Protecting Critical Information Infrastructures
Resumo
The use of information systems in the management and operation of critical infrastructures has grown explosively around the world and, today, there are such infrastructures that do not have a strong dependency on software, computers and networks. No technology is perfect and dealing with malfunctions is part of the responsibilities of all those who supply and operate such technology. The ubiquity of global networks such as the Internet has created an additional challenge: attempts, often successful, to access such technologies by external parties intent in disrupting their operations for any of a number of reasons, ranging from “because I can” to activism and, potentially, military and/or terrorist. The challenges of protecting the critical information infrastructures, on which society depends to function, are many and complex as they have to deal with three imperfect components: people, processes and technology. This article provides an overview of these challenges and includes pointers and references to established standards and good practices.