TY - GEN
T1 - Threats, Vulnerabilities and Security Functions in Critical Information Infrastructure
AU - Wibowo Putro, Prasetyo Adi
AU - Sensuse, Dana Indra
N1 - Funding Information:
ACKNOWLEDGMENT I would like to thank Indonesia Endowment Fund for Education (LPDP) from Ministry of Finance Republic Indonesia for granting the scholarship and supporting this research.
Funding Information:
This research was supported by E-Government and E-Business Laboratory, Faculty of Computer Science, Universitas Indonesia.
Publisher Copyright:
© 2021 IEEE.
PY - 2021
Y1 - 2021
N2 - Research on critical information infrastructure protection is currently increasing. This research complements existing security standards and becomes an alternative to the latest technical controls. Based on previous research, research on CII security did not meet four of seven security functions. Therefore, it is also necessary to know whether the security parameters already refer to the security function for each threat and vulnerability. This research is a systematic literature review of scientific articles in CII protection based on the security functions needed to control threats and vulnerabilities. The Kitchenham SLR method was used to search the literature, and 28 publications were obtained. As a result, the research found six threats and four vulnerabilities in critical information infrastructure and all security functions available for All threat and vulnerability groups. The study results also found the threat of Destruction of Information which in theory should exist, but the security controls have never been identified.
AB - Research on critical information infrastructure protection is currently increasing. This research complements existing security standards and becomes an alternative to the latest technical controls. Based on previous research, research on CII security did not meet four of seven security functions. Therefore, it is also necessary to know whether the security parameters already refer to the security function for each threat and vulnerability. This research is a systematic literature review of scientific articles in CII protection based on the security functions needed to control threats and vulnerabilities. The Kitchenham SLR method was used to search the literature, and 28 publications were obtained. As a result, the research found six threats and four vulnerabilities in critical information infrastructure and all security functions available for All threat and vulnerability groups. The study results also found the threat of Destruction of Information which in theory should exist, but the security controls have never been identified.
KW - Critical Infrastructure
KW - Protection
KW - SLR
KW - Threat
KW - Vulnerability
UR - http://www.scopus.com/inward/record.url?scp=85123584179&partnerID=8YFLogxK
U2 - 10.1109/ICITACEE53184.2021.9617515
DO - 10.1109/ICITACEE53184.2021.9617515
M3 - Conference contribution
AN - SCOPUS:85123584179
T3 - 2021 8th International Conference on Information Technology, Computer and Electrical Engineering, ICITACEE 2021
SP - 113
EP - 117
BT - 2021 8th International Conference on Information Technology, Computer and Electrical Engineering, ICITACEE 2021
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 8th International Conference on Information Technology, Computer and Electrical Engineering, ICITACEE 2021
Y2 - 23 September 2021 through 24 September 2021
ER -