logo

Annotated Bibliography – Protecting the National Infrastructure

   

Added on  2023-04-25

6 Pages1377 Words485 Views
 | 
 | 
 | 
Annotated Bibliography – Protecting the National Infrastructure
Student’s name
Institution Affiliation(s)
Annotated Bibliography – Protecting the National Infrastructure_1

Maglaras, L. A., Kim, K. H., Janicke, H., Ferrag, M. A., Rallis, S., Fragkou, P., ... & Cruz, T. J.
(2018). Cyber security of critical infrastructures. ICT Express, 4(1), 42-45.
The article discusses the national infrastructure protection plan for the US. The plan
includes the comprehensive risk management system which explicitly defines roles and
responsibilities. The plan has emphasized the integration of the resilience element together
with the utilization of a common risk assessment method which is inclusive of the main
criteria for these kinds of analyses in order to allow the comparative analyses of risk
factors amongst various industries.
The paper is useful for my research as it contains a detailed national infrastructure
protection plan for the US. The plan is one of the most detailed plans available thereby
ensuring that the essential elements of cyber security are discussed and demonstrated
accordingly.
Cho, J. H., & Gao, J. (2016). Cyber war game in temporal networks. PloS one, 11(2), e0148674.
Cyberwar has turned into an intriguing issue, primarily because of the weakness of the
basic national framework over which every single industrialized country depends on.
Various ongoing assaults have featured the need of making a move, yet it supports for
some effort to supplant old control frameworks that were planned before the age of the
Internet. A key European activity called Ecossian is currently being chipped away at to go
about as a new cautioning framework. The paper is useful for my research as it contains
vital information about protecting critical national infrastructures.
Henderson, L. (2017). National infrastructure – the next step for seasoned hackers.Network
Security, 2017(3), 8–10. Retrieved from: https://doi.org/10.1016/S1353-4858(17)30026-0
Annotated Bibliography – Protecting the National Infrastructure_2

Because of the propelling abilities of programmers and the constantly reducing efficiency
of common border security arrangements, national body of administrators must look
towards advancement to delve into and subsequently major digital security lapses. These
problems will develop quite rapidly and massively after some time. Any kind of change or
a new idea has their own challenges. However digital security should be handled in an
outright manner if the authorities in charge of providing our perfect water, fuel and power
can be trusted as proactively handling this complex issue.
Hacking has become very rampant leading to the introduction of ethical hacking. The
paper is useful for my research as it outlines how a national infrastructure can be protected
against hackers.
Robinson, M., Jones, K., &Janicke, H. (2015). Cyber warfare: Issues and challenges. Computers
& security, 49, 70-94.
Ninety-eight per cent of all U.S. government correspondences travel over nonmilitary
personnel claimed and-worked systems. Furthermore, the administration depends entirely
on regular citizen suppliers for PC programming and equipment items, administrations, and
upkeep. This close total intermixing of nonmilitary personnel and military PC foundation
makes a significant number of those nonmilitary personnel items and suppliers genuine
focuses under the law of outfitted clash.
This is another text that is useful for my research in that it talks about precautions against
the effects of any attacks n the national infrastructure.
Annotated Bibliography – Protecting the National Infrastructure_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Professional Practice in IT
|15
|704
|55

Security Awareness Level Of Smartphone Users | Case Study
|13
|854
|176

Telecollaboration in Education: A Review
|10
|2498
|120