(Ebook PDF) Critical Infrastructure Protection Advances in Critical Infrastructure Protection Information Infrastructure Models Analysis and Defense 1st Edition by Javier Lopez, ‎Roberto Setola, ‎Stephen Wolthusen 3642289207 9783642289200 full chapters - Quickly access the ebook and start reading today
(Ebook PDF) Critical Infrastructure Protection Advances in Critical Infrastructure Protection Information Infrastructure Models Analysis and Defense 1st Edition by Javier Lopez, ‎Roberto Setola, ‎Stephen Wolthusen 3642289207 9783642289200 full chapters - Quickly access the ebook and start reading today
https://ebookball.com/product/critical-infrastructure-protection-in-
homeland-security-1st-edition-by-ted-lewis-
isbn-9780471786283-047178628x-13746/
https://ebookball.com/product/cyber-infrastructure-protection-1st-
edition-by-tarek-saadawi-louis-jordan-
isbn-1470064359-9781470064358-11734/
https://ebookball.com/product/policymaking-for-critical-
infrastructure-1st-edition-by-gordon-
gow-1351151584-9781351151580-20598/
Editorial Board
David Hutchison
Lancaster University, UK
Takeo Kanade
Carnegie Mellon University, Pittsburgh, PA, USA
Josef Kittler
University of Surrey, Guildford, UK
Jon M. Kleinberg
Cornell University, Ithaca, NY, USA
Alfred Kobsa
University of California, Irvine, CA, USA
Friedemann Mattern
ETH Zurich, Switzerland
John C. Mitchell
Stanford University, CA, USA
Moni Naor
Weizmann Institute of Science, Rehovot, Israel
Oscar Nierstrasz
University of Bern, Switzerland
C. Pandu Rangan
Indian Institute of Technology, Madras, India
Bernhard Steffen
TU Dortmund University, Germany
Madhu Sudan
Microsoft Research, Cambridge, MA, USA
Demetri Terzopoulos
University of California, Los Angeles, CA, USA
Doug Tygar
University of California, Berkeley, CA, USA
Gerhard Weikum
Max Planck Institute for Informatics, Saarbruecken, Germany
Javier Lopez Roberto Setola
Stephen D. Wolthusen (Eds.)
Critical
Infrastructure
Protection
Information Infrastructure Models,
Analysis, and Defense
13
Volume Editors
Javier Lopez
University of Malaga
Computer Science Department
29071 Malaga, Spain
E-mail: jlm@lcc.uma.es
Roberto Setola
University CAMPUS Bio- Medico di Roma
Complex Systems and Security Lab
Via Alavro del Portillo, 21
00128 Roma, Italy
E-mail: r.setola@unicampus.it
Stephen D. Wolthusen
University of London
Information Security Group
Department of Mathematics
Egham, Surrey TW20 0EX, UK
and
Gjøvik University College
Norwegian Information Security Laboratory
Faculty of Computer Science
2802 Gjøvik, Norway
E-mail: stephen.wolthusen@rhul.ac.uk
We hope that this book can serve as a timely introduction to the state of
the art in critical infrastructure protection, particularly for the information in-
frastructure, and as such may aid both researchers to gain an overview of a field
that is still largely dominated by conference publications and a disparate body
of literature, but also lecturers wishing to prepare postgraduate-level courses in
this rapidly moving and multifaceted field.
Andreas Aas
Norwegian University of Science and Technology, Norway
E-mail: aasand@jbv.no
Cristina Alcaraz
Computer Science Department, University of Malaga, Spain
E-mail: alcaraz@lcc.uma.es
Ettore Bompard
Department of Electrical Engineering, Politecnico di Torino, Italy
E-mail: ettore.bompard@polito.it
Fernando Carvajal
INDRA, Spain
E-mail: jfcarvajal@indra.es
Paolo Cuccia
Department of Dispatching and Grid Operation, Terna S.p.A, Italy
E-mail: paolo.cuccia@terna.it
Jordi Cucurull
Department of Computer and Information Science,
Linköping University, Sweden
E-mail: g-jorcu@ida.liu.se
Myriam Dunn Cavelty
Center for Security Studies, ETH Zurich, Switzerland
E-mail: dunn@sipo.gess.ethz.ch
Gerardo Fernandez
Computer Science Department, University of Malaga, Spain
E-mail: gerardo@lcc.uma.es
Igor Nai Fovino
Institute for the Protection and Security of the Citizen, Joint Research Center,
European Commission
E-mail: igor.nai@jrc.ec.europa.eu
Andrea Glorioso
European Commission DG Information Society and Media, Unit A3 - Internet,
Network and Information Security
E-mail: Andrea.Glorioso@ec.europa.eu
VIII List of Contributors
Daniel Germanus
Computer Science Department, Technische Universität Darmstadt, Germany
E-mail: germanus@cs.tu-darmstadt.de
Rajni Goel
Department of Information Systems and Decision Sciences,
Howard University, USA
E-mail: rgoel@howard.edu
Stuart Goldman
USA
E-mail: familygoldman@gmail.com
Bernhard Hämmerli
Department of Computer Science, Norwegian Information Security Laboratory,
Gjøvik University Collage, Norway
E-mail: bmhaemmerli@acris.ch; E-mail: Bernhard.Hammerli@hig.no
Mark Hartong
Federal Railroad Administration, U.S. Department of Transportation, USA
E-mail: mark.hartong@dot.gov
Stig O. Johnsen
Norwegian University of Science and Technology, Norway
E-mail: Stig.O.Johnsen@gmail.com
Abdelmajid Khelil
Computer Science Department, Technische Universität Darmstadt, Germany
E-mail: khelil@cs.tu-darmstadt.de
Javier Lopez
Computer Science Department, University of Malaga, Spain
E-mail: jlm@lcc.uma.es
Eric Luiijf
Netherlands Organisation for Applied Scientific Research - TNO,
The Netherlands
E-mail: eric.luiijf@tno.nl
Marcelo Masera
Institute for Energy, Joint Research Center, European Commission
E-mail: marcelo.masera@jrc.it
Simin Nadjm-Tehrani
Department of Computer and Information Science, Linköping University,
Sweden
E-mail: simin@ida.liu.se
Ying Qian
Shanghai University, Shanghai
E-mail: iris qian@hotmail.com
List of Contributors IX
Massimiliano Raciti
Department of Computer and Information Science,
Linköping University, Sweden
E-mail: masra@ida.liu.se
Julian L. Rrushi
Faculty of Computer Science, University of New Brunswick, Canada
E-mail: jrrushi@unb.ca
Andrea Servida
European Commission DG Information Society and Media, Unit A3 - Internet,
Network and Information Security
E-mail: Andrea.Servida@ec.europa.eu
Roberto Setola
Faculty of Engineering, Universitá Campus Bio-Medico di Roma, Italy
E-mail: r.setola@unicampus.it
Neeraj Suri
Computer Science Department, Technische Universität Darmstadt, Germany
E-mail: suri@cs.tu-darmstadt.de
Manuel Suter
Center for Security Studies, ETH Zurich, Switzerland
E-mail: suter@sipo.gess.ethz.ch
Nils Kalstad Svendsen
Norwegian Information Security Laboratory, Faculty of Computer Science,
Gjøvik University College, Norway
E-mail: nils.svendsen@hig.no
Huseyin Uzunalioglu
Alcatel-Lucent, USA
E-mail: huseyin.uzunalioglu@alcatel-lucent.com
Dumida Wijesekra
Department of Computer Science, George Mason University, USA
E-mail: dwijesek@gmu.edu
Stephen D. Wolthusen
Norwegian Information Security Laboratory, Faculty of Computer Science,
Gjøvik University College, Norway
E-mail: stephen.wolthusen@hig.no and
Information Security Group, Department of Mathematics, Royal Holloway,
University of London, UK
E-mail: stephen.wolthusen@hig.no
Part I
Introduction to Critical Information
Infrastructure Protection
The chapters in this part provide an overview of the concepts and terminology
used throughout this volume and also serve as a high-level outlook on current de-
velopments in critical information infrastructure research. As these are inevitably
interlinked, the following chapters also provide a perspectives on the larger crit-
ical infrastructure area, its interactions with the policy domain, and the risks
and vulnerabilities that the critical information infrastructure is exposed to.
Part II
Models and Defensive Mechanisms
Part IV
Infrastructure Sector Studies
The final part of this volume is devoted to a selection of sector studies. These
deal with two sub-sectors of the energy sector, namely the electric grid with an
emphasis on the conventional, large-scale grid and its robust operation, and also
the oil, gas, and petrochemical industries. In addition, a chapter on telecommu-
nications highlights some of the concerns raised by convergent next-generation
telecommunications infrastructures that have been or are being deployed by
many advanced telecommunications carriers. The chapter on the financial ser-
vices industry focuses largely on the back-end infrastructure of banks and insti-
tutions in the sector, but also highlights some of the problems facing the sector
from new technology being deployed before a review of the transportation sector
with an emphasis on a case study for the rail transportation sector.
Table of Contents
Telecommunications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280
Stuart Goldman and Huseyin Uzunalioglu
Transportation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330
Mark Hartong, Rajn Goel, and Duminda Wijesekera
r.setola@unicampus.it
3 Department of Mathematics, Royal Holloway, University of London, Egham,
Abstract. The present volume aims to provide an overview of the current under-
standing of the so-called Critical Infrastructure (CI), and particularly the Critical
Information Infrastructure (CII), which not only forms one of the constituent
sectors of the overall CI, but also is unique in providing an element of intercon-
nection between sectors as well as often also intra-sectoral control mechanisms.
One problem faced by research on C(I)I is the extreme range of scales at which
security problems may arise. This is true for the time dimension where policy-
level decisions such as the deployment of physical infrastructure like roads and
high-tension transmission lines have impacts measured in decades whilst indus-
trial control systems must provide guaranteed and secure real-time responses in
the millisecond range. It is, moreover, also the case for the physical extent of in-
frastructures where single physical facilities such as vaccine plants may be a vital
element of national or supra-national infrastructures, but where the trans-national
electrical power or natural gas transmission networks span entire continents.
The book hence surveys not only key high-level concepts and selected techni-
cal research areas with an emphasis on control systems as a highly active research
area, but also seeks to include policy aspects as well as a discussion on models
for validation and verification. This is rounded off by several studies of specific
issues and challenges faced by individual CI sectors including the telecommuni-
cations, electricity, transportation, and financial services sectors.
1 Introduction
J. Lopez et al. (Eds.): Critical Information Infrastructure Protection, LNCS 7130, pp. 1–14, 2012.
c Springer-Verlag Berlin Heidelberg 2012
2 J. Lopez, R. Setola, and S.D. Wolthusen
are relative to other threats. Moreover, unlike for attacks on physical entities, it is not
necessarily possible to determine the origin of an attack reliably, making attribution one
of the most difficult problems with any such attacks. As a result, however, the well-
understood mechanisms and theories underlying reactions to and deterrence of mali-
cious activity are not immediately applicable. This has led to ongoing efforts worldwide
to increase protective measures, generally referred to as Critical Information Infrastruc-
ture Protection (CIIP). Howver, despite the identification of the need to have CII protec-
tion strategies, no clear consensus has emerged yet as to its exact scope and distinction
from general computer, network, and information security and research in these fields
on one hand and policy-related activities on the other. At the same time it is also increas-
ingly clear from a number of incidents that targeted attacks on critical infrastructure have
moved from the subject of largely academic inquiry [2,4,1] to a focal area of defence
and intelligence establishments worldwide [5,7]. Moreover, although deliberate, coor-
dinated attacks clearly are the more challenging problem, even relatively simple faults
and human error must be better understood as unlike for physical events, there exists
very little historical data or constraints imposed by underlying physical properties for
the ICT sector that are relevant in other domains in constructing risk and vulnerability
assessments.
This book hence aims to address this issue by providing a faceted view of core results
and ongoing research in the area centered around the ICT domain, but also touching
upon other sectors that are affected by the specific issues surrounding the ICT sector.
The focus of the book will therefore be on aspects unique to critical information infras-
tructures and infrastructure sectors immediately affected by CII. Moreover, it will also
emphasise issues arising from different aspects of interconnection specific to the crit-
ical information infrastructure and cover not just the immediate operational concerns
but also the prevention, detection, and mitigation of threats and attacks through a num-
ber of approaches ranging from policies and procedures to early warning and detection
mechanisms.
Given this remit, the contributions to this book cover not only the scientific and
technical aspects of CII protection and security; instead, they are deliberately structured
in such a way as to commence with a review of the policy level and the understanding
of individual sectors and their interconnections as well as current understanding on
existing and evolving threats and vulnerabilities. Given the ubiquitous nature of ICT
systems, a comprehensive review of the impact on CII would require a much more
extensive format. By focusing on an area which is both the subject of intensive scrutiny
by the CII research community and with the potential for a disproportionate impact
owing to the direct coupling between information and physical systems in the form of
selected aspects of control systems security, the book seeks to highlight key problems
that are not wholly addressed by general information security research.
and unanticipated use of information and communication technology, but also to the
identification of novel or re-assessment of existing hazards and threats. A further char-
acteristic of C(I)IP research is that it is drawing on a number of disciplines to aid in
understanding and enhancing the robustness, resilience, and security of critical infras-
tructure components and particularly interconnected components. Whilst this research
is typically not inter-disciplinary in nature, it has been the case that similar questions
particularly in the modelling and simulation domain have been approached by using
significantly different techniques ranging from employing graph theory to autonomous
agents approches and statistical physics. This creates difficulties not only in assessing
work based on differing sets of assumptions, but also because of the very different meth-
ods used in such investigations, and consequently the difficultis to identify the “C(I)IP
community” and the relevant sources of information.
Any collection must cope with such a multiplicity of perspectives, although in this
case it is clearly inevitable that the range is necessarily broader than would be the case
otherwise.
Except for cases where both data and results are qualitative in nature and hence
unlikely to allow the derivation of actionable conclusions, most research in the C(I)IP
domain is faced with the problem that its results can be either misused if obtained by
unauthorised entities or that the very data on which it may be based is also sensitive in
its own right as it may identify vulnerabilities or ways in which threats can be realised.
This problem also arises in case of other research, particularly in the information se-
curity domain where a vulnerability may be widespread and difficult to mitigate. Here,
systematic vulnerabilities such as protocol weaknesses may require extended time pe-
riods for changes to affected systems or mitigation efforts during which the release of
information on the vulnerability can still cause widespread damage.
For critical infrastructures, particularly where physical and cyber systems are in-
terconnected, the potential for adverse effects may be substantially larger and involve
larger-scale economic disruptions or loss of life and limb. This often imposes also an
ethical onus on researchers in addition to legal requirements, and it is imperative that
any such work is undertaken in full awareness of its potential ramifications.
2 Overview
The following section provides a brief overview of the structure and contents of the
book. As the volume is intended to serve the dual purpose of a collection of active
research whilst being suitable for use as a graduate-level text, it has been divided into
four parts:
the Commission has been able to exert directly or indirectly in the sectors related to the
CII. This is traced along the lines of the five-pillar strategy of the European Commission
in the remainder of the chapter. As in the preceding contribution by Dunn Cavelty and
Suter, the lack of alignment between infrastructure ownership and the entities poten-
tially suffering from their becoming unavailable is discussed, but with an emphasis on
governance and monitoring structures. Such structures can, where more technical capa-
bilities are affected, be co-ordinated provided that a common baseline and information
exchange mechanisms are achieved. However, as Glorioso and Servida point out, there
exist genuine differences in policy priorities that render higher levels of co-ordination
problematic.
The final chapter in the introductory part of the book by Luiijf takes a more system-
atic approach to the threats and risks that the preceding chapters employed in a more
intuitive manner. Although it is inevitable that the precise semantics of some of the
terms and concepts required in the CI(I) domain are the subject of ongoing discussions
that can even be influenced by the context in which terms are used, the taxonomy pro-
vided by Luiijf represents an useful point of departure. The main focus of the chapter is
on providing a review of the threats considered relevant to the CII environment under
an all-hazards perspective. This approach also considers threats to the CII environment
rather than merely the CII itself, and so must take natural events ranging from phaenom-
ena such as solar flares to even insects causing damage to physical equipment into ac-
count as well as externalities that involve human actions. The latter, however, need not
even be deliberate and can be the result of accidents or actions that have indirect, un-
foreseen effects, which makes such threats very difficult to bound properly. In outlining
a selection of threats specific to the ICT domain, the chapter also highlights a similar
problem for identifying bounds; as is demonstrated for the case of control systems in
Part III, this area also encompasses ICT systems that combine intricate functional re-
quirements with what so far must be considered only limited resilience to deliberate
threats. Characterising the threat actors is a further major contribution of the chapter
by Luiijf, which also seeks to characterise the different unique roles that the CII has as
not only the immediate target of attacks, but also indirect effects when the CII is used
either as the means to achieve a threat agent’s objective or even as a weapon in its own
right. As Luiijf points out, however, many threats emerging in novel application areas
of ICT such as electric mobility and the ICT systems embedded in Smart Grid environ-
ments will likely only be identified as having been encountered before in similar form
after the fact; at the same time, however, the very flexibility and ability to create novel
applications by combining ICT components in unforeseen ways make a comprehensive
assessment of risks an extremely challenging task.
on model-building and, to a lesser extent, their validation. Such models are crucial in
identifying not only in high-level interactions that are not obvious in their strength or
potentially even existence, but can also be employed in exploratory settings. This can
occur either systematically, exploring parts of the parameter space, or in the form of
targeted exercises and scenarios that allow a more fine-grained investigation not only of
the behaviour of the Critical Information Infrastructure, but also the entities interacting
with it.
The chapter by Svendsen and Wolthusen provides a high-level survey of some of the
most significant and influential strands of research on modelling and simulation of crit-
ical infrastructures. Such models typically include or are focused on the CII, but may
also extend further and incorporate other sectors that have an impact on the CII. More-
over, similar to the hierarchy of strategic considerations found by Dunn Cavelty and
Suter, modelling techniques span a very broad range of abstraction levels ranging from
qualitative models describing national or even supranational entities on a sector-by-
sector basis for the purpose of qualitative analyses of resilience or macro-economic ef-
fects to highly quantitative models of smaller-scale effects. The chapter therefore seeks
to provide at least reference models sampled from this broad spectrum. These include,
at the qualitative level, economic models such as Input-Output models but also models
of interacting entities such as those based on System Dynamics. Although limited in
their predictive ability, such models are valuable as aids to understanding dependencies
and interactions, particularly for more complex models that cannot be understood eas-
ily without the support of simulation environments. Characterising or even predicting
the behaviour of threat agents as well as neutral or friendly entities interacting in the
CI(I) domain is, however, a highly desirable objective that has recently gained attention
and is modelled using game-theoretical and related behavioural techniques in ongoing
research that can aid in areas such as defensive resource allocation. A major part of
the chapter is, however, devoted to the large body of research on graph-based models
of critical infrastructures at different levels, which in turn can range from techniques
found in statistical physics to highly accurate domain-specific models. The graph or
other combinatorial representation, however, is often crucial in such models to gain an
understanding of relations and structural properties that go significantly beyond artifacts
and phaenomena arising from particular parameter choices.
The following chapter of this part, by Raciti, Cucurull and Nadjm-Tehrani, focus its
attention on Water Management Systems as water quality has recently received con-
siderable attention from the security research community. Authors argue that real-time
monitoring of water quality requires analysis of sensor data gathered at distributed lo-
cations, as well as subsequent generation of alarms when quality indicators indicate
anomalies. In these infrastructures, event detection systems should produce accurate
alarms, with low latency and few false positives. In this sense, this chapter shows how
an existing learning based anomaly detection technique is applied to the detection of
contamination events in water distribution systems. The initial hypothesis of authors
is that the clustering algorithm ADWICE that has earlier been successfully applied to
n-dimensional data spaces in IP networks, can also be deployed for real-time anomaly
detection in water management systems. The chapter describes the evaluation of the
anomaly detection software when integrated in a SCADA system that manages water
8 J. Lopez, R. Setola, and S.D. Wolthusen
sensors and provides data for analysis within the Water Security initiative of the U.S.
Environmental Protection Agency (EPA). Also, this chapter elaborates on the analysis
of the performance of the approach for two stations using performance metrics such
as detection rate, false positives, detection latency, and sensitivity to the contamination
level of the attacks. The first results, in terms of detection rate and false positive rate,
have shown some contaminants are easier to detected than others. Additionally, authors
discuss on the reliability of the analysis when data sets are not perfect, that is, where
data values may be missing or less accurate as indicated by sensor alerts.
information on different sectors, with the vast majority of material covering the telecom-
munications area and the interactions of this sector particularly with the energy sector,
specifically the electricity sector. Other sectors may be equally dependent on informa-
tion and communication systems, but this is far less visible. Confidentiality require-
ments are a major hindrance in any efforts seeking to ultimately publish outcomes, and
in some areas even highlighting concerns appears to be problematic. In other environ-
ments, however, it is still necessary to exercise careful judgement in analysing security,
reliability, and robustness characteristics of sectors and sector elements as some of the
problems identified may well turn out to be difficult or time-consuming to rectify. This
relative paucity of available information for some sectors is also problematic for the
creation and ultimately also the verification and validation of models discussed in Part
II, but is unlikely to be possible to rectify in the medium term.
The aforementioned electricity sub-sector of the energy domain is covered in the
chapter by Bompard, Cuccia, Masera, and Nai Fovino, who provide a high-level survey
of modern power systems with an emphasis on parts of the electric grid that are nor-
mally considered constituent elements of the critical infrastructure. These include the
national and supra-national elements drawing on the European case as an example and
range to the distribution grid, which only in rare instances would be concerned with the
impact of end users. The chapter focuses on the current grid architecture concentrated
around a relatively limited number of large-scale generation sites and similarly limited
transmission capabilities. This necessitates the continuous monitoring of the grid state
to ensure that operating parameters remain in an acceptable range both for a given area
(e.g. national grid) and any adjacent or otherwise affected areas as these may differ. An
intrinsic challenge in the electric grid is the need to maintain a equilibrium within a
relatively narrow parameter space under real-time constraints despite considerable fluc-
tuations in generating and transmission capacity as well as demand. Elaborate models
exist for state and demand estimation as well as planning, but despite this situations may
arise where it is not possible or cost-effective to compensate. Bompard et al. hence also
discuss the protective measures available to grid operators before discussing the specific
security risks and problems in the sector beginning with an overview of the communi-
cation and control systems employed in the electricity sector at different levels from
control centres to individual SCADA components and concluding with an analysis of
possible countermeasures. As the sector is likely to change in response to the need to
reduce its carbon intensity and efficiency, a number of new challenges will arise; how-
ever, the current highly reliable infrastructure in place is likely to remain the backbone
for the foreseeable future, and hence its security and robustness must be assured despite
further efforts in securing the more modern smart grid of the future and its interplay
with the conventional grid.
The chapter by Johnsen, Aas, and Qian studies a different aspect of the energy sector
that is less concerned with real-time effects, but one where the impact of failure is po-
tentially very severe to the ability to function, the environment, and loss of life and limb,
namely the oil and gas sector. Although the risk of contamination as well as fires and
explosions is inherent in the sector, the need to exploit resources that are increasingly
difficult to reach and often stretch the limits of available technology or indeed require
the development of novel techniques for exploration and exploitation altogether may
Overview of Critical Information Infrastructure Protection 11
well have increased the potential for accidents. Moreover, both the more sophisticated
techniques themselves and the increasingly hostile environments such as off-shore or
Arctic environments force reliance on automation and control systems that cannot, sim-
ilar to the electric grid, be replaced or even bridged by manual intervention owing to
the precision and complexity of the operations required. However, despite efforts to
centralise some of these operations and an increasing reliance on highly specialised
entities collaborating in all phases of the exploration, extraction, and transportation of
hydrocarbons, the sector retains its emphasis on safety rather than security. The chapter
by Johnsen hence reviews both the regulatory framework in which the industry must
operate and the technical — mainly SCADA — systems used in the sector. Particular
emphasis is placed on the ability to prevent and respond to accidents and incidents as
well as methods for systematically identifying risks and hazards arising also from the
deployment of ICT and SCADA systems in the security domain.
The core ICT sector of telecommunications is studied in the chapter by Goldman
and Uzunalioglu; while the sector has been scrutinised extensively for a long time, this
chapter focuses on the effects caused by the convergence of conventional telephony
and packet-switched networks that have been the subject of major investment efforts by
telecommunications carriers in recent years to bring about so-called Next Generation
Networks (NGN). The incentive for carriers of having to maintain a single and highly
flexible infrastructure rather than two separate systems is very much self-evident, as
is the desire to provide differentiated services to clients that also can be the subject
of different service provision as well as cost models. However, both the convergence
towards NGN itself and the more complex policy-driven service provisioning architec-
ture clearly present risks from faults and particular ones originating in malicious agency,
with new threats arising from the desire to integrate services across what has conven-
tionally been a strictly layered architecture with only limited exceptions provided such
as call prioritisation for emergencies and certain government services. Goldman and
Uzunalioglu hence review threats arising at both the transport and service layers and
highlight effects of layering in their contribution. However, as in the case of other in-
frastructure sectors discussed throughout the present volume, there is also a need to
interact and remain interoperable with legacy systems, which can limit the ability to
provide services such as stronger security features (e.g. authentication and access con-
trol) that would be straightforward in more homogeneous environments.
The chapter by Hämmerli provides insights into a sector that has — albeit to different
extents depending on the sub-sector — become extremely reliant on the use of infor-
mation and communication technology, namely financial services. Although reliant on
information in a wider sense, the ability to reliably perform transactions and safely
retain or access information is at the key of the sector and must be maintained beyond
any reasonable doubt as the loss of trust in the sector’s ability to provide its core ser-
vices has the potential to cause cascading effects far beyond any immediately affected
institution or service provider affected. The chapter by Hämmerli focuses on conven-
tional infrastructure for financial services, namely the payment and clearing services
used both between financial service institutions internationally and also towards clients,
also discussing the underlying legal and regulatory framework. This is crucial to con-
sider as the sector is covered by a dense network of regulations and agreements as well
12 J. Lopez, R. Setola, and S.D. Wolthusen
3 Editor Information
3.1 Javier Lopez
Prof. Javier Lopez is Full Professor in the Computer Science Department at the Univer-
sity of Malaga, and Head of the Network, Information and Computer Security (NICS)
Laboratory. His research activities are mainly focused on network security and critical
information infrastructures protection, leading a number of national and international re-
search projects in those areas, including projects in FP5, FP6 and FP7 European Frame-
work Programmes. He is the Co-Editor in Chief of International Journal of Information
Security (IJIS) and Chair of the ERCIM Working Group on Security and Trust Man-
agement. Besides, he is member of the Editorial Board of, amongst others, the jour-
nals Computers & Security, International Journal of Critical Infrastructures Protection,
Overview of Critical Information Infrastructure Protection 13
R. Setola is the head of the Complex System & Security Lab of the University CAMPUS
Bio-Medico di Roma (Italy) and the General Secretary of the AIIC (Italian Association
of Critical Infrastructures’ Experts). From 1999 to 2004 he served at the Italian Prime
Minister’s Office and he managed the Italian Government Working Group on Critical
Information Infrastructure Protection. He has been member of the G8 High-Tech Crime
Subgroup and of the G8 Senior CIIP Expert (2003-2005) and Point of Contact for the
Italian Government in the G8 “International CIIP Directory” (2003-2008). He received
his M.Sc. in Electronic Engineering and Ph.D. in Control Theory from the Universitá
di Napoli, Italy. He is author of three books and more than 100 peer-reviewed publica-
tions about modelling and simulation of complex systems, CIP/CIIP and the security of
critical infrastructures.
References
1. Albert, R., Albert, I., Nakarado, G.L.: Structural Vulnerability of the North American Power
Grid. Physical Review E – Statistical, Nonlinear, and Soft Matter Physics 69(2), 025103
(2004), doi:10.1103/PhysRevE.69.025103
2. Albert, R., Jeong, H., Barabási, A.L.: Error and Attack Tolerance of Complex Networks. Na-
ture 406, 378–382 (2000), doi:10.1038/35019019
3. Brömmelhörster, J., Fabry, S., Wirtz, N. (eds.): Internationale Aktivitäten zum Schutz Kritis-
cher Infrastrukturen. Bundesamt für Sicherheit in der Informationstechnik, Bonn, Germany
(2004)
4. Cohen, R., Erez, K., ben Avraham, D., Havlin, S.: Breakdown of the Internet under Intentional
Attack. Physical Review Letters 86(16), 3682–3685 (2001),
doi:10.1103/PhysRevLett.86.3682
5. Falliere, N., Murchu, L., Chien, E.: Stuxnet Dossier. Symantec Security Response (2011)
14 J. Lopez, R. Setola, and S.D. Wolthusen
6. Marsh, R.T. (ed.): Critical Infrastructures: Protecting America’s Infrastructures. United States
Government Printing Office, Washington D.C., USA (1997); Report of the President’s Com-
mission on Critical Infrastructure Protection
7. United States Department of Defense: Department of Defense Strategy for Operating in Cy-
berspace. U.S. Government Printing Office (2011)
8. Wenger, A., Mauer, V., Dunn, M. (eds.): International CIIP Handbook 2008/2009. Center for
Security Studies, ETH Zurich, Zurich, Switzerland (2008)
The Art of CIIP Strategy: Tacking Stock of Content
and Processes
1 Introduction
The above statement, made over a decade ago, still rings true. Critical infrastructures
(CI) are systems or assets so vital to a country that any extended incapacity or
destruction of such systems would have a debilitating impact on security, the
economy, national public health or safety, or any combination of the above. As a
consequence, critical infrastructure protection (CIP) is currently seen as an essential
part of national security in numerous countries around the world.
Not everything about CIP is new: under the heading of vital system security,
protection concepts for strategically important infrastructures and objects have been
part of national defense planning for decades, though they played a relatively minor
role during the Cold War as compared to other concerns such as deterrence[1]. Today,
however, CIP refers to a broader concept with a distinctly different flavor. First of all,
J. Lopez et al. (Eds.): Critical Information Infrastructure Protection, LNCS 7130, pp. 15–38, 2012.
© Springer-Verlag Berlin Heidelberg 2012
16 M. Dunn Cavelty and M. Suter
In a less ideal world, strategies come in a variety of forms. Very often, setting
future goals and defining steps to get there are closely interwoven or not even
separated at all. In a field as diverse as CI(I)P and as populated by so many players
inside and outside of government, it is almost entirely impossible to define in theory
what a strategy is and what it is not. Therefore, rather than just selecting documents
that have the word “strategy” in the title, we drew from a broader document base.
Without any claim for comprehensiveness, we looked at publicly available
documents that contain a) definitions of CI(I)P and related concepts, b) the
description of (protection) goals, c) statements about an object to be protected, d)
statements about the type of threat to which these objects are subject, and e) the
means by which these objects are to be protected. In short, we were mainly
interested in statements about a desired state of security of an identifiable object
that is seen in need of protection from one or a variety of threats as well as
statements about the type of countermeasures to be taken. In short, we mainly focus
on protection goals. However, the constant and sometimes rapid advancement of
existing policies shows that many countries are still in the process of defining their
own “CI(I)P identity”. What we are looking at are snapshots of a dynamic policy
field with fuzzy boundaries.
This chapter is structured as follows: First, it will be analyzed how CIIP is defined –
or rather not defined – and that many countries focus not on CIIP but on
cybersecurity. Second, we will identify and describe the definition of protection goals
on different levels. It will be shown that these strategies and policies differ
considerably with regard to the question what should be protected from which threat.
Cyberthreats are often only vaguely defined and it remains unclear which is the most
relevant threat to critical infrastructures. In order to understand the varying
approaches in the documents, it is necessary to distinguish between different
cyberthreats and to analyze which strategy focus on which threat. Furthermore, the
chapter looks at the proposed responses to cyberthreats. Even though the policy and
strategy papers on CIIP and cybersecurity differ with regard to the question who
threatens what, they usually propose similar concepts to respond to cyber
vulnerabilities. Common response strategies include the formation of Public-Private
Partnerships (PPPs); efforts to strengthen coordination between the different agencies
that are assuming tasks in the field of CIIP; campaigns to increase public awareness
for cybersecurity; and attempts to improve international collaboration. It will be
briefly discussed how these protection and prevention measures are defined and
which are the most relevant challenges that need to be addressed in order to
implement them. Third, we will take a step away from the content and look at the
process of how these strategic elements are defined and then point out what an ideal
strategy making process could look like.
More than ten years after the beginning of the CIP debate, there still is little clarity
with regard to a clear and stringent distinction between the two key terms “CIP” and
18 M. Dunn Cavelty and M. Suter
“CIIP”. In official publications, the term CIP is frequently used even if the document
is only referring to the information aspects of the issue. It will be shown in a first
subsection how the two terms can be differentiated. In a second subsection, it will be
shown that rather than focusing on CIIP specifically, most governments focus on
strategies in the domain of cybersecurity instead.
A focus on CIIP creates immediate difficulties for any researcher, since the basis for
distinguishing between CIP and CIIP is unclear. A clear distinction between CIP and
CIIP is lacking in most countries, and one finds both terms being used
interchangeably. This reflects the continuing difficulties that arise from having to
distinguish between physical and virtual aspects of critical infrastructures.
That the two concepts are closely interrelated is apparent from the current debate
on protection necessities: The debate jumps from a discussion of defending critical
physical infrastructure – telecommunications trunk lines, power grids, and gas
pipelines – to talk of protecting data and software residing on computer systems that
operate these physical infrastructures. This indicates that the two cannot and should
not be discussed as completely separate concepts. Rather, CIIP seems an essential
part of CIP: While CIP comprises all critical sectors of a nation’s infrastructure, CIIP
is only a subset of a comprehensive protection effort, as it focuses on the critical
information infrastructure.
The definition of exactly what should be subsumed under CI, and what under CII,
is another question: Generally, critical information infrastructures can be described as
the part of the global or national information infrastructure that is essential for the
continuity of critical infrastructure services. There is a physical component to it,
consisting of high-speed, interactive narrow-band and broadband networks; satellite,
terrestrial, and wireless communications systems; and the computers, televisions,
telephones, radios, and other products that people employ to access the infrastructure.
In addition, there is an equally important immaterial, sometimes very elusive
component, namely the information and content that flows through the infrastructure,
the knowledge that is created from this, and the services that are provided through
them.
Due to their role in interlinking various other infrastructures and also providing
new ways in which they can be targeted, (critical) information infrastructures are
regarded as the backbone of critical infrastructures, given that the uninterrupted
exchange of data is essential to the operation of infrastructures in general and the
services that they provide. Thus, it comes as no surprise that many so-called CIP
policies have a strong focus on the protection of specific information infrastructures
rather than focusing on all CI sectors and aspects.
information which is processed by these systems is not only crucial for critical
infrastructures. ICTs have also become absolutely essential for societal and business
relations across the board. Governments are therefore also developing policies with
regard to the security of information infrastructures more generally – meaning not
only for critical information infrastructures from a government perspective – with the
aim to secure all interactions that are enabled by them and depend on them. These
economic, social and cultural interactions take place in what is labeled cyberspace.[7]
In accordance, the policies that aim to secure these interactions are usually called
cyberspace security policies or, in short, cybersecurity policies.
One of the first national cybersecurity strategies, called “Defending America’s
Cyberspace”, was issued by the Clinton administration in January 2000. Since then,
cybersecurity is perceived as an integral part of national security and many countries
have started to develop cybersecurity policies. Compared to CIIP policies,
cybersecurity policies pursue a broader view on the security of ICTs and the
protection of the information that is processed by them, but the protection of the
essential information infrastructure remains an integral part of such policies. In order
to examine the key concepts and policies with regard to CIIP, it is thus important not
only to look at national security strategies or CIP policies, but also to analyze those
documents that refer to cybersecurity.
There are many examples for recent policy documents in that area: in the last two
years countries like the UK, Sweden, Japan, Estonia or Belgium released new
strategies for cybersecurity (or information security which is used as an alternative
label). In addition the administration Obama issued the widely noticed “Cyberspace
Policy Review”. Most of these publications include parts dedicated to CIIP and
point to the fact that cybersecurity is crucial for CIP. The US Cyberspace Policy
Review for example highlights that “…the growing connectivity between
information systems, the internet, and other infrastructures creates opportunities for
attackers to disrupt telecommunications, electrical power, energy pipelines,
refineries, financial networks, and other critical infrastructures”[8] and the Estonian
Cyber Security Strategy describes the formulation of a cybersecurity strategy as the
first step “to protect the country’s critical infrastructure and to ensure the country’s
information security”[9].
However, the cybersecurity strategies and policy papers studied rarely provide a
clear definition of cybersecurity. The UK Cyber Security Strategy states that “[c]yber
security embraces both the protection of UK interests in cyber space and also the
pursuit of wider UK security policy through exploitation of the many opportunities
that cyber space offers”.[10] The US Cyberspace Policy Review defines cybersecurity
policy broadly as the “strategy, policy, and standards regarding the security of and
operations in cyberspace”.[11] It can be observed, however, that all of these
documents implicitly adhere to the following definition: Cybersecurity is the absence
of a threat either via or to information and communication technologies and networks.
Simply put, this means that cybersecurity is the security one enjoys in and from
cyberspace. [12]
20 M. Dunn Cavelty and M. Suter
Fig. 1.
In sum, we will refer to CIP in this chapter when a document/strategy covers all
relevant critical sectors of a country, to CIIP if the document/strategy just talks about
one critical sector related to information infrastructures and to cybersecurity if the
documents covers ICTs more generally, without just focusing on the critical part.
With these general definition in mind, we will now move on to a depiction of the
content of the various strategies.
Protection goals – which according to our understanding contain statements about the
object to be protected and the type of threat to which these objects are subjected – can
be found on three hierarchically distinguishable levels and have different functions
and purposes, which is shown in the first subsection. In a second subsection we will
look at what is seen in need of protection and what is seen as the main threat. In a
third, we look at the proposed countermeasures.
Not surprisingly, these goals become more concrete the further down one moves. We
look at all three of them in separate subsections.
The analysis of CIP documents shows that ‘protection goals’ vary with regard to
their specificity and purpose. On the level of national security strategies and policy
papers, goals tend to use rather general terms such as ‘prevention’, ‘mitigation of
vulnerabilities’, or ‘protection of vital interests’. We believe it would be useful to
label these kind of statements ‘protection principles’ rather than protection goals,
because they provide the general framework for CIP.
Slightly more specific protection goals are found on the second level of CIP
strategies. They are more precise and specific than the protection principles, but still
follow a systemic-abstract logic, as they refer to the totality of all CIs rather than to
one sector or to one infrastructure. Examples for “protection goals” on this aggregated
level are the goals of ‘identifying critical infrastructures and key resources’,
‘enhancing resiliency’, or ‘analyzing interdependencies and vulnerabilities’. These
goals, formulated for all CIs, can be described as ‘protection policies’, as they define
in a general way what must be protected from which threats in what way.
The third level is the sector-specific dimension. On this level, the “protection
goals” are more concrete. Examples are the goals to ensure ‘the availability, integrity
and confidentiality of information and information technology’ or ‘sustain protection
of public health and the environment’. They may be referred to as (sector-specific)
‘protection goals’.
Fig. 2.
22 M. Dunn Cavelty and M. Suter
measures, then protection goals in CIP are – or should have to be – top-level strategic-
political decisions. This is an important aspect that will be addressed in some more
detail in the concluding section.
Next to general protection principles, policies and goals, the documents studied also
contain more specific information about that which is threatened and in need of
protection (i.e., referent object) and the type of threat (i.e., threat subject). In this
section, we will look at the referent object in one subsection, before turning to a
discussion of the threats in the next.
ICTs for the national economy and point to the high costs of cyberattacks for the
corporate sector.[28] These costs are deemed to have a negative impact on the growth
of national economy.[29] The second referent object that is prominently discussed in
the documents is national security. With reference to the large-scale attacks on
Estonia in 2007, it is stressed that cyberattacks can compromise the functioning of
critical infrastructures, which are considered to be crucial to national security.[30]
However, rather than being two clearly separable dimensions, economic well-being
and national security are closely interconnected, since critical information
infrastructures are essential for both dimensions at the same time. This
interconnectedness is reflected in most of the documents. The United States, for
example, claims that: “The continued exploitation of information networks and the
compromise of sensitive data, especially by nations, leave the United States
vulnerable to the loss of economic competitiveness and the loss of the military’s
technological advantages.”[31] The Swedish Assessment of Information Security also
mentions both dimensions: “Deficient information security can threaten […] the
capability to deal with serious disturbances and crises. Furthermore, it can have a
negative impact on combating crime, trade and industry’s profitability and growth, as
well as the personal integrity of the country’s citizens”.[32]
The nexus between economic and national security interests is even more
accentuated by the fact that many of the cyberstrategies view cybersecurity as being
directly related to other governmental strategies, especially the respective countries’
national security strategies (see section above). The UK realizes that: “Cyber security
cuts across almost all the challenges outlined in the National Security Strategy, and
interlinks with a wide range of Government policies, involving many departments and
agencies”[33]. The US encourages the development of a new security strategy, noting
that: “The national strategy should focus senior leadership attention and time toward
resolving issues that hamper US efforts to achieve an assured, reliable, secure, and
resilient global information and communications infrastructure and related
capabilities”[34]. However, some of the strategies and policy papers also explicitly
highlight the connection to information society and economic strategies. The Estonian
Cyber Security Strategy, for example, states: “In developing the Cyber Security
Strategy, the committee has taken into account national development plans that might
also be relevant to information security and the information society, as well as plans
relating to internal security and national defense.”[35]
Fig. 3.
In theory, what one perceives as threatening and what one perceives as being
threatened generates the focus of what is perceived to be in need of protection. A
clear prioritization of the threats would therefore lead to a prioritization of response
strategies. However, as mentioned above, in the case of CIIP cybersecurity, it is
neither possible to define which actor poses the biggest threat, nor can the two
28 M. Dunn Cavelty and M. Suter
In the absence of a clear picture of the severity and likelihood of different threats to
cybersecurity, most strategy and policy papers define response strategies that reduce
vulnerability to all forms of cyberattacks. Despite the differences between various
kinds of attacks, there are also similarities that can be used to define general response
strategies. For example, cybercriminals and cyberterrorists may exploit the same
vulnerabilities to intrude into IT systems. Furthermore, both types of actors benefit
from the lack of knowledge of many users and from the fact that they can start their
attacks from the location of their choice, which can make it hard to prosecute them.
It is thus possible to mitigate the risk of all kinds of attacks by reducing
vulnerabilities and improving national and international coordination and prosecution.
Thus, even though strategies and policy papers sometimes differ in their threat
description, they all identify similar response strategies: they promote an increase of
public-private collaboration to enable a better exchange of information; they call for
more coordination within the public sector in order to foster coherent responses; they
highlight the importance of public awareness campaigns; and they point to the need for
more international cooperation. These response strategies shall be briefly discussed.
define the structure of partnerships on the level of a strategy paper. On the other hand,
it is unsatisfactory to promote better PPPs without describing how the difficulties in
their implementation shall be addressed. A potential solution is the definition of
frameworks and programs for PPPs. Such frameworks are, for example, proposed by
the US Cyberspace Policy Review[46] or by the Communication from the EU
Commission on Critical Information Infrastructure Protection.[47]
be improved if the whole society becomes more aware of the problem. Therefore, in
order to recognize the public vulnerability to cyberthreats and the importance of
public participation in building cybersecurity policies, awareness-raising campaigns
as well as education, training, and research have been continuously emphasized in
strategy and policy papers. The 1997 report on critical infrastructure protection in the
United States already includes a clear call for ingraining infrastructure protection “in
our culture, beginning with a comprehensive program of education and
awareness”,[53] and the Cyberspace Policy Review of 2009 recommends that “[t]he
Federal government, in partnership with educators and industry, should conduct a
national cyber security public awareness and education. The strategy should involve
public education about the threat and how to enhance digital safety, ethics, and
security.”[54]
While many strategies emphasize the importance of awareness and education
programs, they rarely specify how or by whom such programs should be
implemented. Some refer to previous established and still ongoing programs,[55]
while others refer to implementation plans that will be issued later.[56] It also often
remains unclear who should be targeted by such campaigns (the strategies and policy
papers mention company leaders, students, government officials, or the general public
as potential addressees). Although it is not necessary to define every detail of
awareness and education programs at the level of a strategy, it would still be
beneficial to have better specifications, which would make it possible to analyze
which programs are already implemented (and by whom) and which have still to be
developed.
In the section above, we have outlined several points that can be found in CI(I)P and
cybersecurity strategies. If we compare them, it can be shown that recent documents
contain thoughts that are already well established, rather than any new ideas. In
addition, these documents are quite alike with regard to their description of the threat.
First, the documents are all rather vague in describing the threats, since they aim to
avoid excluding certain types of threats. Second, they all take into account the fact
that cybersecurity concerns both national security and the national economy. Third,
they unanimously identify public-private partnerships, improved policy coordination,
awareness campaigns, and international coordination as the most important measures
for enhancing cybersecurity, but most of them fail to outline how such programs shall
be implemented.
The similarities between the different strategy and policy papers show that most
governments face similar problems in formulating and implementing CIIP policies. The
underlying problem is that it remains unclear what is threatened, who is threatening, and
what the potential consequences of attacks or failures could be. A CIIP strategy has to
take into account very diverse types of threats, ranging from criminally motivated
attempts to steal information to terrorist attacks on critical infrastructures with the goal
to create as much damage as possible. The likelihood of occurrence for these threats
varies greatly, as does their potential impact on the security of society. Would it thus
make sense to include all these threats in one strategy, or should there rather be separate
strategies for CIIP, cybercrime and cyberwar? The problem is that the different threats
are interlinked and the connections between them are not clear. Treating different
threats separately would be inconsistent with the so-called “all-hazards approach”,
which has proven to be a useful concept in CIP as well as in cybersecurity. It is thus not
possible to separate the different kind of threats completely from each other, and CIIP
strategies should take all of them into account.
More solid definitions would make it easier, however, to put the different
countermeasures into context. The design of PPPs, for example, will vary depending
on the function of the partnership. While PPPs for critical infrastructure protection are
small and based on direct exchanges of information between the government and the
32 M. Dunn Cavelty and M. Suter
private sector, PPPs for the fight against cybercrime require broader coalitions, as
criminals may attack all kinds of companies (not only those operating critical
infrastructures). Clearer definitions are also required in order to develop a coherent
international approach for cybersecurity, as the different perceptions of threats still
hinder collaborative efforts. Finally, a clear delineation of cyberthreats is required to
define the responsibilities of different government agencies, which would be the first
step towards better coordination of cybersecurity efforts. The inter-mixing of
cybercrime with cyberwarfare and cyberterrorism, for example, often impedes a clear
division of responsibility between military and civil agencies.
In sum, it can be noted that the vague definitions of threats in the strategy papers
lead to rather vague concepts for countermeasures. Most strategies fail to set priorities
and to provide well-defined cybersecurity programs. This clearly impairs their value
and may even jeopardize the benefits of having a CIIP or a cybersecurity strategy.
However, one should not jump to the conclusion that such strategies are completely
unnecessary. Developing a CIIP strategy can be valuable for two reasons: First, the
process of developing a strategy is valuable in its own right. The discussions about the
existing policy that accompany the formulation of a strategy can be fruitful and may
stimulate processes that lead to important advancements. Second, a strategy can help
to raise awareness of cyberthreats in general, but can also underline the importance of
individual countermeasures. The mention of PPPs as important instrument for more
cybersecurity, for example, supports the existing public-private collaborations and can
help to establish new PPPs. In this final section, we therefore want to sketch an
optimal strategy making process.
As mentioned above, public and private actors play specific roles in the formulation
of protection principles, policies, or goals. We can distinguish between a top down
and a bottom up part of the strategy making process.
papers emphasize the importance of the ‘all-hazards approach’ in CIP. This means
that all relevant agencies need to be involved and that the concrete protection goals
need to be formulated in a threat-neutral way.
Finally, there are also some decisions to be taken on the political level concerning
the means by which a goal should be protected. This question is all the more
important since many CIs are owned and operated by the private sector. Protection
can only be achieved if all stakeholders act in concert. This means that concrete
protection goals should be defined in collaboration with the private sector. Such an
empowerment of non-state actors is not a routine process and needs to be anchored in
political decisions. Hence, many strategies explicitly highlight the need for
collaboration with the private sector. The important role of public-private partnerships
in CIP is not only articulated in the documents reviewed in this report, but also
evident in the establishment of state-sponsored partnership platforms such as
Australia’s Trusted Information Sharing Network (TISN), the United Kingdom’s
Centre for the Protection of National Infrastructure (CPNI), and the United States
Critical Infrastructure Partnership Advisory Council (CIPAC), Sector Coordinating
Councils (SCC), and Government Coordinating Councils (GCC). The principle of
public-private collaboration is thus another important political decision that shapes
the formulation of concrete protection goals for CIP.
The third way in which private actors influence the definition of protection goals
consists of what may be called lobbying activity. Industry groups try to shape CIP
policies according to their interests by talking to politicians or by issuing white papers
and press releases. The goals of lobbying in CIP can be to highlight the importance of
the own sector or to push for government initiatives. The Information Technology
Association of America (which is a leading industry group for United States IT and
electronics businesses), for example, writes in its Mission Statement on Information
Security Policy that it is the organization’s goal to ‘ensure that cyber security is an
integral part of critical infrastructure protection.’[66]
loss of coherence within CIP as a whole. The function of protection policies (Level 2)
is therefore to connect these top-down and bottom-up processes and incorporate them
into one coherent approach to CIP.
Sector-specific protection goals (Level 3) are formulated in collaboration with the
owners and operators of CI. The goals need to be sufficiently specific to enable
implementation (cf. the concept of operational protection goals in the German case).
On this level, there needs to be clarity with regards to the overall aim and purpose of
protection efforts, including what risks to focus on.
5 Conclusion
In this chapter, it was first shown how the terms CIIP and cybersecurity relate to each
other to bring some clarity into the terminological muddle that exists in the field and
to show why many countries have begun focusing on cybersecurity more recently.
Second, the chapter looked at statements about the object to be protected and the type
of threat to which these objects are subjected in recent policy papers. It was shown
how such ‘protection goals’ vary with regard to their specificity and purpose. The
chapter then introduced three labels for three different types of such goals: protection
principles for the level of national security strategies and policy papers, protection
policies for more specific CI(I)P strategies, and (sector-specific) protection goals for
the most concrete form of such statements in sector-specific protection plans.
Furthermore, the chapter compared what is said about that which is threatened and in
need of protection (i.e., referent object) and the type of threat (i.e., threat subject). It
was shown that the strategies and policies differ considerably with regard to these two
issues, but that despite these discrepancies, they usually propose similar concepts to
respond to cyber vulnerabilities: Public-Private Partnerships (PPPs); efforts to
strengthen coordination between the different agencies that are assuming tasks in the
field of CIIP; campaigns to increase public awareness for cybersecurity; and attempts
to improve international collaboration.
The similarities between the different strategy and policy papers can be seen as an
indication that most governments face the same problems in formulating and
implementing CIIP policies: Specifically, the vague definitions of threats in the
strategy papers lead to rather vague concepts for countermeasures. As a consequence,
most strategies do not succeed in setting priorities or in providing sufficiently defined
cybersecurity programs, which impairs their value. To move beyond this problem, an
optimal strategy making process was outlined in the section above. This process
combines a top-down with a bottom-up approach and integrates the three levels of
protection principles, policies and goals in an optimal way.
The three-level model in combination with the description of the combined top-
down/bottom-up process outlined above provides a useful framework for the
definition and use of protection goals in critical infrastructure protection, as it ensures
coherence between the protection goals in different sectors and a sufficient level of
specification of protection goals within the individual sectors. Beginning at the
political level, protection goals are first identified at the highest strategic levels and
articulated in a national security framework/strategy. In this phase, overarching
36 M. Dunn Cavelty and M. Suter
protection principles and goals, such as the protection of critical infrastructure, are
addressed. The next step is the creation of CIP strategies where specific sectors and
sub-sectors are highlighted and protection principles (such as promoting information-
sharing, utilizing a risk framework, creating public-private partnerships, etc.) are
applied and further refined. This step leads to a process of policy transfer, with
protection goals developed in the political level being applied at the sector-specific
level, and the beginning of an exchange between specialized public agencies and CI
operators in the private sector. The sector-specific level is where protection goals
become customized based on the particular needs of an identified CI sector – resulting
in the construction of sector-specific plans. At this stage, the role of the private sector
is to manage CI, liaise with the public sector, and articulate goals and measures to
achieve protection. Within the public sector, specialized agencies work to
communicate federal mandates to CI operators and create platforms for information-
sharing and partnerships.
While the CIP framework described herein points to a traditional top-down process –
with the top level setting the agenda – there are bottom-up forces that inform the
political level, creating feedback loops. At both levels, a broader informing
environment provides insights and influence to those identifying goals and means of
protection, for example. This informing environment includes public officials and
local/regional state agencies as well as those operating in the private sector and in
academia/think-tanks. Overall, this framework exemplifies a dynamic, interactive
process where each sphere of influence has a key role to play in defining and refining
protection goals.
References
1. Collier, S., Lakoff, A.: The Vulnerability of Vital Systems: How ‘Critical Infrastructure’
Became a Security Problem. In: Dunn Cavelty, M., Kristensen, K.S. (eds.) The Politics of
Securing the Homeland: Critical Infrastructure, Risk and Securitisation, pp. 40–62.
Routledge, London (2008)
2. Dunn Cavelty, M.: Cyber-Security. In: Burgess, P. (ed.) The Routledge Handbook of New
Security Studies, pp. 154–162. Routledge, London (2010)
3. President’s Commission on Critical Infrastructure Protection. Critical Foundations.
Protecting America’s Infrastructures, US Government Printing Office, Washington DC
(1997)
4. Brunner, E.M., Suter, M.: International CIIP Handbook 2008/2009. Center for Security
Studies, Zurich (2008)
5. Claudle, S.L.: National Security Strategies: Security from What, from Whom, and by What
Means. Journal of Homeland Security and Emergency Management 6(1), 10 (2009)
6. Mintzberg, H., Ahlstrand, B., Lampel, J.: Strategy Safari: A Guided Tour Through the
Wilds of Strategic Management, p. 9. The Free Press, New York (1998)
7. Schneider, V., Hyner, D.: Security in Cyberspace. In: Koenig-Archibougi, M., Zürn, M.
(eds.) New Modes of Governance in the Global System. Exploring Publicness, Delegation
and Inclusiveness, Palgrave MacMilllan, pp. 154–176 (2005)
8. US Government. Cyberspace Policy Review. Assuring a Trusted and Resilient Information
and Communication Infrastructure. US Government Printing Office, Washington DC (2009)
The Art of CIIP Strategy: Tacking Stock of Content and Processes 37
In one of the padded cells was a dangerous lunatic. For weeks and
months he had kept up an incessant conversation with himself,
occasionally diversified by shrieks and yells. At first it was believed
the man was shamming, and he was taken before the visiting
justices and sentenced to be flogged, but this usually infallible cure
had not the desired effect. Clothes were converted into rags in an
incredibly short space of time. He was handcuffed in front, and still
they were destroyed. He was handcuffed behind with the same
result. On his door being opened he would be found naked, the
handcuffs on the floor, and his clothes in shreds. Canvas sacks, with
slits for the head and hands, were suggested, and, first clothed,
then handcuffed with his hands behind him, and finally covered with
the huge sack, he was again consigned to the cell. The same result,
however, invariably followed, and the kind-hearted doctor, despairing
of cure, and though inwardly convinced it was an artfully contrived
sham, yet loth to persist in the stringent remedies that alone were
effectual, gave him the benefit of the doubt, and consigned him to
the Criminal Lunatic Asylum at Hanwell. I have frequently seen this
maniac fed. His door was opened and he was brought out, and,
half-naked and handcuffed, bleared, filthy, and bleeding from self-
inflicted injuries, with dishevelled hair, and glaring like a panther, this
wild beast in human form would open his mouth, and gruel and
bread be shovelled in bounteously. Attempts would occasionally be
made to induce him to wash, but at best they were qualified
successes, and the assistance of four or five turnkeys had eventually
to be resorted to. It was impossible to believe this being was sane
and capable of keeping up the deception for such a time. Sleep was
out of the question, for night was made hideous by the muffled
shouts and blasphemies that forced themselves through the padded
cell. But a reprieve at length came, and it was with a sense of relief
that I one morning saw him taken off to Hanwell. The lull, however,
was not of long duration; and he was eventually sent back as
“cured.” The cure showed itself in a curious way. On finding himself
again in his old quarters, and smarting under a pretended sense of
breach of faith, he raved that the doctor at Hanwell had promised to
release him if he withdrew his claim to the crown of Ireland. And
now a reign of terror began in earnest, and shouting for Parnell, his
secretary, the Empress Eugenie, and Old Ireland, he raved and
roared day and night. How human nature could bear such a strain
appeared marvellous. One night all was calm. “Thank goodness!” I
thought, “he’s collapsed.” Had he? The wish, alas! was father to the
thought, and the lull was only the precursor of the storm. Whilst we
were sleeping the maniac was maturing his plans, and a shout of
“Fire!” one night reminded us of his proximity. Smoke was now
issuing from the padded cell. To draw back the ponderous bolts was
the work of a second. To distinguish anything was absolutely
impossible. Blinding smoke filled the cell, and as it poured out a
terrible sight presented itself. On the floor was the charred
mattress, the horse-hair alight, and the plank bed smouldering, and
peacefully lying beside it was the madman. The first idea was that
he was dead, but the smoke that would have killed a sane man had
but temporarily stupefied him. In an instant he was on his feet, and,
his arms being free, made a desperate attack with pieces of glass on
the two men who had humanely approached him. Further help was
now sent for, during which time he kicked, struck, and bit everything
within reach, and it required sixteen men to secure and remove this
wild beast in human form. The extent of his mischief now made
itself apparent. How he had removed the handcuffs remains a
mystery, but with the cunning and dexterity only to be found in
maniacs, he had succeeded in reaching the gas, which, situated ten
feet from the ground, and protected by a strong glass, must have
taxed his ingenuity, not only to reach, but eventually to open, and
yet this had been done so quietly that forty men and a watchful
warder in the adjoining room heard nothing. With the fire now at
his disposal, he had burnt the straps that were lashed round his
body to secure the sack, but finding the effect not sufficiently
expeditious, had proceeded to pull out the bed-stuffing, and lying
down naked, bruised, and bleeding, beside the smouldering mass,
calmly awaited the conflagration that was to free him. The cell
presented an extraordinary appearance. On the floor were broken
glass, burning wood, and his clothes torn to shreds; here the
handcuffs, there the charred straps: the walls were smeared with
filth and dabbed with porridge; the plank bed was torn up, and
plaster and brickwork removed: a terrible wreck, an incredible
performance, and all the work of two hands, handcuffed behind and
strapped, and surrounded by every precaution that official ingenuity
could suggest.
This final escapade materially assisted the magisterial finding as to
the extent of the maniac’s “cure,” and he was again consigned to
Hanwell.
Another lunatic of a different type was an inmate of the convalescent
ward, a harmless, inoffensive creature, that had been flogged out of
his senses. His physique proclaimed him incapable of doing bodily
harm to a calf. He was not more than five feet high, with a fore-arm
like a robin’s thigh, and the receding forehead, sunken eye, and
conical skull associated with imbecility; but he had once
“threatened” a warder, a hulking, round-shouldered old woman, that
might have squeezed the life out of him without turning a hair, and
discipline demanded he should be reported, and the visiting justices
sentenced him to be flogged. From that day he never spoke, and
would sit for hours without moving; suddenly he would break out
into an immoderate fit of laughter, to be immediately followed by a
paroxysm of grief, and, laying his head on the table, would sob like a
child. Nothing appeared likely to restore his naturally limited
intellect, and the country will be at the expense of keeping this
“dangerous criminal” for another twelvemonth, who would be
infinitely more at home at Earlswood Asylum for Idiots. A perfect
child occupied another of these hospital cells, an incorrigible young
scamp of about fourteen, that nothing seemed capable of taming.
Everything within reach he proceeded to destroy, and clothes
supplied him in the morning were in shreds at night. He, too, was
constantly handcuffed; he refused to eat, and for a week nothing
passed his lips. One day, on his door being opened, he was found
suspended by a bed-strap from the bell-handle: another second, and
life would have been extinct. For this he was taken before the
visiting justices and birched. It had, however, no deterrent effect,
and up to the time of his release he remained the same incorrigible
young ruffian. There is no hope for such a lad; his future is bound
to be a repetition of many instances I saw amongst the adults, who
had commenced a career of crime with birchings, followed by three
and five years in a reformatory, and ending with imprisonment and
eventually penal servitude. Another companion that was the source
of occasional anxiety, had been an inmate of a lunatic asylum, and
though usually quiet, was subject to extraordinary fits. The first
intimation of one coming on was a demoniacal groan, and in an
incredibly short time a space was cleared round him. It had been
found, indeed, that nothing could arrest the first paroxysm, and on
the “band beginning to play,” a stampede invariably ensued: and not
without cause, for everything within reach became an instant wreck,
and tables, chairs, books, and (when procurable) arms and noses,
were ruthlessly attacked by hands, feet, and teeth. When
comparatively restored it took six or eight men to remove him into a
cell, and the only thing that appeared to rouse him was the presence
of the priest. So efficacious was this remedy that when everything
else failed, the Roman Catholic chaplain was invariably sent for, and
in a moment oil appeared to be thrown on the troubled waters, and
the maniac arose subdued, and clothed in his right mind. Here was
a religion that appeared to appeal to the feelings, and to produce
results never attained by brow-beating and personality—a lesson to
be laid to heart, and worthy of imitation, though in the quarter it
was most needed it was, I fear, utterly thrown away. Personally this
influence did not surprise me, for though debarred, by being a
Protestant, from coming into actual contact with the priest, I was
considerably struck, and almost fascinated, by the kind smile and
friendly salutation he had for all his co-religionists. An Italian by
nationality, with all the refinement of manner habitual to his
countrymen, this polished gentleman was a pronounced contrast to
the fire-and-brimstone snob occasionally met with in the
“Established” ranks.
CHAPTER XXI.
PRISON CELEBRITIES.
At 7.30 I was turned into a large lawn, with sloping banks on three
sides and railings on the fourth; between these and the outer wall
was a gravel walk that circumvented the prison. A turnkey patrolled
this walk day and night, armed with a cutlass. I asked one of them
one day what he should do if he found anyone scaling the wall.
“Do?” he said. “If it was you, I should say, ‘Don’t be a fool; you’ll
sprain your ankle dropping down t’other side.’” “And suppose it was
some other chap?” I inquired. “Ah! then,” he added, “I should carve
him about a foot below the waist.”
Between 8 and 9 parties of men were constantly passing to and fro
to their various work. I usually, therefore, devoted that hour to
contemplation, the selection of some half-a-dozen weeds for future
decapitation, and a general look round. When things had settled
down a bit, my knife came into requisition, and proceeding to one of
my hiding-places I selected one piece of tobacco for immediate use,
and sliced enough for my day’s consumption. I had some of these
holes in various parts of the grounds, constructed of a slate floor
about three inches square, with bricks for the roof and sides. I
found them admirably adapted to resist rain, and many I daresay are
still in existence. This enjoyment lasted till 11, when it became
dangerous. (I was nearly choked on one occasion by foolishly
having a lump of tobacco in my mouth when suddenly confronted by
an official.) After dinner I had a good hour’s reading (the papers
don’t arrive before; indeed, the postal arrangements are capable of
considerable improvement), and so the afternoon passed
comparatively pleasantly, between the daily paper, ’baccy, and the
sloping bank. I often felt amused at the thought of how different all
this was to what some people believed; and a conversation I
“overheard” in the previous January, when one cad was explaining to
his inebriated companion that imprisonment with hard labour was
worse than penal servitude, came vividly to my recollection. On one
of these sunny days I was much amused by an outline of the day’s
telegrams as given me by a friendly turnkey. It was the day on
which the news of young Vyse’s death whilst reconnoitring Arabi’s
position reached England. “Them Arabians are rum chaps; ah, and
can shoot too, I tell yer: that officer as was recognisizing—look at
that!”
Chewing was an accomplishment I did not acquire in a day; indeed,
it took me weeks. At first it made me absolutely poorly, but I
persevered, and eventually found it as agreeable as smoking. I
could not, however, manage the twist, and invariably used the
honey-dew or negro-head. This daintiness was not unattended with
inconvenience, as no shop in the neighbourhood kept such a thing,
and involved journeys to the Strand or Oxford Street. I was never
so foolish as to keep the tobacco about me, and my cell was as free
of it as any hermit’s. In the grounds, however, it was perfectly safe;
tobacco under a stone might belong to anybody, and though the
suspicion would probably have cost me my staff appointment,
absolute conviction would have been impossible. To say that I was
free from some sort of suspicion would be hardly correct, for
although I was never searched myself—except on the one occasion
before mentioned—my next-door neighbour was “turned over” about
twice a week. The reason that led to this was as follows:—I had
found this man specially useful—he was quite a second Mike to me;
anything I required he did, and in return I gave him portions of my
superfluous food, and occasionally a piece of tobacco. This traffic
had not passed unnoticed, and had been communicated to a warder
by another prisoner, who felt himself aggrieved at the preference
shown by me for his fellow prisoner. These sneakings are universally
practised, and through my entire experience I had to be careful of
these wretches; they watched me and hated me, and if they got the
chance, always rounded on “The Swell.” Swell indeed! The swelling
had long ago subsided. I only weighed, thank heavens! about
fourteen stone. These sneakings never affected me, and one of
these individuals was once considerably astonished at getting three
days bread and water for a privileged communication about me. A
circumstance that occurred one day impressed me very much on the
matter of destiny, and the accidents that sometimes combine to form
a link between two individuals that a month or two previously would
never have been dreamed of. It was the day on which (the late) Dr.
Lamson had been sentenced to death. I was standing not far from
the prison van, which had lately returned after depositing him at the
House of Detention, and watching two prisoners cleaning it out. The
partition that he had occupied contained three or four pillows, and I
was informed it was a delicate attention on the part of the
Government to prevent condemned men intentionally injuring
themselves. “What are those pillows for?” I asked of a turnkey.
“Oh, they’re only Dr. Lamson’s,” was the facetious reply; “he was
sentenced to-day, so we just put them in for fear he should chafe
himself, poor fellow.” When the cleaning was over my brother
reprobate led me to understand he had made a discovery. Beneath
the pillows he had found three cigars; he considerately gave me one,
as indeed prison etiquette demanded, it being an axiom that an
uncompromised holder of a secret is never to be trusted. I certainly
should not have rounded on my confrère, but was nevertheless very
glad to be the recipient of a specimen of this “Marwood” brand. It
was a sin to chew them, but there was no alternative, as smoking
was out of the question. Half-an-hour later, as I bit off a piece, the
thought forced itself upon me, “Three months ago, he at
Bournemouth, and I at Brighton, had never heard of one another,
and here I am chewing the condemned man’s tobacco.” Funny
thing, destiny!
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
ebookball.com