International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Information Technology | Malaysia | Volume 6 Issue 11, November 2017

Framework for Improving Critical Infrastructure Cyber Security

Naby Nouhou Nassou Conde, Jamaludin Bin Abrahim

Cybersecurity are becoming vital in the national critical infrastructure systems. Due to the rapid increase of sophisticated cyber threats with exponentially destructive effects, security systems become systematically evolve. The security aspects of ICS are broad, ranging from security for, hardware/firmware used in industrial control systems to system aspects of ICS such as secure architectures and vulnerability screening to the human aspects of cyber security and training. Both research and practical aspects of security considerations in systems are in interest. In this paper, this special issue focuses on innovative methods and techniques called framework in order to address unique security issues relating to ICS.

Keywords: Critical, Infrastructure, Cybersecurity, Framework, protection, cyber, crime

Edition: Volume 6 Issue 11, November 2017

Pages: 2062 - 2065

Share this Article

How to Cite this Article?

Naby Nouhou Nassou Conde, Jamaludin Bin Abrahim, "Framework for Improving Critical Infrastructure Cyber Security", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20178341, Volume 6 Issue 11, November 2017, 2062 - 2065

45 PDF Views | 41 PDF Downloads

Download Article PDF

Similar Articles with Keyword 'Critical'

Research Paper, Information Technology, India, Volume 6 Issue 6, June 2017

Pages: 2245 - 2247

The Impact of Computer Virus Attacks and its Detection and Preventive Mechanism among Personal Computer PC Users

Pratik P. Thakur, Sampat Vaidya

Share this Article

Survey Paper, Information Technology, India, Volume 3 Issue 5, May 2014

Pages: 503 - 506

Different Modalities in Biometric Detection

Mukesh Rinwa, Bharat Borkar

Share this Article

Survey Paper, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 1307 - 1311

A Survey on Authentication Techniques and User Recognition

Vyanktesh Dorlikar, Anjali Chandavale

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1210 - 1213

Big Data ? Road to Smart Cities

R. S. Balaji

Share this Article

Review Papers, Information Technology, India, Volume 4 Issue 8, August 2015

Pages: 1255 - 1257

Evolution of Modern Enterprise Resource Planning (ERP) Systems on Technological Background

Nileema B.Patil, Madhuri Samel, Priya Tilak, Dolly Boban

Share this Article

Similar Articles with Keyword 'Infrastructure'

Research Paper, Information Technology, Kenya, Volume 3 Issue 9, September 2014

Pages: 1843 - 1851

Implementing a Web-based Routine Health Information System in Kenya: Factors Affecting Acceptance and Use

Josephine KARURI, Peter WAIGANJO, Daniel ORWA

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, Indonesia, Volume 3 Issue 12, December 2014

Pages: 213 - 218

Analysis and Implementation of Data Center Virtualization at the ICT Center Fkip UNS

Puspanda Hatta, Widyawan, Warsun Najib

Share this Article

Research Paper, Information Technology, Nigeria, Volume 4 Issue 3, March 2015

Pages: 1998 - 2006

Cloud Based E-Learning Model for Open and Distance Learning in Nigerian Universities

D. R Aremu, Babatunde Peter JACOB, Peter M Ogedebe

Share this Article

Research Paper, Information Technology, Nigeria, Volume 6 Issue 3, March 2017

Pages: 1875 - 1880

Harnessing E-healthcare Technologies for Equitable Healthcare Delivery in Nigeria: The Way Forward

Wilson Nwankwo PhD

Share this Article

Survey Paper, Information Technology, India, Volume 3 Issue 12, December 2014

Pages: 1137 - 1140

A Literature Survey on Virtualization Security Threats in Cloud Computing

Brona Shah, Jignesh Vania

Share this Article

Similar Articles with Keyword 'Cybersecurity'

Research Paper, Information Technology, Malaysia, Volume 6 Issue 11, November 2017

Pages: 2062 - 2065

Framework for Improving Critical Infrastructure Cyber Security

Naby Nouhou Nassou Conde, Jamaludin Bin Abrahim

Share this Article

Review Papers, Information Technology, Malaysia, Volume 7 Issue 12, December 2018

Pages: 1410 - 1415

Cyberwar Preparedness

Mamady Aissata Conde, Jamaludin Ibrahim

Share this Article

Research Paper, Information Technology, Philippines, Volume 7 Issue 3, March 2018

Pages: 1805 - 1810

Assessment of the Digital Literacy of Agency Authorized Officers and Electronic File Handlers of GSIS Cagayan de Oro

Crystal Sylvette Lavender Palacio-Raro, Dr. Maria Angeles Dano-Hinosolango

Share this Article

Similar Articles with Keyword 'Framework'

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 91 - 93

A Scalable Two-Phase Bottom-Up Specialization Prospective for Data Anonymization Using Map Reduce on Cloud

Dilipprasad.E, Ajay.R, K. Durairaj

Share this Article

Survey Paper, Information Technology, India, Volume 4 Issue 5, May 2015

Pages: 2439 - 2441

Improving the Reliability of the Automation Framework based on Code Coverage Analysis

Snehalata Giraddi, Merin Meleet

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 3 Issue 5, May 2014

Pages: 1844 - 1847

Privacy Preserving in Participatory Sensing

Deepika Nair, Bhuvaneswari Raju

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1076 - 1079

Parallelizing Coherent Rule Mining Algorithm on CUDA

Aditya A. Davale, Shailendra W. Shende

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 6 Issue 5, May 2017

Pages: 1759 - 1763

Multi-Objective Smart Cane for Blind People Navigation with Color Sonification Technique

Naveen Kumar V, Dr. Aravinda C V

Share this Article

Similar Articles with Keyword 'protection'

Research Paper, Information Technology, Nigeria, Volume 5 Issue 5, May 2016

Pages: 2051 - 2058

ICTs and Child Labour in Nigeria: Patterns, Implications and Prevention Strategies

Jimoh Femi Olatunji, Amah Nnachi Lofty, Dr. Oyedemi Jacob

Share this Article

Research Paper, Information Technology, India, Volume 3 Issue 12, December 2014

Pages: 1877 - 1881

An Ensemble Classification Technique to Control Unwanted Messages in Online Social Networking

M. Lavanya, S. Subadra

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 2313 - 2316

Web Application:(with) HoneyWords and HoneyEncryption

Harish Reddy B, Beatrice Ssowmiya J

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1051 - 1055

Enhancing the Protection scheme for FACTS-Based Transmission Lines using a Data Mining Model

Pallavi P. Wankhede, Rajesh K. Nasare

Share this Article

Survey Paper, Information Technology, India, Volume 4 Issue 12, December 2015

Pages: 2032 - 2036

A Survey on CAPTCHA as Graphical Password

Priti P. Doke, S.A Nagtilak

Share this Article

Similar Articles with Keyword 'cyber'

Research Paper, Information Technology, Kenya, Volume 6 Issue 4, April 2017

Pages: 1676 - 1681

A Novel Approach for Combating Cyber-Security Issues in Cloud Based E-Learning in Kenyan Universities

Judith Chepkemoi Boit, Watson Musyoki Kanuku

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 1476 - 1478

Employing Big Data for cyber Attacks Analysis

Ankit Srivastava, K. Venkatesh

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1214 - 1216

Internet of Things: Rule Based Event Management

Shobhit Shukla, K. Sornalakshmi

Share this Article

Research Paper, Information Technology, India, Volume 3 Issue 4, April 2014

Pages: 5 - 10

Framework Based Approach for the Mitigation of Insider Threats in E-governance IT Infrastructure

M Hari Haran

Share this Article

Research Paper, Information Technology, Malaysia, Volume 5 Issue 12, December 2016

Pages: 325 - 329

Critical Infrastructure Protection of ICT in Muslim World

Sami Mohammed Abdulrahman Ali, Muhammad Abdu, Jamaludin Bin Ibrahim

Share this Article

Similar Articles with Keyword 'crime'

Research Paper, Information Technology, Nigeria, Volume 5 Issue 5, May 2016

Pages: 2051 - 2058

ICTs and Child Labour in Nigeria: Patterns, Implications and Prevention Strategies

Jimoh Femi Olatunji, Amah Nnachi Lofty, Dr. Oyedemi Jacob

Share this Article

Research Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2791 - 2794

Internet Usage Analysis Using Karl Pearson?s Coefficient of Correlation -A Computer Forensic Investigation

Suneeta Satpathy, Sateesh K. Pradhan, Subhasish Mohapatra

Share this Article

Research Paper, Information Technology, Malaysia, Volume 5 Issue 12, December 2016

Pages: 325 - 329

Critical Infrastructure Protection of ICT in Muslim World

Sami Mohammed Abdulrahman Ali, Muhammad Abdu, Jamaludin Bin Ibrahim

Share this Article

Research Paper, Information Technology, Malaysia, Volume 6 Issue 11, November 2017

Pages: 2062 - 2065

Framework for Improving Critical Infrastructure Cyber Security

Naby Nouhou Nassou Conde, Jamaludin Bin Abrahim

Share this Article

Review Papers, Information Technology, Malaysia, Volume 7 Issue 12, December 2018

Pages: 1410 - 1415

Cyberwar Preparedness

Mamady Aissata Conde, Jamaludin Ibrahim

Share this Article



Top