Show simple item record

dc.contributor.advisorEngel, Jeffrey A.
dc.creatorDoll, Abby
dc.creatorPirrong, Renee
dc.creatorJennings, Matthew
dc.creatorStasny, George
dc.creatorGiblin, Andy
dc.creatorShaffer, Steph
dc.creatorAnderson, Aimee
dc.date.accessioned2014-06-11T15:34:21Z
dc.date.available2014-06-11T15:34:21Z
dc.date.issued2011
dc.identifier.urihttps://hdl.handle.net/1969.1/151998
dc.description.abstractWe were tasked by CENTRA Technology, Inc., to create a methodology that could be used to prioritize critical cyber assets in the United States. We have answered that call by developing a user-friendly, consequence-based methodology that requires end users to carefully consider their cyber assets' contributions to vital missions of national security, economic security, and public safety. The user will be able to clearly visualize the potential impact of a loss of cyber assets on those three indicators vis-a-vis one another, which is especially important in the midst of the current budgetary uncertainty in Washington. In this study, we present our definitions of the three indicators; an overview of the eighteen sectors of critical infrastructure and commonalities and the characteristics of their operating systems; a brief review of the literature on cyber security to date; and, of course, a thorough discussion of the intricacies of how our methodology works.en
dc.description.sponsorshipCENTRA Technologyen
dc.language.isoen_US
dc.titleCritical Infrastructure and Cyber Securityen
dc.rights.requestablefalseen


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record