CRITICAL INFORMATION INFRASTRUCTURE SECURITY - NETWORK INTRUSION DETECTION SYSTEMS
Critical Information Infrastructure security will always be difficult to ensure, just because of the features that make it irreplaceable tor other critical infrastructures normal operation. It is decentralized, interconnected interdependent, controlled by multiple actors (mainly private) and incorpo...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Academy of Romanian Scientists Publishing House
2011-12-01
|
Series: | Annals: Series on Military Sciences |
Subjects: | |
Online Access: | http://www.aos.ro/wp-content/anale/MTVol3Nr2Art.5.pdf |
id |
doaj-7ba4edc075f64a1d8e958f092548c247 |
---|---|
record_format |
Article |
spelling |
doaj-7ba4edc075f64a1d8e958f092548c2472020-11-24T21:39:02ZengAcademy of Romanian Scientists Publishing HouseAnnals: Series on Military Sciences2066-70862457-83122011-12-01325158CRITICAL INFORMATION INFRASTRUCTURE SECURITY - NETWORK INTRUSION DETECTION SYSTEMSCristea DUMITRU0Lieutenant General Professor, PhD, corresponding member Academy of Romanian ScientinstsCritical Information Infrastructure security will always be difficult to ensure, just because of the features that make it irreplaceable tor other critical infrastructures normal operation. It is decentralized, interconnected interdependent, controlled by multiple actors (mainly private) and incorporating diverse types of technologies. It is almost axiomatic that the disruption of the Critical Information Infrastructure affects systems located much farther away, and the cyber problems have direct consequences on the real world. Indeed the Internet can be used as a multiplier in order to amplify the effects of an attack on some critical infrastructures. Security challenges increase with the technological progress. One of the last lines of defense which comes to complete the overall security scheme of the Critical Information Infrastructure is represented by the Network Intrusion Detection Systems.http://www.aos.ro/wp-content/anale/MTVol3Nr2Art.5.pdfCritical Information Infrastructure SecurityIntrusion Detection SystemsSCADANIDS |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Cristea DUMITRU |
spellingShingle |
Cristea DUMITRU CRITICAL INFORMATION INFRASTRUCTURE SECURITY - NETWORK INTRUSION DETECTION SYSTEMS Annals: Series on Military Sciences Critical Information Infrastructure Security Intrusion Detection Systems SCADA NIDS |
author_facet |
Cristea DUMITRU |
author_sort |
Cristea DUMITRU |
title |
CRITICAL INFORMATION INFRASTRUCTURE SECURITY - NETWORK INTRUSION DETECTION SYSTEMS |
title_short |
CRITICAL INFORMATION INFRASTRUCTURE SECURITY - NETWORK INTRUSION DETECTION SYSTEMS |
title_full |
CRITICAL INFORMATION INFRASTRUCTURE SECURITY - NETWORK INTRUSION DETECTION SYSTEMS |
title_fullStr |
CRITICAL INFORMATION INFRASTRUCTURE SECURITY - NETWORK INTRUSION DETECTION SYSTEMS |
title_full_unstemmed |
CRITICAL INFORMATION INFRASTRUCTURE SECURITY - NETWORK INTRUSION DETECTION SYSTEMS |
title_sort |
critical information infrastructure security - network intrusion detection systems |
publisher |
Academy of Romanian Scientists Publishing House |
series |
Annals: Series on Military Sciences |
issn |
2066-7086 2457-8312 |
publishDate |
2011-12-01 |
description |
Critical Information Infrastructure security will always be difficult to ensure, just because of the features that make it irreplaceable tor other critical infrastructures normal operation. It is decentralized, interconnected interdependent, controlled by multiple actors (mainly private) and incorporating diverse types of technologies. It is almost axiomatic that the disruption of the Critical Information Infrastructure affects systems located much farther away, and the cyber problems have direct consequences on the real world. Indeed the Internet can be used as a multiplier in order to amplify the effects of an attack on some critical infrastructures. Security challenges increase with the technological progress. One of the last lines of defense which comes to complete the overall security scheme of the Critical Information Infrastructure is represented by the Network Intrusion Detection Systems. |
topic |
Critical Information Infrastructure Security Intrusion Detection Systems SCADA NIDS |
url |
http://www.aos.ro/wp-content/anale/MTVol3Nr2Art.5.pdf |
work_keys_str_mv |
AT cristeadumitru criticalinformationinfrastructuresecuritynetworkintrusiondetectionsystems |
_version_ |
1725933061339611136 |