DocumentCode :
1384045
Title :
Protecting the critical information infrastructure
Author :
Caloyannides, Michael
Author_Institution :
Mitretek Syst., USA
Volume :
2
Issue :
4
fYear :
2000
Firstpage :
24
Lastpage :
28
Abstract :
The same advantage that technologically advanced businesses have over their competitors-their advanced information technology infrastructure-has become a major new vulnerability. As businesses adopt increasingly sophisticated information infrastructures, the complexity of protecting those infrastructures becomes enormous. And the problem isn´t helped by the misunderstandings between business and government over what protecting the infrastructure means. So what should you do about hackers? There are three types of problems to be solved: technological, legal, and financial. An overall solution requires effective solutions in each of these three areas
Keywords :
business data processing; computer crime; computer network management; businesses; critical information infrastructure protection; hacking; Biometrics; Business; Companies; Computer hacking; Computer networks; Cryptography; Digital signatures; Hardware; Law enforcement; Protection;
fLanguage :
English
Journal_Title :
IT Professional
Publisher :
ieee
ISSN :
1520-9202
Type :
jour
DOI :
10.1109/6294.869379
Filename :
869379
Link To Document :
بازگشت