tailieunhanh - Network security: Protecting our critical infrastructures

Not shown in Fig. 1 are some elements of the network that complicate security efforts. There may be a corporate firewall or network address translation (NAT) features that will require communication between the building services staff and IT staff, but will also provide greater protection against IT threats. There may be other external connections from a trusted network that bypass the SR, . a modem connection. Also not shown are physical security implementation details. Are the controllers in secure locations? Is there a security policy that governs operator access to the system (passwords, keys), mainte- nance procedures, presence of tamper. | Network security Protecting our critical infrastructures This paper was prepared by Professor Seymour E. Goodman Pam Hassebroek and Professor Hans Klein Georgia Institute of Technology United States . Network Security Protecting our critical infrastructures forms part of the Visions of the Information Society project managed by Lara Srivastava Policy Analyst in the Strategy and Policy Unit of the International Telecommunication Union ITU . More information can be found at http visions. The views expressed in this report are those of the authors and do not necessarily reflect the opinion of ITU or its membership. Table of contents 1 Introduction The nature of the Cyberspace is Cyberspace is 2 Strategic defence Preventing an Thwarting an Limiting damage during a successful Reconstituting after an Improving defender 3 Forms of international International The standards development Open source security Incentives to establish security International alliance for security Information International cooperative Clearinghouse Halting cyber attacks in Harmonizing legal Providing assistance to developing 4 Finding a suitable framework for international An ideal Necessary characteristics of an approximate real-world International cooperation Cyberspace Initiative s in other Problems with cooperation initiatives for Problems in a partially private approach .17 5 Concluding .