You are here: Home Contents V10 N2 V10N2_Sosnkowski.html
Personal tools

Improving Critical Infrastructure Protection

 

 

Full text
View
Purchase

Source
Journal of Information Systems Security
Volume 10, Number 2 (2014)
Pages 5965
ISSN 1551-0123 (Print)
ISSN 1551-0808 (Online)
Authors
Michael D. Sosnkowski — Virginia Commonwealth University, USA
Publisher
Information Institute Publishing, Washington DC, USA

 

 

Abstract

To judge the efficacy of the Executive Order 13636, “Improving Critical Infrastructure Cyber-security”, which was signed by President Obama in February of 2013, the success criteria should be whether the three main aspects of the legislation have been met, which are the: sharing of threat information between private and public institutions; privacy of general public; and mitigation of critical infrastructure to cyber-attacks. This is illustrated by highlighting the current reviews about its implementation by critics and supporters.

 

 

Keywords

Stands, Standardization, Critical Infrastructure Protection, 13636

 

 

References

Chowdhuri, R, & Dhillon, G. (2012). Understanding Information Security. Journal of Information System Security 8.2.

Dhillon, G (2014). Essentials of Cyber Security. Washington DC: Paradigm Books.

DHS (2013). Executive Order (EO) 13636 Improving Critical Infrastructure Cybersecurity. (2013, March 13). Retrieved October 1, 2014, from http://www.dhs.gov/sites/default/files/publications/EO-PPD Fact Sheet12March13.pdf

Flowers, A., Zeadally, S., & Murray, A. (2013). Cybersecurity and US Legislative Efforts to address Cybercrime. Journal of Homeland Security and Emergency Management, 10(1), 29–55-29–55. Retrieved October 12, 2014.

Improving Critical Infrastructure Cybersecurity. (2013, March). Retrieved October 15, 2014, from http://www.dhs.gov/sites/default/files/publications/EO-PPDFactSheet 12March13.pdf

Greenberg, A. (2013, February 12). President Obama's Cybersecurity Executive Order Scores Much Better Than CISPA on Privacy. Retrieved October 17, 2014, from http://www.forbes.com/sites/andygreenberg/2013/02/12/president-obamas-cybersecurity-executive-order-scores-much-better-than-cispa-on-privacy/

Hadbah, A., Kalam, A., & Al-Khalidi, H. (2008). The subsequent security problems attributable to increasing interconnectivity of SCADA systems. Australasian Universities Power Engineering Conference, 1-4.

Kolkowska, E, & Dhillon, G (2013). Organizational power and information security rule compliance. Computers & Security 33: 3-11.

Nan, C., Eusgeld, I., & Kröger, W. (2013). Analyzing vulnerabilities between SCADA system and SUC due to interdependencies. Reliability Engineering & System Safety, 113, 76-93.

Narla, S. (2013). The Evolution of Connected Vehicle Technology: From Smart Drivers to Smart Cars to... Self-Driving Cars. Institute of Transportation Engineers, 83(7), 22-26.

Onyeji, I., Bazilian, M., & Bronk, C. (2014). Cyber Security and Critical Energy Infrastructure. The Electricity Journal, 27(2), 52-60. Retrieved October 15, 2014.

Stevenson, J., & Prevost, R. (2013). Securing the Grid: Information Sharing in the Fifth Dimension. The Electricity Journal, 26(9), 42-51.