ログイン
言語:

WEKO3

  • トップ
  • ランキング
To
lat lon distance
To

Field does not validate



インデックスリンク

インデックスツリー

メールアドレスを入力してください。

WEKO

One fine body…

WEKO

One fine body…

アイテム

  1. SSMSパブリケーション
  2. Vol.06

Towards a Secure and Sustainable Critical Information Infrastructure(CII) : A Study on the Policy and Legal Frameworks in Malaysia

http://hdl.handle.net/10173/1794
http://hdl.handle.net/10173/1794
56775603-ab72-435d-aee0-4dec74502c9c
名前 / ファイル ライセンス アクション
SMS10-121.pdf SMS10-121.pdf (85.0 kB)
Item type 会議発表論文 / Conference Paper(1)
公開日 2018-02-06
タイトル
タイトル Towards a Secure and Sustainable Critical Information Infrastructure(CII) : A Study on the Policy and Legal Frameworks in Malaysia
言語
言語 eng
キーワード
主題Scheme Other
主題 critical information infrastructure
キーワード
主題Scheme Other
主題 legal framework
資源タイプ
資源タイプ識別子 http://purl.org/coar/resource_type/c_5794
資源タイプ conference paper
著者 Zulhuda, Sonny

× Zulhuda, Sonny

Zulhuda, Sonny

Search repository
抄録
内容記述タイプ Abstract
内容記述 The increasing reliance of critical infrastructures (such as those operating the national communications, energy, transport, and defence systems) on a computerized and networked environment imposes an enormous security task for both their operators and users. The fact that attack to critical infrastructure is not merely an ordinary criminal matter but rather an issue of national security makes it more urgent for policy-makers to come up with policies or laws addressing various issues ranging from information sharing to public-private cooperation, from technical solutions to security procedures, and from public awareness to law enforcement. Looking at the scope it covers and the role it plays, the law on critical information infrastructures is so critical not only because it is part of national security measures, but also because the law may well determine the level of national readiness for landing a global investment. This is true because major business processes are now dependent on the secure information technology tools and networks. The biggest task ahead for policy-makers is therefore to prepare the best legal framework to protect the country’s critical information infrastructure and, at least, to manage and minimise the security risks that surround a networked environment. This paper hypothesizes that security risk management of the critical information infrastructure can not be effectively sustained without a comprehensive framework that consists of, among others, good policies and legal framework. In Malaysia, the legal framework on CII can be found in several pieces of legislation. This paper seeks to discuss the role of the law especially on the restriction of access to and movement in the perimeters of CII as well as the law on computer and network security.
書誌情報 Society for Social Management Systems Internet Journal

巻 6, 号 1, 発行日 2010-03
ISSN
収録物識別子タイプ ISSN
収録物識別子 2432-552X
著者版フラグ
出版タイプ VoR
出版タイプResource http://purl.org/coar/version/c_970fb48d4fbd8a85
出版者
出版者 Society for Social Management Systems
戻る
0
views
See details
Views

Versions

Ver.1 2023-05-15 13:18:47.553258
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Cite as

エクスポート

OAI-PMH
  • OAI-PMH JPCOAR 2.0
  • OAI-PMH JPCOAR 1.0
  • OAI-PMH DublinCore
  • OAI-PMH DDI
Other Formats
  • JSON
  • BIBTEX

Confirm


Powered by WEKO3


Powered by WEKO3