Critical Infrastructure and Cyber Security
dc.contributor.advisor | Engel, Jeffrey A. | |
dc.creator | Doll, Abby | |
dc.creator | Pirrong, Renee | |
dc.creator | Jennings, Matthew | |
dc.creator | Stasny, George | |
dc.creator | Giblin, Andy | |
dc.creator | Shaffer, Steph | |
dc.creator | Anderson, Aimee | |
dc.date.accessioned | 2014-06-11T15:34:21Z | |
dc.date.available | 2014-06-11T15:34:21Z | |
dc.date.issued | 2011 | |
dc.description.abstract | We were tasked by CENTRA Technology, Inc., to create a methodology that could be used to prioritize critical cyber assets in the United States. We have answered that call by developing a user-friendly, consequence-based methodology that requires end users to carefully consider their cyber assets' contributions to vital missions of national security, economic security, and public safety. The user will be able to clearly visualize the potential impact of a loss of cyber assets on those three indicators vis-a-vis one another, which is especially important in the midst of the current budgetary uncertainty in Washington. In this study, we present our definitions of the three indicators; an overview of the eighteen sectors of critical infrastructure and commonalities and the characteristics of their operating systems; a brief review of the literature on cyber security to date; and, of course, a thorough discussion of the intricacies of how our methodology works. | en |
dc.description.sponsorship | CENTRA Technology | en |
dc.identifier.uri | https://hdl.handle.net/1969.1/151998 | |
dc.language.iso | en_US | |
dc.rights.requestable | false | en |
dc.title | Critical Infrastructure and Cyber Security | en |