메뉴 건너뛰기




Volumn 311, Issue , 2009, Pages 35-49

Risk-based criticality analysis

Author keywords

Criticality; Impact; Risk analysis

Indexed keywords

CRITICAL ASSET; CRITICAL INFRASTRUCTURE PROTECTION; CRITICALITY ANALYSIS; IMPACT; PRIORITIZATION; RISK-BASED; THREATS AND VULNERABILITIES;

EID: 84885179321     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-04798-5_3     Document Type: Conference Paper
Times cited : (49)

References (26)
  • 3
    • 34848899205 scopus 로고    scopus 로고
    • Information security systems vs. critical information infrastructure protection systems - Similarities and differences
    • A. Bialas, Information security systems vs. critical information infrastructure protection systems - Similarities and differences, Proceedings of the International Conference on the Dependability of Computer Systems, pp. 60-67, 2006.
    • (2006) Proceedings of the International Conference On the Dependability of Computer Systems , pp. 60-67
    • Bialas, A.1
  • 5
    • 55549113587 scopus 로고    scopus 로고
    • Metrics for quantifying interdependencies
    • M. Papa and S. Shenoi (Eds.), Springer, Boston, Massachusetts
    • E. Casalicchio and E. Galli, Metrics for quantifying interdependencies, in Critical Infrastructure Protection II, M. Papa and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 215-227, 2008.
    • (2008) Critical Infrastructure Protection II , pp. 215-227
    • Casalicchio, E.1    Galli, E.2
  • 9
    • 77954515070 scopus 로고    scopus 로고
    • Insight Consulting, Issue 5.1, Walton-on-Thames, United Kingdom
    • Insight Consulting, CRAMM User Guide, Issue 5.1, Walton-on-Thames, United Kingdom, 2005.
    • (2005) CRAMM User Guide
  • 10
    • 0004217479 scopus 로고    scopus 로고
    • ISO/IEC Guide 73:2002: Risk Management - Vocabulary - Guidelines for Use in Standards, Geneva, Switzerland
    • International Organization for Standardization, ISO/IEC Guide 73:2002: Risk Management - Vocabulary - Guidelines for Use in Standards, Geneva, Switzerland, 2002.
    • (2002) International Organization For Standardization
  • 11
    • 36248950191 scopus 로고    scopus 로고
    • Visualizing cascading failures in critical cyber infrastructures
    • E. Goetz and S. Shenoi (Eds.), Springer, Boston, Massachusetts
    • J. Kopylec, A. D'Amico and J. Goodall, Visualizing cascading failures in critical cyber infrastructures, in Critical Infrastructure Protection, E. Goetz and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 351-364, 2007.
    • (2007) Critical Infrastructure Protection , pp. 351-364
    • Kopylec, J.1    D'Amico, A.2    Goodall, J.3
  • 12
    • 84891749415 scopus 로고    scopus 로고
    • 1.1, U.S. Critical Infrastructure Assurance Office, Washington, DC
    • KPMG Peat Marwick, Vulnerability Assessment Framework 1.1, U.S. Critical Infrastructure Assurance Office, Washington, DC, 1998.
    • (1998) KPMG Peat Marwick, Vulnerability Assessment Framework
  • 13
    • 49949089091 scopus 로고    scopus 로고
    • Critical infrastructures at risk: A need for a new conceptual approach and extended analytical tools
    • W. Kroger, Critical infrastructures at risk: A need for a new conceptual approach and extended analytical tools, Reliability Engineering and System Safety, vol. 93(12), pp. 1781-1787, 2008.
    • (2008) Reliability Engineering and System Safety , vol.93 , Issue.12 , pp. 1781-1787
    • Kroger, W.1
  • 14
    • 0001859044 scopus 로고
    • A technique for the measurement of attitudes
    • R. Likert, A technique for the measurement of attitudes, Archives of Psychology, vol. 140(22), pp. 1-55, 1932.
    • (1932) Archives of Psychology , vol.140 , Issue.22 , pp. 1-55
    • Likert, R.1
  • 19
    • 55549098577 scopus 로고    scopus 로고
    • Modeling dependencies in critical infrastructures
    • M. Papa and S. Shenoi (Eds.), Springer, Boston, Massachusetts
    • A. Nieuwenhuijs, E. Luiijf and M. Klaver, Modeling dependencies in critical infrastructures, in Critical Infrastructure Protection II, M. Papa and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 205-213, 2008.
    • (2008) Critical Infrastructure Protection II , pp. 205-213
    • Nieuwenhuijs, A.1    Luiijf, E.2    Klaver, M.3
  • 20
    • 84857277161 scopus 로고    scopus 로고
    • Standard CIP-002-1, Cyber Security-Critical Asset Identification, Washington, DC
    • North American Electric Reliability Corporation, Standard CIP-002-1, Cyber Security-Critical Asset Identification, Washington, DC, 2006.
    • (2006) North American Electric Reliability Corporation
  • 23
    • 0035696915 scopus 로고    scopus 로고
    • Identifying, understanding and analyzing critical infrastructure interdependencies
    • S. Rinaldi, J. Peerenboom and T. Kelly, Identifying, understanding and analyzing critical infrastructure interdependencies, IEEE Control Systems, vol. 21(6), pp. 11-25, 2001.
    • (2001) IEEE Control Systems , vol.21 , Issue.6 , pp. 11-25
    • Rinaldi, S.1    Peerenboom, J.2    Kelly, T.3
  • 24
    • 55549140849 scopus 로고    scopus 로고
    • An integrated approach for simulating interdependencies
    • M. Papa and S. Shenoi, (Eds.), Springer, Boston, Massachusetts
    • R. Setola, S. Bologna, E. Casalicchio and V. Masucci, An integrated approach for simulating interdependencies, in Critical Infrastructure Protection II, M. Papa and S. Shenoi, (Eds.), Springer, Boston, Massachusetts, pp. 229-239, 2008.
    • (2008) Critical Infrastructure Protection II , pp. 229-239
    • Setola, R.1    Bologna, S.2    Casalicchio, E.3    Masucci, V.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.