It includes the historical aspects of ICT development, and a broad classification of cybersecurity problems.
What new knowledge did you gain whilst writing the book?
The kindle version ofRecent Advances in Cybersecurityis available for purchase onAmazon.
Thus each year, considerable amount of budget spent in research, development, and innovations in this area.
The six log term goals of this plan are as follows:
- based on this definition, the following Sectors are identified as State critical Infrastructures[158].
Presidential directive 62 and 63 on 1998 to protect critical infrastructure [160].
National Strategy for Information-Sharing this strategy defines the information sharing protocol between different government sectors.
This strategy updated in 2012 after the Wikileaks problem [166].
Defense Community group: This is work on developing strategic cybersecurity strategy for define and industrial defense systems.
are forming information sharing focal point to share risk information.
Figure 12.2: the website for information sharing centers (Source: http://www.isaccouncil.org/memberisacs.html)
10.
Figure 12.3, shows the main web page of these groups(www.staysafeonline.org)
Figure 12. : this Law defines and regulates the information sharing between the government sectors.
Executive Order 13010 to establish critical infrastructures protection [181].
Executive Order 13231 of October 16 2001 to protect critical infrastructures based on information system [185].
like, comment on how to improve this article.