tailieunhanh - Development of cybersecurity and critical infrastructure protection: a case study of Thailand

This paper proposes a guideline to develop measures to handle cyber attacks and to enhance ability to prevent and recover from cyber threats in order to make cyberspace secure and sustainable. | Development of cybersecurity and critical infrastructure protection a case study of Thailand International Journal of Management IJM Volume 7 Issue 5 July Aug 2016 182 Article ID IJM_07_05_016 Available online at http ijm JType IJM amp VType 7 amp IType 5 Journal Impact Factor 2016 Calculated by GISI ISSN Print 0976-6502 and ISSN Online 0976-6510 IAEME Publication DEVELOPMENT OF CYBERSECURITY AND CRITICAL INFRASTRUCTURE PROTECTION A CASE STUDY OF THAILAND Settapong Malisuwan National Broadcasting and Telecommunications Commission NBTC Thailand ABSTRACT Nowadays critical infrastructures such as systems of water supply electricity public transportation irrigation public healthcare and banking adopt various information systems as a part of its functions and it will become essentially needed in the future because these public services will be accessible by people via the internet. As a result governments in many countries consider it as a priority to provide their people with easy and convenient internet access because it will bring many positive impacts to the country development in all aspects such as the government sector private business sector civil sector and specifically the nation to be able to increase its competitive capability. However easy internet access may lead to potential cyber risks meaning that the level of cyber protection will be decreased and cybercrime may happen without difficulty. Therefore the cyber security has become a top priority for critical infrastructures. This paper proposes a guideline to develop measures to handle cyber attacks and to enhance ability to prevent and recover from cyber threats in order to make cyberspace secure and sustainable. A case study of Thailand s national plan for critical infrastructure protection is presented in this research. The research method is qualitative in-depth interview with many experts in various fields. Inputs of secondary data are .