Chapter 2 CYBERSPACE POLICY FOR CRITICAL INFRASTRUCTURES

نویسندگان

  • Dorsey Wilkin
  • Richard Raines
  • Paul Williams
  • Kenneth Hopkinson
چکیده

The first step in preparing any battlespace is to define the domain for attack and maneuver. The various military service components have directed authority to focus their efforts in specific domains of operations (e.g., naval operations are mainly in the maritime domain). However, cyberspace operations pose challenges because they span multiple operational domains. This paper focuses on U.S. cyberspace policy related to defending and exploiting critical infrastructure assets. Also, it examines the issues involved in delineating responsibility for U.S. defensive and offensive operations related to critical infrastructures.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

"Were We Ready in the First Place?": An Analysis of Cashless Policy Implementation in Nigeria

On 1 January, 2012, Nigeria commenced the implementation of cashless policy, with the kick-off in Lagos State. By the end of that year it was evident the implementation could not be extended to other states of the federation, as earlier scheduled. This raised a crucial question: was Nigeria prepared in the first place, in terms of availability of needed infrastructures, to commence implementati...

متن کامل

Cyber Security of Safety-critical Infrastructures: a Case Study for Nuclear Facilities

Computers have become crucial to the operations of government and business. Critical infrastructure protection policy has evolved since the mid-1990’s. Since 11 September 2001, the critical link between cyberspace and physical space has been increasingly recognized. Presently, critical infrastructure sectors face various cyber threats. In particular, the electrical power infrastructure is the m...

متن کامل

Framing Assumptions and Cyberspace Regulation: A Critical Reflection on Differences among Countries

Thispaper attempts to connect two rather different fields of study by applying concepts from regulating technological risks to the field of cyberspace regulation. The concept of framing assumption is used in order to show the cyberspace regulation differences in  countries particularly between the U.S. and the Euopean system. It shows how the U.S. and Europe have adopted different assumptions r...

متن کامل

Introduction to the E-government Secure Cyberspace in 21st Century Government Minitrack

The cybersecurity aspects of critical infrastructure systems have become a hot topic for countries all across the globe. Information Technology has become pervasive in all aspects of our lives and this includes elements referred to as critical infrastructures. This minitrack examines aspects associated with the security of information technology used by governments and critical infrastructures ...

متن کامل

Securing Process Control Systems of Today and Tomorrow

Process Control Systems (PCSs) and Process Control Networks (PCNs) are instrumental in the safe, reliable, and efficient operation of many physical processes in our critical infrastructures. However, PCNs increasingly employ commodity information technology (IT) elements and are being connected to the Internet. As a result, they have inherited IT cyberspace risks, threats, and attacks that coul...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014