Searched for:
(1 - 20 of 21)

Pages

document
Luiijf, E. (author), Klaver, M. (author)
This chapter discusses new societal risk due to the fast information and communication as well as operational technology changes which are not yet fully taken into account by governmental policymakers and regulators. Internet-of-things, cloud computing, mass consumer markets and embedded operational technologies are some of the areas outlined in...
bookPart 2019
document
Luiijf, H.A.M. (author)
bookPart 2016
document
Sullivan, D. (author), Luiijf, H.A.M. (author), Colbert, E.J.M. (author)
bookPart 2016
document
Luiijf, H.A.M. (author)
bookPart 2016
document
Luiijf, H.A.M. (author)
bookPart 2015
document
Luiijf, H.A.M. (author)
Our society and its citizens increasingly depend on the undisturbed functioning of critical infrastructures (CI), their products and services. Many of the CI services as well as other organizations use Industrial Control Systems (ICS) to monitor and control their mission-critical processes. Therefore, it is crucial that the functioning of ICS is...
bookPart 2015
document
Luiijf, H.A.M. (author)
Advancements in information and communication technologies (ICT) inextricably bring new threats to the end-users and society. However, the last 40 years have shown that many of the same cyber security design and programming failures occur over and over again when a new ICT innovation and development cycle takes place. Unfortunately, this allows...
bookPart 2014
document
Luiijf, H.A.M. (author)
The phrase cyber terror appeared for the first time in the mid-eighties. According to several sources, Barry C. Collin, a senior person research fellow of the Institute for Security and Intelligence in California, defined cyber terror at that time as “the convergence of cybernetics and terrorism”—an elegant and simple definition. That definition...
bookPart 2014
document
Luiijf, H.A.M. (author)
This chapter reviews current and anticipated cyber-related threats to the Critical Information Infrastructure (CII) and Critical Infrastructures (CI). The potential impact of cyber-terrorism to CII and CI has been coined many times since the term was first coined during the 1980s. Being the relevance to consider possible threats and their impact...
bookPart 2012
document
Lindstrom, G. (author), Luiijf, H.A.M. (author)
bookPart 2012
document
Luiijf, H.A.M. (author), Healey, J. (author)
The purpose of this section is to review specific types of national cyber security (NCS) areas (also called ‘mandates’) and examine the organisational and collaborative models associated with them. Before discussing the wide variety of organisational structures at the national and international levels, a decomposition model will be presented...
bookPart 2012
document
Luiijf, H.A.M. (author), Ali, M. (author), Zielstra, A. (author), TNO Defensie en Veiligheid (author)
International studies have shown that information security for process control systems, in particular SCADA, is weak. As many critical infrastructure (CI) services depend on process control systems, any vulnerability in the protection of process control systems in CI may result in serious consequences for citizens and society. In order to...
bookPart 2009
document
TNO Defensie en Veiligheid (author), Luiijf, H.A.M. (author), Nieuwenhuijs, A.H. (author), Klaver, M.H.A. (author), van Eeten, M. (author), Cruz, E. (author)
One type of threat consistently identified as a key challenge for Critical Infrastructure Protection (CIP) is that of cascading effects caused by dependencies and interdependencies across different critical infrastructures (CI) and their services. This paper draws on a hitherto untapped data source on infrastructure dependencies: a daily...
bookPart 2009
document
Luiijf, H.A.M. (author), TNO Defensie en Veiligheid (author)
bookPart 2008
document
Christiansson, H. (author), Luiijf, H.A.M. (author), TNO Defensie en Veiligheid (author)
Supervisory control and data acquisition (SCADA) systems are commonly used to monitor and control critical infrastructure assets. However, over the past two decades, they have evolved from closed, proprietary systems to open networks comprising commodity platforms running common operating systems and TCP/IP stacks. The open architecture and...
bookPart 2008
document
TNO Defensie en Veiligheid (author), Luiijf, H.A.M. (author), Brouwer, W. (author), Griffioen, A. (author)
Using the so-called Quick Scan method and in consultation with the industry and government, it was determined in 2002 that the Netherlands’ critical infrastructure comprises 11 sectors and 31 critical products and services. That result was adjusted in the ensuing risk analysis phase. Since April 2004, the list comprises 12 critical sectors and...
bookPart 2008
document
Luiijf, H.A.M. (author), Klaver, M.H.A. (author), Huizenga, J. (author), van Till, J. (author), de Boer, R. (author), van de Sandt, C.H.C. (author), Maclaine Pont, P. (author), TNO Fysisch en Elektronisch Laboratorium (author)
bookPart 2003
document
Luiijf, H.A.M. (author), TNO Fysisch en Elektronisch Laboratorium (author)
bookPart 2002
document
Luiijf, H.A.M. (author), TNO Fysisch en Elektronisch Laboratorium (author)
Onze westerse en specifiek de Nederlandse samenleving wordt in sterk toenemende mate afhankelijk van diensten die zijn gebaseerd op informatie- en communicatietechnologie (ICT). Onze informatiesamenleving is daarbij afhankelijk van het goed functioneren van een zeer complex geheel van elektronische diensten, programmatuur, computers,...
bookPart 2001
document
Luiijf, H.A.M. (author), TNO Fysisch en Elektronisch Laboratorium (author)
bookPart 1999
Searched for:
(1 - 20 of 21)

Pages