.

ID Code: 6295
Item Type: Other
Refereed: Yes
Keywords: cyber crime, critical information infrastructure protection, computer, related crime, aysmetric warfare, terrorism
Subjects: Australian and New Zealand Standard Research Classification > STUDIES IN HUMAN SOCIETY (160000) > CRIMINOLOGY (160200) > Criminology not elsewhere classified (160299)
Divisions: Current > QUT Faculties and Divisions > Faculty of Law
Copyright Owner: Copyright 2006 (The authors)
Deposited On: 26 Feb 2007 00:00
Last Modified: 09 Jun 2010 12:37

Export: EndNote | Dublin Core | BibTeX

Repository Staff Only: item control page