메뉴 건너뛰기




Volumn , Issue , 2002, Pages 23-39

A dynamic risk model for information technology security in a critical infrastructure environment

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SIMULATION; COMPUTER VIRUSES; ELECTRONIC MAIL; INFORMATION TECHNOLOGY; NETWORK PROTOCOLS; PROGRAMMABLE LOGIC CONTROLLERS; SCADA SYSTEMS; SECURITY OF DATA; SOCIETIES AND INSTITUTIONS;

EID: 0242365403     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (5)

References (11)
  • 1
    • 0242282428 scopus 로고    scopus 로고
    • AMSA; Association of Metropolitan Sewerage Agencies, Washington, DC
    • AMSA (2002). Asset Based Vulnerability Checklist. Association of Metropolitan Sewerage Agencies, Washington, DC.
    • (2002) Asset Based Vulnerability Checklist
  • 2
    • 0003765587 scopus 로고    scopus 로고
    • CCIMB; Introduction and General Model, version 2.1, Common Criteria Information Management Board, 99-031, August
    • CCIMB (1999). Common Criteria for Information Technology Security Evaluation: Part 1. Introduction and General Model, version 2.1, Common Criteria Information Management Board, 99-031, August.
    • (1999) Common Criteria for Information Technology Security Evaluation: Part 1
  • 4
    • 0004278738 scopus 로고
    • Williston, VT: Pegasus Communications
    • Forrester, J. (1961). Industrial Dynamics. Williston, VT: Pegasus Communications.
    • (1961) Industrial Dynamics
    • Forrester, J.1
  • 8
    • 0242314141 scopus 로고    scopus 로고
    • NIST; National Institute for Science and Technology, Publication 800-42
    • NIST (2002). Guideline on Network Security Testing. National Institute for Science and Technology, Publication 800-42.
    • (2002) Guideline on Network Security Testing
  • 9
    • 0242314136 scopus 로고    scopus 로고
    • Sandia; Sandia National Laboratory
    • Sandia (2002). Risk Assessment Methodology for Dams. Sandia National Laboratory, http://tswg.gov/tswg/ip/RAMD_TB.htm.
    • (2002) Risk Assessment Methodology for Dams
  • 10
    • 0242314137 scopus 로고    scopus 로고
    • USDOE; US Department of Energy, Office of Energy Assurance, September
    • USDOE (2002). 21 Steps to Improve Cyber Security of SCADA Networks. US Department of Energy, Office of Energy Assurance, September.
    • (2002) 21 Steps to Improve Cyber Security of SCADA Networks
  • 11
    • 0242314145 scopus 로고    scopus 로고
    • Wenger, A., J. Metzger, and M. Dunn, (Eds.); Appendix A1, Glossary of Terms. Produced by Workshop on Critical Infrastructure Protection in Europe. Zurich, Switzerland, November 8-10
    • Wenger, A., J. Metzger, and M. Dunn, (Eds.) (2001). International Critical Information Infrastructure Protection Handbook, Appendix A1, Glossary of Terms. Produced by Workshop on Critical Infrastructure Protection in Europe. Zurich, Switzerland, November 8-10. http://www.isn.ethz.ch/crn/extended/workshop_zh/ebp_cip_handbook.pdf.
    • (2001) International Critical Information Infrastructure Protection Handbook


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.