preview

Essay On Critical Information Infrastructure

Decent Essays

In many nations CII policies cowl tangible and intangible property and production or communications networks. Australia, as indicated by the Attorney General's Department, for instance, refers to “physical centers, supply chains, statistics technology and communication networks.” The UK's Centre for the Protection of National Infrastructure (CPNI) relates to ‘essential offerings and systems which include bodily and electronic.’ The US refers back to the ‘gadget and property, whether or not bodily or digital.’ As an entire, the term ‘vital facts infrastructure’ (CII) refers back to the infrastructure which is related to facts and statistics belongings. For instance, a civil aviation zone comprises of positive support along with airplanes, …show more content…

Data Leak, Critical Information Infrastructure, and the .... https://www.scribd.com/document/208597967/Data-Leak-Critical-Information-Infrastructure-and-the-Legal-Options-What-does-Wikileaks-teach-us
The protection of CII has been an international concern. It was reported by the OECD in May 2008 that many countries have national plans or strategies for protecting critical infrastructure. These policies generally define ‘critical infrastructure’ as physical or intangible assets whose destruction or disruption would severely undermine public safety, social order and the fulfillment of essential government duties. Such harm would by and large be cataclysmic and extensive. Wellsprings of significant framework hazard could be regular (e.g., tremors or surges) or human-made (e.g., psychological oppression, undermine).

This worry is reasonable given the way that we s step into an electronic environment where most documents are being digitized and transactions computerized, such as what is happening with revenue collection and many other applications. Given the security challenges that face electronic environment such as this, we are left with one nagging question, ‘how secure are those systems?’ The answer to this question will undoubtedly have a significant implication on

Get Access