Computer – Based Infrastructure Sector Interdependencies and Security Implications
Aghware Fidelis Obukohwo
DOI: 10.4236/ijcns.2011.411090   PDF    HTML     3,659 Downloads   6,379 Views   Citations

Abstract

Traditionally, the analysis of sector interdependencies has involved the characterization of all infrastructure-to-infrastructure interconnections and some of the main infrastructure integrals that, once lost or be tampered with, will compromise the performance and security issues with the other interconnected infrastructures. Therefore, the paper dwells much on the security implications which may be associated with these infrastructure sector interdependencies. This paper also discusses some of the major risk considerations, analytical approaches, researches and the necessary developments needed as well as the interdisciplinary ranges through which the necessary skills are required in the construction of comprehensive sector interdependencies.

Share and Cite:

A. Obukohwo, "Computer – Based Infrastructure Sector Interdependencies and Security Implications," International Journal of Communications, Network and System Sciences, Vol. 4 No. 11, 2011, pp. 735-738. doi: 10.4236/ijcns.2011.411090.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] J. Sullivant, “Strategies for Protecting National Critical Assets,” Wiley, New York, 2007. doi:10.1002/9780470228371
[2] J. Bullock and D. Haddow, “Introduction to Homeland Security,” New Jersey: Prentice Hall, Upper Saddle River, 2006.
[3] M. Amin “Toward Self-Healing Infrastructure Systems,” IEEE Computer Application Power, Vol. 33, No. 8, 2000, pp. 45-53.
[4] Y. Haimes, “Risk Modeling, Assessment, and Manage- ment,” John Wiley & Sons, New York, 1998.
[5] Y. Haimes and P. Jiang, “Leontief-Based Model of Risk in Complex Interconnected Infrastructures,” Journal of Infrastructure Systems, Vol. 7, No. 1, 2001, pp. 23-27. doi:10.1061/(ASCE)1076-0342(2001)7:1(1)
[6] S. Rosenbush, “Satellites’s Death Puts Millions out of Touch,” USA Today, May 1998. www.ieeexplore.ieee.org
[7] D. Verton, “Black Ice: The Invisible Threat of Cyberterrorism,” McGraw Hill, Upper Saddle River, 2003.
[8] J. Willenssen, “Critical Infrastructure Protection Signify- cant Challenges in Safeguarding Interdependences,” Oxford University Press, Oxford, 2007.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.