DocumentCode :
672165
Title :
Critical information infrastructure protection: How comprehensive should it be?
Author :
Von Solms, Sebastian H.
Author_Institution :
Centre for Cyber Security, Univ. of Johannesburg, Johannesburg, South Africa
fYear :
2013
fDate :
25-27 Nov. 2013
Firstpage :
1
Lastpage :
5
Abstract :
It is a fact that any computer or device connected to the Internet can potentially be infected by malicious software. This paper investigates this risk further, and makes the basic statement that any Internet connected computer in a country should be seen as part of that country´s critical information infrastructure protection program because such a computer can be herded into a botnet and used against that country.
Keywords :
Internet; invasive software; Internet; critical information infrastructure protection; malicious software; Computer crime; Computers; Government; Internet; Critical Information Infrastructure; Critical Information Infrastructure Protection; Critical Information Systems; botnets);
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Adaptive Science and Technology (ICAST), 2013 International Conference on
Conference_Location :
Pretoria
Type :
conf
DOI :
10.1109/ICASTech.2013.6707516
Filename :
6707516
Link To Document :
بازگشت