Annotated Bibliography: Protecting Critical National Infrastructure
VerifiedAdded on 2023/04/25
|6
|1377
|485
Annotated Bibliography
AI Summary
This annotated bibliography examines key research papers focused on the cyber security of national infrastructure. The included sources cover various aspects of cyber threats, including cyber warfare, false data injection attacks, and the vulnerabilities of critical systems such as power grids. The bibliography explores national infrastructure protection plans, ethical hacking, and the challenges of securing systems against increasingly sophisticated cyberattacks. The papers highlight the need for proactive measures, the importance of risk assessment, and the development of new warning systems to combat potential cyber threats. The bibliography provides a comprehensive overview of the current state of cyber security in relation to national infrastructure, offering insights into both the threats and potential solutions.

Annotated Bibliography – Protecting the National Infrastructure
Student’s name
Institution Affiliation(s)
Student’s name
Institution Affiliation(s)
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Maglaras, L. A., Kim, K. H., Janicke, H., Ferrag, M. A., Rallis, S., Fragkou, P., ... & Cruz, T. J.
(2018). Cyber security of critical infrastructures. ICT Express, 4(1), 42-45.
The article discusses the national infrastructure protection plan for the US. The plan
includes the comprehensive risk management system which explicitly defines roles and
responsibilities. The plan has emphasized the integration of the resilience element together
with the utilization of a common risk assessment method which is inclusive of the main
criteria for these kinds of analyses in order to allow the comparative analyses of risk
factors amongst various industries.
The paper is useful for my research as it contains a detailed national infrastructure
protection plan for the US. The plan is one of the most detailed plans available thereby
ensuring that the essential elements of cyber security are discussed and demonstrated
accordingly.
Cho, J. H., & Gao, J. (2016). Cyber war game in temporal networks. PloS one, 11(2), e0148674.
Cyberwar has turned into an intriguing issue, primarily because of the weakness of the
basic national framework over which every single industrialized country depends on.
Various ongoing assaults have featured the need of making a move, yet it supports for
some effort to supplant old control frameworks that were planned before the age of the
Internet. A key European activity called Ecossian is currently being chipped away at to go
about as a new cautioning framework. The paper is useful for my research as it contains
vital information about protecting critical national infrastructures.
Henderson, L. (2017). National infrastructure – the next step for seasoned hackers.Network
Security, 2017(3), 8–10. Retrieved from: https://doi.org/10.1016/S1353-4858(17)30026-0
(2018). Cyber security of critical infrastructures. ICT Express, 4(1), 42-45.
The article discusses the national infrastructure protection plan for the US. The plan
includes the comprehensive risk management system which explicitly defines roles and
responsibilities. The plan has emphasized the integration of the resilience element together
with the utilization of a common risk assessment method which is inclusive of the main
criteria for these kinds of analyses in order to allow the comparative analyses of risk
factors amongst various industries.
The paper is useful for my research as it contains a detailed national infrastructure
protection plan for the US. The plan is one of the most detailed plans available thereby
ensuring that the essential elements of cyber security are discussed and demonstrated
accordingly.
Cho, J. H., & Gao, J. (2016). Cyber war game in temporal networks. PloS one, 11(2), e0148674.
Cyberwar has turned into an intriguing issue, primarily because of the weakness of the
basic national framework over which every single industrialized country depends on.
Various ongoing assaults have featured the need of making a move, yet it supports for
some effort to supplant old control frameworks that were planned before the age of the
Internet. A key European activity called Ecossian is currently being chipped away at to go
about as a new cautioning framework. The paper is useful for my research as it contains
vital information about protecting critical national infrastructures.
Henderson, L. (2017). National infrastructure – the next step for seasoned hackers.Network
Security, 2017(3), 8–10. Retrieved from: https://doi.org/10.1016/S1353-4858(17)30026-0

Because of the propelling abilities of programmers and the constantly reducing efficiency
of common border security arrangements, national body of administrators must look
towards advancement to delve into and subsequently major digital security lapses. These
problems will develop quite rapidly and massively after some time. Any kind of change or
a new idea has their own challenges. However digital security should be handled in an
outright manner if the authorities in charge of providing our perfect water, fuel and power
can be trusted as proactively handling this complex issue.
Hacking has become very rampant leading to the introduction of ethical hacking. The
paper is useful for my research as it outlines how a national infrastructure can be protected
against hackers.
Robinson, M., Jones, K., &Janicke, H. (2015). Cyber warfare: Issues and challenges. Computers
& security, 49, 70-94.
Ninety-eight per cent of all U.S. government correspondences travel over nonmilitary
personnel claimed and-worked systems. Furthermore, the administration depends entirely
on regular citizen suppliers for PC programming and equipment items, administrations, and
upkeep. This close total intermixing of nonmilitary personnel and military PC foundation
makes a significant number of those nonmilitary personnel items and suppliers genuine
focuses under the law of outfitted clash.
This is another text that is useful for my research in that it talks about precautions against
the effects of any attacks n the national infrastructure.
of common border security arrangements, national body of administrators must look
towards advancement to delve into and subsequently major digital security lapses. These
problems will develop quite rapidly and massively after some time. Any kind of change or
a new idea has their own challenges. However digital security should be handled in an
outright manner if the authorities in charge of providing our perfect water, fuel and power
can be trusted as proactively handling this complex issue.
Hacking has become very rampant leading to the introduction of ethical hacking. The
paper is useful for my research as it outlines how a national infrastructure can be protected
against hackers.
Robinson, M., Jones, K., &Janicke, H. (2015). Cyber warfare: Issues and challenges. Computers
& security, 49, 70-94.
Ninety-eight per cent of all U.S. government correspondences travel over nonmilitary
personnel claimed and-worked systems. Furthermore, the administration depends entirely
on regular citizen suppliers for PC programming and equipment items, administrations, and
upkeep. This close total intermixing of nonmilitary personnel and military PC foundation
makes a significant number of those nonmilitary personnel items and suppliers genuine
focuses under the law of outfitted clash.
This is another text that is useful for my research in that it talks about precautions against
the effects of any attacks n the national infrastructure.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Nye, J. S. (2018). Normative restraints on cyber conflict. Cyber Security: A Peer-Reviewed
Journal, 1(4), 331-342.
There gives off an impression of being an unfolding acknowledgement that a significant
part of the foundation on which we as a whole depend, for example, the power network
that furnishes us with power, is totally unable to deal with programmers. In recent years,
there have been rehashed alerts – and a couple of effective assaults. It isn't so much that
these threats were obscure to experts in the field.
This research paper outlines the weaknesses that our national infrastructures have. For
most systems, because individuals have programmed them, then it means that these
systems remain defenseless to those programmers.
Liang, G., Zhao, J., Luo, F., Weller, S. R., & Dong, Z. Y. (2017). A review of false data injection
attacks against modern power systems. IEEE Transactions on Smart Grid, 8(4), 1630-
1638.
Progressively, our basic framework is overseen and constrained by PCs, and the data
organizes that interface them. Digital psychological militants and different malignant
performers comprehend the financial and social effect that a fruitful assault on these
frameworks could have. While it is basic that we shield against these attacks, it is similarly
basic that we understand how best to respond them. The article shows the most grounded
way strategy of investigating all pathways of introduction to chance – regardless of how
roundabout or circumlocutory they might be – in a system model of foundation and tasks.
This paper outlines how to identify possible risk areas by trying to exploit the system. This
is where organizations hire ethical hackers to test the system for any vulnerabilities.
Journal, 1(4), 331-342.
There gives off an impression of being an unfolding acknowledgement that a significant
part of the foundation on which we as a whole depend, for example, the power network
that furnishes us with power, is totally unable to deal with programmers. In recent years,
there have been rehashed alerts – and a couple of effective assaults. It isn't so much that
these threats were obscure to experts in the field.
This research paper outlines the weaknesses that our national infrastructures have. For
most systems, because individuals have programmed them, then it means that these
systems remain defenseless to those programmers.
Liang, G., Zhao, J., Luo, F., Weller, S. R., & Dong, Z. Y. (2017). A review of false data injection
attacks against modern power systems. IEEE Transactions on Smart Grid, 8(4), 1630-
1638.
Progressively, our basic framework is overseen and constrained by PCs, and the data
organizes that interface them. Digital psychological militants and different malignant
performers comprehend the financial and social effect that a fruitful assault on these
frameworks could have. While it is basic that we shield against these attacks, it is similarly
basic that we understand how best to respond them. The article shows the most grounded
way strategy of investigating all pathways of introduction to chance – regardless of how
roundabout or circumlocutory they might be – in a system model of foundation and tasks.
This paper outlines how to identify possible risk areas by trying to exploit the system. This
is where organizations hire ethical hackers to test the system for any vulnerabilities.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Fraga-Lamas, P., Fernández-Caramés, T., Suárez-Albela, M., Castedo, L., & González-López,
M. (2016). A review on internet of things for defense and public safety. Sensors, 16(10),
1644.
Following mass demos against Egyptian President Hosni Mubarak's routine, the Egyptian
government shut off Internet access the nation over, a move remarkable in the history of
Internet. Even though the coordination of Egypt's "Internet kill switches" stay foggy, the
occasion has set the phase for a genuine discussion about cyber security problems inside
the US, regardless of whether the government ought to be offered access to its very own
kill switch.
This makes part of my research as it talks about nations having kill switches for systems.
For instance, The US can have one single switch to power on and off the power grid of the
whole country.
M. (2016). A review on internet of things for defense and public safety. Sensors, 16(10),
1644.
Following mass demos against Egyptian President Hosni Mubarak's routine, the Egyptian
government shut off Internet access the nation over, a move remarkable in the history of
Internet. Even though the coordination of Egypt's "Internet kill switches" stay foggy, the
occasion has set the phase for a genuine discussion about cyber security problems inside
the US, regardless of whether the government ought to be offered access to its very own
kill switch.
This makes part of my research as it talks about nations having kill switches for systems.
For instance, The US can have one single switch to power on and off the power grid of the
whole country.

References
Cho, J. H., & Gao, J. (2016). Cyber war game in temporal networks. PloS one, 11(2), e0148674.
Fraga-Lamas, P., Fernández-Caramés, T., Suárez-Albela, M., Castedo, L., & González-López,
M. (2016). A review on internet of things for defense and public safety. Sensors, 16(10),
1644.
Henderson, L. (2017). National infrastructure – the next step for seasoned hackers.Network
Security, 2017(3), 8–10. Retrieved from: https://doi.org/10.1016/S1353-4858(17)30026-0
Liang, G., Zhao, J., Luo, F., Weller, S. R., & Dong, Z. Y. (2017). A review of false data injection
attacks against modern power systems. IEEE Transactions on Smart Grid, 8(4), 1630-1638.
Maglaras, L. A., Kim, K. H., Janicke, H., Ferrag, M. A., Rallis, S., Fragkou, P., ... & Cruz, T. J.
(2018). Cyber security of critical infrastructures. ICT Express, 4(1), 42-45.
Nye, J. S. (2018). Normative restraints on cyber conflict. Cyber Security: A Peer-Reviewed
Journal, 1(4), 331-342.
Robinson, M., Jones, K., &Janicke, H. (2015). Cyber warfare: Issues and challenges. Computers
& security, 49, 70-94.
Cho, J. H., & Gao, J. (2016). Cyber war game in temporal networks. PloS one, 11(2), e0148674.
Fraga-Lamas, P., Fernández-Caramés, T., Suárez-Albela, M., Castedo, L., & González-López,
M. (2016). A review on internet of things for defense and public safety. Sensors, 16(10),
1644.
Henderson, L. (2017). National infrastructure – the next step for seasoned hackers.Network
Security, 2017(3), 8–10. Retrieved from: https://doi.org/10.1016/S1353-4858(17)30026-0
Liang, G., Zhao, J., Luo, F., Weller, S. R., & Dong, Z. Y. (2017). A review of false data injection
attacks against modern power systems. IEEE Transactions on Smart Grid, 8(4), 1630-1638.
Maglaras, L. A., Kim, K. H., Janicke, H., Ferrag, M. A., Rallis, S., Fragkou, P., ... & Cruz, T. J.
(2018). Cyber security of critical infrastructures. ICT Express, 4(1), 42-45.
Nye, J. S. (2018). Normative restraints on cyber conflict. Cyber Security: A Peer-Reviewed
Journal, 1(4), 331-342.
Robinson, M., Jones, K., &Janicke, H. (2015). Cyber warfare: Issues and challenges. Computers
& security, 49, 70-94.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 6
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.



