Folder Critical infrastructure protection

Documents

default Could the next homeland attack be against US seaport cyber security? Popular

By 1679 downloads

Dr. Jim Kennedy highlights the importance of the port and maritime sector to business-as-usual for the US economy; and asks whether an ISIS information security attack could target the US maritime, vessel and port computing network infrastructure.

default Protecting critical infrastructure against cyber attacks Popular

By 1891 downloads

With attacks on critical infrastructure growing, Oded Gonda discusses the threat to SCADA networks and ICS and how these vital services can be protected.

default Protecting critical infrastructure from threats Popular

By 1941 downloads

Tony Berning looks at some of the issues that need to be considered when making decisions about security policies for a critical infrastructure facility.

default The urgent need to secure critical infrastructure from cyber threats Popular

By 1650 downloads

The world is not ready for cyber attacks on critical infrastructure. Governments are not ready, law enforcement isn’t ready, the facilities themselves are not ready, and the people who design, build and operate them are often the least ready of all. Unfortunately, the criminals are very ready indeed.


Want news and features emailed to you?

Signup to our free newsletters and never miss a story.

A website you can trust

The entire Continuity Central website is scanned daily by Sucuri to ensure that no malware exists within the site. This means that you can browse with complete confidence.

Business continuity?

Business continuity can be defined as 'the processes, procedures, decisions and activities to ensure that an organization can continue to function through an operational interruption'. Read more about the basics of business continuity here.

Get the latest news and information sent to you by email

Continuity Central provides a number of free newsletters which are distributed by email. To subscribe click here.