infrastructure security service Articles

  • Emergent information security in critical infrastructures

    The growing tendency to inter-weaving infrastructures makes them more complex, less manageable, and more vulnerable to random system failures. Several information systems are usually added to manage and control such infrastructures. However, in this internet era these information infrastructures have increasingly become the targets of sophisticated (denial of service) attacks, which cause random ...


    By Inderscience Publishers

  • Critical infrastructures at risk: securing electric power supply

    The proper functioning of large infrastructures and in particular, the continuity of the vital services they provide is largely taken for granted, both by direct users and by those responsible for other, dependent infrastructures and services. The current paper addresses in a methodical manner, methods to deal with issues related to the risk and risk governance of critical infrastructures, with ...


    By Inderscience Publishers

  • Netherlands’ Mobile Emergency Pumps Provide Rapid Flood Response

    The Western European nation has 20 mobile diesel-driven pumps on standby, ready to assist in national and international emergencies. One of the smallest and most densely populated countries in Western Europe, the Netherlands has nearly 10 million residents who live and work below sea level. Without active water management and primary flood defenses, ...


    By BBA Pumps

  • BBA Mobile Emergency Pumps Provide Rapid Response for Floods

    Netherlands’ Mobile Emergency Pumps Provide Rapid Flood Response In its latest edition, the North American PUMPS & SYSTEMS magazine publishes an in-depth article featuring the history and current usage of emergency mobile pumps. The Western European ...


    By BBA Pumps

  • DHT-based security infrastructure for trusted internet and grid computing

    We designed a distributed security infrastructure with self-defence capabilities to secure networked resources in Grids and internet applications. This paper reports new developments in fuzzy trust management, game-theoretic Grid models, security-binding methodology, as well as new Grid performance metrics, defence architecture and mechanisms against intrusions, worms, and low-rate pulsing ...


    By Inderscience Publishers

  • Integrating information security requirements in critical infrastructures: smart metering case

    In recent years, critical infrastructures have witnessed rapid developments in the way their services are being implemented and delivered to consumers; this was instigated by the adaptation of the latest technologies in Information Technology (IT). Despite the evident advantages of such transformation, this lead to the emergence of new challenges facing these infrastructures such as preserving ...


    By Inderscience Publishers

  • Using behavioural observation and game technology to support critical infrastructure security

    Critical infrastructures provide essential services to our everyday lives. Even a minor failure on any of these systems could result in severe consequences. Therefore, their protection, to ensure correct functioning at all times, is crucial. The fact that these systems do not exist in isolation but rather are closely interconnected with other critical and non–critical systems leads us to take a ...


    By Inderscience Publishers

  • A critical moment to harness green infrastructure—not concrete—to secure clean water

    Natural ecosystems provide essential services for our communities. Forests and wetlands, for example, filter the water we drink, protect neighborhoods from floods and droughts, and shade aquatic habitat for fish populations. While ...

  • Energy Security

    Renewable & Clean Energy Solutions to Secure Energy Independence from Foreign Oil. FOREIGN OIL: As imports grow and world prices rise, the amount of money we send to foreign nations every year is soaring. At current oil prices, we will send $700 billion dollars out of the country this year alone — that’s four times the annual cost of the ...

  • Secure in quality

    ISO 9001 is the most important quality management system in use today. A company that holds ISO 9001 is telling its customers and the world that it has a top quality management system and is totally committed to quality products and services. Companies that go through the process find that profits increase thanks to opening up market opportunities. Also costs reduce due to improving efficiency. ...


    By IMSM Ltd

  • Water infrastructure security against Al Qaeda`s revenge for the death of Bin Laden

    On May 2, 2011, the United States (U.S.) President Barack Obama announced that the U.S. forces killed Osama Bin Laden, the world's most dangerous terrorist leader that killed approximately 3000 Americans on September 11, 2011 (9/11) terror attacks. Currently, the U.S. intelligence is in possession of valuable materials of Al Qaeda operations (Thomas, 2011). Terrorist attack plots include water ...


    By IWA Publishing

  • DNS as critical infrastructure, the energy system case study

    Modern critical infrastructures (e.g., power plants, energy grids, oil pipelines, etc.), make nowadays extensive use of information and communication technologies (ICT). As a direct consequence their exposure to cyber–attacks is becoming a matter of public security. In this paper, we analyse a particular infrastructure, rarely considered as source of threats, on which indeed the majority of ...


    By Inderscience Publishers

  • Global food security is a moral imperative

    We must work to overcome hunger not only for economic and political reasons, but also because it is the right thing to do. It is peculiar to live in a world where hunger is an endemic problem for half the planet while diet books are best sellers in the other half. This point is often lost in the broader bundle of jargon that now defines the conversation on food security in the ...


    By Ensia

  • Evaluating infrastructure resource allocation in support of regional stability

    Post–conflict stability is a tenuous goal for security forces and host nation governments alike. Recent experiences of North Atlantic Treaty Organization (NATO) members and coalition partners in Afghanistan have illuminated how insurgencies damage stability operations despite great sacrifice and enormous commitments of resources. Stability operations focus on security, governance, development, ...


    By Inderscience Publishers

  • Investing in Water Infrastructure: Capital, Operations and Maintenance

    This paper outlines the major challenges related to financing the gap in global water infrastructure, including those systems that provide urban and rural water supply, and sanitation and irrigation services. The paper synthesizes the extensive body of literature on this subject, providing some examples of historical ...


    By IWA Publishing

  • House of commons committee on transport, infrastructure and communities

    The Canadian Water and Wastewater Association represents the interests of municipal water and wastewater services in respect to federal or national legislation, policies and programs. More than 24 million Canadians receive drinking water from municipal services and discharge wastewater to those services. The services are provided on a notfor-profit, public service basis. Revenues derived from ...

  • Assessing the performance of interdependent infrastructures and optimising investments

    Our nation's security as well as the quality of life of its citizenry depends on the continuous reliable operation of a collection of complicated interdependent infrastructures including transportation, electric power, oil, gas, telecommunications and emergency services. A disruption in one infrastructure can quickly and significantly impact another, causing ripples across the nation. Our ...


    By Inderscience Publishers

  • Unbounded impacts and risk mitigation in billing infrastructures

    A billing infrastructure is an information and communications technology system that bills a set of customers for some service they access. We discuss how the minimisation of the infrastructure cost may introduce components that are points of catastrophic failure in a security perspective because successful attacks against these components result in a full control of the infrastructure. We ...


    By Inderscience Publishers

  • Using scenarios to improve understanding of environment and security issues

    The need to address environment and security For many people, the term 'national security' suggests images of military and police efforts to preserve peace and stability. Environmental issues are seldom seen to play a major role in security but in fact the issues are inextricably linked. Resource overexploitation and changes in climate affect quality of life, potentially ...

  • Network security mechanisms utilising network address translation

    A new protocol technology is just starting to emerge from the laboratory environment. Its stated purpose is to provide a means whereby networks, and the services that reside on them, can be protected from adversarial compromise. This protocol called Dynamic Network Address Translation (Dynat) is designed to protect computer networks against cyber attacks. Briefly, Dynat changes network ...


    By Inderscience Publishers

Need help finding the right suppliers? Try XPRT Sourcing. Let the XPRTs do the work for you