6 resultados para critical infrastructures

em Deakin Research Online - Australia


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper examines the emergent security risk that information warfare poses to critical infrastructure systems, particularly as governments are increasingly concerned with protecting these assets against attack or disruption. Initially it outlines critical infrastructure systems and the notion of information warfare. It then discusses the potential implications and examining the concerns and vulnerabilities such cyber attacks would pose, utilising exemplar online attack occurrences. It then examines the current Australian situation before suggesting some considerations to mitigate the potential risk that information warfare poses to critical infrastructure systems, and by association: government, industry and the wider community.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Secure management of Australia's commercial critical infrastructure presents ongoing challenges to owners and the government. Currently a high-level iriformation sharing collaboration between the government and business manages complex security issues, but critical irifrastructure protection also lacks a scalable model exhibiting the overall structure of critical infrastructure at various levels, sectors and sub-sectors. This research builds on the work of Marasea and Warren (2003) to establish a representative model of Australia's critical irifrastructure; discusses the boundaries between critical infrastructures, and considers the existence andpotential irifluence ofcritical irifrastructure relationships.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

This research extends upon the previous work of Pye and Warren (2005) and presents a refinement of the previously proposed critical infrastructure model to enhance further our understanding and apprecication of where the likely inter-play and existance of dependency relationships between infrastructures coexist.

These associations are presented as a number of linkages that exist within each sector of Australia'a critical infrastructure, which is then extended further to the modelling of dependency inter-relationships that exist between critical infrastructures itilising Petri Nets.  The recognition and identification of such reliance relationships between critical infrastructures is necessary to allow both infrastructure owners and the government to identify and effectively manage and maintain the security, stability and availability of their particular critical infrastructure against potential scenario driven effects.  These issues are reflected within a case study as modelled using the Petri Net approach to encapsulate the issues of reliance relationships by drawing upon an Australian commercial case study.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Secure management of Australia's commercial critical infrastructure presents ongoing challenges to both the owners of this infrastructure as well as to the government. It is currently managed through high-level information sharing via collaboration but does this situation suit the commercial sector? One of the issues facing Australia is that the majority of critical infrastructure resides under the control of the business sector and certain aspects such of the critical infrastructure such as supply chain management (SCM) systems are distributed across a number of entities. The paper focuses upon the security and risk issues associated with SCM systems within the realms of critical infrastructure protection.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The vision of volunteer computing is to provide large scale computational infrastructure by using dynamic collections of donated desktop computers. There have been many works that highlighted the significant benefits of volunteer computing but little on the security and privacy threats associated with its exploitation. However, volunteer computing is vulnerable to a variety of attacks and presents numerous significant security threats to the stakeholders. This paper presents security and privacy threat taxonomy along with the security features developed to cope with such threats.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Steel pipelines, buried under the soil and protected by the combination of protective coatings and cathodic protection (CP), are used for oil and gas transportation. These pipelines are one of the critical infrastructures for energy transportation and therefore became lifelines of modern society. The deterioration of the external surfaces of transmission pipelines is a serious problem and is caused mainly by coating and/or CP failure leading to the loss of integrity of pipelines. To avoid such damage, there is a need of techniques which are able to locate active corrosion sites, monitor corrosion, and evaluate corrosion damage. Fundamental understanding of such processes occurring on coated pipelines (with various types of defects in coatings as well as pipe) in complex soil environment is necessary for the development of such techniques. Numerous laboratory techniques, i.e., electrochemical impedance spectroscopy based, polarisation measurements based, mathematical simulations, direct observation etc. have been used to develop fundamental understanding, simulate and evaluate corrosion occurring in oil and gas pipelines under various operating conditions. Given the complex nature of the pipeline corrosion, application of these laboratory techniques in field measurements as well as in understanding the corrosion mechanisms is lacking. This paper presents an overview of investigations, based on electrochemical techniques, for simulation and evaluation of pipeline corrosion in laboratory.