Title :
Critical information infrastructure protection: How comprehensive should it be?
Author :
Von Solms, Sebastian H.
Author_Institution :
Centre for Cyber Security, Univ. of Johannesburg, Johannesburg, South Africa
Abstract :
It is a fact that any computer or device connected to the Internet can potentially be infected by malicious software. This paper investigates this risk further, and makes the basic statement that any Internet connected computer in a country should be seen as part of that country´s critical information infrastructure protection program because such a computer can be herded into a botnet and used against that country.
Keywords :
Internet; invasive software; Internet; critical information infrastructure protection; malicious software; Computer crime; Computers; Government; Internet; Critical Information Infrastructure; Critical Information Infrastructure Protection; Critical Information Systems; botnets);
Conference_Titel :
Adaptive Science and Technology (ICAST), 2013 International Conference on
Conference_Location :
Pretoria
DOI :
10.1109/ICASTech.2013.6707516