infrastructure security Articles

  • Strategic security measures for water infrastructure

    As the 10th anniversary of the September 11, 2001 (9/11) attacks is fast approaching, the United States (U.S.) has no definite information of terror threat.  According to the systematic approaches of risk assessment and concise intelligence analysis presented in the book entitled, "Risk Assessment for Water Infrastructure Safety and Security" (hereafter, the "RAWISS book"), the terrorists ...


    By IWA Publishing

  • Emergent information security in critical infrastructures

    The growing tendency to inter-weaving infrastructures makes them more complex, less manageable, and more vulnerable to random system failures. Several information systems are usually added to manage and control such infrastructures. However, in this internet era these information infrastructures have increasingly become the targets of sophisticated (denial of service) attacks, which cause random ...


    By Inderscience Publishers

  • Behaviour analysis techniques for supporting critical infrastructure security

    Protecting critical infrastructures from cyber–threats in an increasingly digital age is a matter of growing urgency for governments and private industries across the globe. In a climate where cyber safety is an uncertainty, fresh and adaptive solutions to existing computer security approaches are a must. In this paper, we present our approach to supporting critical infrastructure security. Data ...


    By Inderscience Publishers

  • DHT-based security infrastructure for trusted internet and grid computing

    We designed a distributed security infrastructure with self-defence capabilities to secure networked resources in Grids and internet applications. This paper reports new developments in fuzzy trust management, game-theoretic Grid models, security-binding methodology, as well as new Grid performance metrics, defence architecture and mechanisms against intrusions, worms, and low-rate pulsing ...


    By Inderscience Publishers

  • Increasing security and protection of SCADA systems through infrastructure resilience

    In this paper, we present the approach we have taken in the INcreasing Security and Protection through Infrastructure Resilience (INSPIRE) project to improve the protection of critical information infrastructures. The core idea of the INSPIRE project is to protect critical information infrastructures (CIIs) by appropriately configuring, managing and securing the communication network ...


    By Inderscience Publishers

  • Security projects

    Location: Belle Chasse, LA Unit: C-3315 and C-4315 Project: Flood, security and spill walls Conoco Phillips Alliance Refinery sits approximately 20 miles downriver (Mississippi) from the city of New Orleans. During 2005’s Hurricane Katrina, Conoco Phillips suffered massive damage, owing to hurricane storm surge and its resulting flooding. The six-month production downtime at Conoco ...


    By HESCO Bastion, Inc.

  • Secure in quality

    ISO 9001 is the most important quality management system in use today. A company that holds ISO 9001 is telling its customers and the world that it has a top quality management system and is totally committed to quality products and services. Companies that go through the process find that profits increase thanks to opening up market opportunities. Also costs reduce due to improving efficiency. ...


    By IMSM Ltd

  • Integrating information security requirements in critical infrastructures: smart metering case

    In recent years, critical infrastructures have witnessed rapid developments in the way their services are being implemented and delivered to consumers; this was instigated by the adaptation of the latest technologies in Information Technology (IT). Despite the evident advantages of such transformation, this lead to the emergence of new challenges facing these infrastructures such as preserving ...


    By Inderscience Publishers

  • Using behavioural observation and game technology to support critical infrastructure security

    Critical infrastructures provide essential services to our everyday lives. Even a minor failure on any of these systems could result in severe consequences. Therefore, their protection, to ensure correct functioning at all times, is crucial. The fact that these systems do not exist in isolation but rather are closely interconnected with other critical and non–critical systems leads us to take a ...


    By Inderscience Publishers

  • A critical moment to harness green infrastructure—not concrete—to secure clean water

    Natural ecosystems provide essential services for our communities. Forests and wetlands, for example, filter the water we drink, protect neighborhoods from floods and droughts, and shade aquatic habitat for fish populations. While ...

  • Water infrastructure security against the current terror threat in the United States

    On May 2, 2011, the United States (U.S.) President Barack Obama announced that the U.S. forces killed Osama Bin Laden, the world's most dangerous terrorist leader that killed approximately 3000 Americans on September 11, 2011 (9/11) terror attacks.  Currently, the U.S. intelligence is in possession of valuable materials of Al Qaeda operations (Thomas, 2011).  Terrorist attack plots ...


    By IWA Publishing

  • Risk management of an information infrastructure: a framework based upon security dependencies

    A mathematical framework for the risk management of information infrastructures is presented. The framework describes the infrastructure at distinct abstraction layers by integrating four abstract models that describe, respectively, the relation among components due to the implementation, how rights are managed so that they are taken and granted among threat or users, the vulnerabilities and the ...


    By Inderscience Publishers

  • Water infrastructure security against Al Qaeda`s revenge for the death of Bin Laden

    On May 2, 2011, the United States (U.S.) President Barack Obama announced that the U.S. forces killed Osama Bin Laden, the world's most dangerous terrorist leader that killed approximately 3000 Americans on September 11, 2011 (9/11) terror attacks. Currently, the U.S. intelligence is in possession of valuable materials of Al Qaeda operations (Thomas, 2011). Terrorist attack plots include water ...


    By IWA Publishing

  • Nexus Dialogue on Water Infrastructure Solutions: Building Partnerships for Innovation in Water, Energy and Food Security

    Water, energy and food security rely on water infrastructure. Recognition of the closely bound interaction between water, energy and food production and use - the nexus - has led to new demands for water infrastructure and technology solutions. The vision is coordinated planning, development, optimization and operation of portfolios of water infrastructure for multiple goals and benefits across ...


    By IWA Publishing

  • Mining intelligence data in the benefit of critical infrastructures security: vulnerability modelling, simulation and assessment, system of systems engineering

    Within the approach of this paper, we shall use the appropriate concept of quantitative vulnerability assessment, and see the world as a System of Systems (SOS) in relation to the protection of critical infrastructures at national level. In the context of this work the SOS comprising of 278 systems ? the World States, or countries. The system as described above as a collection of critical ...


    By Inderscience Publishers

  • Polyphase FIR filters and Fant's re-sampling algorithm for securing information in critical information infrastructures: a new approach

    Efficiently managed algorithms and functional models are built so that they can comply with large scale of hardware devices, which can bring new life and offer extended capabilities to present day and future information devices. In this study, a newly derived algorithm has been implemented. It supplies coefficients to be used in a structure similar to the one that the finite impulse response ...


    By Inderscience Publishers

  • On the vulnerability of critical infrastructures: "seeing it coming"

    The paper addresses a number of concerns that are manifest in the safety management of critical infrastructures (CI) including, and especially, the effects of an increasing complexity on the safety managers' ability to comprehend and monitor the stability, predictability, and manoeuvrability of the systems at hand; the perverse effect of computer ubiquity on the CI safety quality; and, entailing ...


    By Inderscience Publishers

  • Security and privacy threats to volunteer computing

    The vision of volunteer computing is to provide large scale computational infrastructure by using dynamic collections of donated desktop computers. There have been many works that highlighted the significant benefits of volunteer computing but little on the security and privacy threats associated with its exploitation. However, volunteer computing is vulnerable to a variety of attacks and ...


    By Inderscience Publishers

  • Multiformalism techniques for critical infrastructure modelling

    This paper proposes an approach to use multiformalism techniques for critical infrastructure modelling. To this aim, the state of the art of related works on the subject is surveyed and a general scheme for intra and inter infrastructure models is described. Multiformalism approaches allow modellers to adapt the choice of formal languages to the nature, complexity and abstraction layer of the ...


    By Inderscience Publishers

  • Scaling-up investments in natural infrastructure

    Wetlands occur wherever water meets land. These deltas, marshes, rivers, lakes and watersheds are the water systems that link the natural world and human societies, and make it possible to clean, store and provide water to grow food and run businesses. As we prepare to participate in ...


    By Wetlands International

Need help finding the right suppliers? Try XPRT Sourcing. Let the XPRTs do the work for you