作者: Tamir Tsegaye , Stephen Flowerday
DOI: 10.1109/WORLDCIS.2014.7028160
关键词: Information security 、 Computer science 、 Information security management 、 Interdependence 、 Security controls 、 Computer security 、 Exploit 、 Hacker 、 Internet privacy 、 Confidentiality 、 The Internet
摘要: Critical information infrastructure has enabled organisations to store large amounts of on their systems and deliver it via networks such as the internet. Users who are connected internet able access various services provided by critical infrastructure. However, some have not effectively secured hackers, disgruntled employees other entities taken advantage this launching cyberattacks They do using cyberthreats exploit vulnerabilities in which fail secure. As a result, steal or damage confidential stored take down websites, preventing information. Despite this, risk strategies can be used implement number security controls: preventive, detective corrective controls, together form system controls. This will ensure that confidentiality, integrity availability is preserved, thus reducing risks controls based General Systems Theory, states elements interdependent contribute operation whole system. Finally, model proposed address insecure