Threats, Vulnerabilities and Security Functions in Critical Information Infrastructure

Prasetyo Adi Wibowo Putro, Dana Indra Sensuse

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Research on critical information infrastructure protection is currently increasing. This research complements existing security standards and becomes an alternative to the latest technical controls. Based on previous research, research on CII security did not meet four of seven security functions. Therefore, it is also necessary to know whether the security parameters already refer to the security function for each threat and vulnerability. This research is a systematic literature review of scientific articles in CII protection based on the security functions needed to control threats and vulnerabilities. The Kitchenham SLR method was used to search the literature, and 28 publications were obtained. As a result, the research found six threats and four vulnerabilities in critical information infrastructure and all security functions available for All threat and vulnerability groups. The study results also found the threat of Destruction of Information which in theory should exist, but the security controls have never been identified.

Original languageEnglish
Title of host publication2021 8th International Conference on Information Technology, Computer and Electrical Engineering, ICITACEE 2021
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages113-117
Number of pages5
ISBN (Electronic)9781665439985
DOIs
Publication statusPublished - 2021
Event8th International Conference on Information Technology, Computer and Electrical Engineering, ICITACEE 2021 - Semarang, Indonesia
Duration: 23 Sep 202124 Sep 2021

Publication series

Name2021 8th International Conference on Information Technology, Computer and Electrical Engineering, ICITACEE 2021

Conference

Conference8th International Conference on Information Technology, Computer and Electrical Engineering, ICITACEE 2021
Country/TerritoryIndonesia
CitySemarang
Period23/09/2124/09/21

Keywords

  • Critical Infrastructure
  • Protection
  • SLR
  • Threat
  • Vulnerability

Fingerprint

Dive into the research topics of 'Threats, Vulnerabilities and Security Functions in Critical Information Infrastructure'. Together they form a unique fingerprint.

Cite this