Your final research paper assignment is to write a research paper that explains how defense-in-depth (chapter 6) and awareness (chapter 10) are complimentary techniques to detect emerging threats and
Annotated Bibliography on Defense of Critical Infrastructure Literature |
Midterm Paper
University of the Cumberland’s
1. Plėta, T., Karasov2, S., & Jakštas3, T. (2018). THE MEANS TO SECURE CRITICAL ENERGY INFRASTRUCTURE. JOURNAL OF SECURITY AND SUSTAINABILITY ISSUES, Vol 7 Number 3
The writers clearly examine the issue of cyber security and why it is imperative for nations like Ukraine to handle the problem. The book provides important insights into some of the solutions that Ukraine as a nation had to adopt while offering the background to the issue. The article, however, does not back up its key assumptions with relevant statistics. Statistics are a better way of appreciating the gravity of an issue. In addition, the recommendation part reflects a great deal of bias, as the writers recommend that Ukraine can overcome the problem of cybercrime through co-operating with Nato.
2. Fowler, S. (217). Developing cyber-security policies that penetrate Australian defense. Journal of the Australian Profession of Arms, issue No. 202 18-25
The journal article provides a detailed solution to the problem of cyber security. The writers are keen to provide a critical examination of the factors that leads to increased vulnerabilities. This is also supported by statistics especially the emerging trends and international relation and geopolitics that will lead to increased culpability. However, the scholars oversimplify the issue of attack as solely related to military defense while leaving behind the role of civilians in ameliorating the problem.
3. Tabansky, L., & Neeman, Y. (July-September 2013). Critical Infrastructure Protection; Evolution of Israeli Policy. International Journal of Cyber Warfare and Terrorism, 3(3), 80-87.
This journal article is one of the few that examines the grave challenges posed by cyber security while at the same time suggesting detailed and concrete solutions to the problem. The paper appreciates the role of policy in ameliorating the situation. Nevertheless, the paper does not employ concrete analytical research data to back up its key assumption; that the greatest threat to critical infrastructure is posed by cybercrime.
4. Condron, S. M. (2007). Getting it right; protecting American critical infrastructure in cyberspace. Harvard Journal of Law & Technology, Volume 20, Number 2, 404-421.
This is a seminal journal article that comprehensively integrates the various issues that characterize the attempt by a nation to overcome the problem of cybercrime through national defense, specifically pointing out the issue as it relates to civil liberties. The writers also appreciate through statistics the grave effect of cyber warfare. However, there is a general lack of theories of securities and international relation. Theories provide critical viewpoints and scholars are encouraged to employ theories whenever they attempt to resolve the societal problem.
5. Brown, G., Carlyle, M., Salmerón, J., & Wood, K. (2006). Defending Critical Infrastructure. Interface Journal, Vol. 36, No. 6pp. 530–54
This journal article is rather a comprehensive and holistic approach to the imperative issue of critical infrastructure protection. The writers critically examine the gravity of threat while recommending the best strategy that can be employed to overcome the challenges posed by threats to critical infrastructure such as terrorism. In addition, the article assesses the challenges concomitant with the application of invaluable theories and models. The writers, however, are written with a terrorism perspectives and fail to appreciate other notable threats to national infrastructure.
6. Rakovski, G. S. (2015). ASPECTS OF POLICIES AND STRATEGIES FOR CYBERSECURITY IN THE EUROPEAN UNION. Journal of defense resources management, volume6_issue2/05.
This is one of the most comprehensive evaluations of the potential threat posed by computer technology and cybercrime to critical national infrastructure. The authors essentially consider models and theories in the seminal article, hence relating well with trends and challenges facing the defense of critical infrastructure. However, the article fails to appreciate the threat to national security posed by other factors such as terrorism and the notable moral dilemma that comes along with enforcing laws that would guarantee a safe cyberspace.
7. Dunn, M. (2005). Understanding Critical Information Infrastructures: An elusive quest. International Journal for Critical Infrastructure Protection, Vol. 1, No. 2/3.
This is one of the peer-reviewed journals that appreciate the grave problem faced when protecting critical infrastructure such as communication. The journal article appreciates the cost issues that come along with the daunting task of protecting critical infrastructure. More also, the writer comprehensive analyses the cause of the problem and the challenges of protecting critical infrastructure. Nevertheless, there is a general lack of application of theories in the article.
References
Brown, G., Carlyle, M., Salmerón, J., & Wood, K. (2006). Defending Critical Infrastructure. Interface journal, Vol. 36, No. 6pp. 530–54.
Condron, S. M. (2007). Getting it right;protecting american critical infrastructure in cyber space. Harvard Journal of Law & Technology, Volume 20, Number 2, 404-421.
Dunn, M. (2005). Understanding Critical Information Infrastructures: An elusive quest. International Journal for Critical Infrastructure Protection, Vol. 1, No. 2/3.
Fowler, S. (217). Developing cyber-security policies that penetrate Australian defence. Journal of the Australian Profession of Arms, ssue No. 202,.
Plėta, T., Karasov2, S., & Jakštas3, T. (2018 ). THE MEANS TO SECURE CRITICAL ENERGY INFRASTRUCTURE. JOURNAL OF SECURITY AND SUSTAINABILITY ISSUES, VOl 7 Number 3.
Rakovski, G. S. (2015). ASPECTS OF POLICIES AND STRATEGIES FOR CYBER SECURITY IN THE EUROPEAN UNION. Journal of defense resources management, volume6_issue2/05.
Tabansky, L., & Ne’eman, Y. ( July-September 2013). Critical Infrastructure ProtectionEvolution of Israeli Policy. International Journal of Cyber Warfare and Terrorism,, 3(3), 80-87.