Framework for Improving Critical Infrastructure Cyber Security
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Downloads: 127

Research Paper | Information Technology | Malaysia | Volume 6 Issue 11, November 2017

Framework for Improving Critical Infrastructure Cyber Security

Naby Nouhou Nassou Conde, Jamaludin Bin Abrahim

Cybersecurity are becoming vital in the national critical infrastructure systems. Due to the rapid increase of sophisticated cyber threats with exponentially destructive effects, security systems become systematically evolve. The security aspects of ICS are broad, ranging from security for, hardware/firmware used in industrial control systems to system aspects of ICS such as secure architectures and vulnerability screening to the human aspects of cyber security and training. Both research and practical aspects of security considerations in systems are in interest. In this paper, this special issue focuses on innovative methods and techniques called framework in order to address unique security issues relating to ICS.

Keywords: Critical, Infrastructure, Cybersecurity, Framework, protection, cyber, crime

Edition: Volume 6 Issue 11, November 2017

Pages: 2062 - 2065

Share this Article

How to Cite this Article?

Naby Nouhou Nassou Conde, Jamaludin Bin Abrahim, "Framework for Improving Critical Infrastructure Cyber Security", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20178341, Volume 6 Issue 11, November 2017, 2062 - 2065

Enter Your Email Address




Similar Articles with Keyword 'Critical'

Downloads: 105

Survey Paper, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 1307 - 1311

A Survey on Authentication Techniques and User Recognition

Vyanktesh Dorlikar, Anjali Chandavale

Share this Article

Downloads: 106 | Weekly Hits: ⮙3 | Monthly Hits: ⮙9

Research Paper, Information Technology, Ghana, Volume 4 Issue 3, March 2015

Pages: 1535 - 1538

Digitally Mediated Learning and Pre-Service Teachers in Less Resourced Regions

Samuel Adu Gyamfi, Kwame Ansong-Gyimah

Share this Article

Downloads: 106 | Weekly Hits: ⮙1

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 2073 - 2076

Healthcare Insurance Fraud Detection Leveraging Big Data Analytics

Prajna Dora, Dr. G. Hari Sekharan

Share this Article

Downloads: 113 | Weekly Hits: ⮙3 | Monthly Hits: ⮙14

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 1246 - 1249

From Jammer to Gambler: Modeling and Detection of Jamming Attacks against Time Critical Traffic

P. Sudha, K. Durairaj

Share this Article

Downloads: 115

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1210 - 1213

Big Data - Road to Smart Cities

R. S. Balaji

Share this Article

Similar Articles with Keyword 'Infrastructure'

Downloads: 314 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Survey Paper, Information Technology, Ghana, Volume 8 Issue 6, June 2019

Pages: 64 - 69

The Use of Information and Communication Technology (ICT) in Teaching and Learning of Mathematics in Al-Faruq College of Education, Wenchi-Ghana

Abu Sulemana, Yahuza Abdul-Kadir

Share this Article

Downloads: 68

Masters Thesis, Information Technology, Kenya, Volume 10 Issue 2, February 2021

Pages: 151 - 158

An Analysis of Factors Affecting the Use of Information and Communication Technologies among Women for Social Empowerment in Muranga County, Kenya

Esther Mwangi

Share this Article

Downloads: 103

Research Paper, Information Technology, Kenya, Volume 3 Issue 9, September 2014

Pages: 1843 - 1851

Implementing a Web-based Routine Health Information System in Kenya: Factors Affecting Acceptance and Use

Josephine KARURI, Peter WAIGANJO, Daniel ORWA

Share this Article

Downloads: 103

Survey Paper, Information Technology, India, Volume 3 Issue 12, December 2014

Pages: 1137 - 1140

A Literature Survey on Virtualization Security Threats in Cloud Computing

Brona Shah, Jignesh Vania

Share this Article

Downloads: 107

Research Paper, Information Technology, Nigeria, Volume 6 Issue 3, March 2017

Pages: 1875 - 1880

Harnessing E-healthcare Technologies for Equitable Healthcare Delivery in Nigeria: The Way Forward

Wilson Nwankwo PhD

Share this Article

Similar Articles with Keyword 'Cybersecurity'

Downloads: 6 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 307 - 310

CCTV Cameras Hacking and Prevention Techniques

Preeti Rana

Share this Article

Downloads: 127

Research Paper, Information Technology, Malaysia, Volume 6 Issue 11, November 2017

Pages: 2062 - 2065

Framework for Improving Critical Infrastructure Cyber Security

Naby Nouhou Nassou Conde, Jamaludin Bin Abrahim

Share this Article

Downloads: 127 | Monthly Hits: ⮙10

Review Papers, Information Technology, Malaysia, Volume 7 Issue 12, December 2018

Pages: 1410 - 1415

Cyberwar Preparedness

Mamady Aissata Conde, Jamaludin Ibrahim

Share this Article

Downloads: 163

Research Paper, Information Technology, Philippines, Volume 7 Issue 3, March 2018

Pages: 1805 - 1810

Assessment of the Digital Literacy of Agency Authorized Officers and Electronic File Handlers of GSIS Cagayan de Oro

Crystal Sylvette Lavender Palacio-Raro, Dr. Maria Angeles Dano-Hinosolango

Share this Article

Similar Articles with Keyword 'Framework'

Downloads: 2

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 91 - 93

A Scalable Two-Phase Bottom-Up Specialization Prospective for Data Anonymization Using Map Reduce on Cloud

Dilipprasad.E, Ajay.R, K. Durairaj

Share this Article

Downloads: 50

Research Paper, Information Technology, Kenya, Volume 9 Issue 12, December 2020

Pages: 881 - 889

Factors Determining Adoption of Block Chain in the Insurance Industry: A Case of Kenya

Kanuku Musyoku, Shitanda Douglas, Nganu Margaret

Share this Article

Downloads: 101

Survey Paper, Information Technology, India, Volume 4 Issue 5, May 2015

Pages: 2439 - 2441

Improving the Reliability of the Automation Framework based on Code Coverage Analysis

Snehalata Giraddi, Merin Meleet

Share this Article

Downloads: 103

Research Paper, Information Technology, Kenya, Volume 5 Issue 2, February 2016

Pages: 1723 - 1725

An E-Government-Integration Framework for County Governments in Kenya

Florence K. Maweu, Josphat Karani

Share this Article

Downloads: 104

Research Paper, Information Technology, India, Volume 2 Issue 4, April 2013

Pages: 548 - 550

Role of ICT in Sustainability of Research: A Conceptual Framework

Geeta Marmat

Share this Article

Similar Articles with Keyword 'protection'

Downloads: 103

Research Paper, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 2588 - 2589

Big Data Storage, Collection, & Protection with Islamic Perspective

Ibrahim Nasreldin Ibrahim Ahmed, Mohamad Fauzan Noordin

Share this Article

Downloads: 103 | Weekly Hits: ⮙2 | Monthly Hits: ⮙8

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2100 - 2103

Automatic Patch Generation for Control Hijacking Attacks

Saud Adam Abdulkadir, Savaridassan P.

Share this Article

Downloads: 103

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2137 - 2140

Protection Figures Hitting by Refining Depiction Fragment Torrent

P Siddharthan, C Mahesh

Share this Article

Downloads: 103 | Monthly Hits: ⮙1

Research Paper, Information Technology, Nigeria, Volume 5 Issue 5, May 2016

Pages: 2051 - 2058

ICTs and Child Labour in Nigeria: Patterns, Implications and Prevention Strategies

Jimoh Femi Olatunji, Amah Nnachi Lofty, Dr. Oyedemi Jacob

Share this Article

Downloads: 107

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 1390 - 1394

Efficient Privacy Protection in Social Networks

Bharath Kumar Gowru, Ramadevi Polagani

Share this Article

Similar Articles with Keyword 'cyber'

Downloads: 6 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 307 - 310

CCTV Cameras Hacking and Prevention Techniques

Preeti Rana

Share this Article

Downloads: 117

Research Paper, Information Technology, Kenya, Volume 6 Issue 4, April 2017

Pages: 1676 - 1681

A Novel Approach for Combating Cyber-Security Issues in Cloud Based E-Learning in Kenyan Universities

Judith Chepkemoi Boit, Watson Musyoki Kanuku

Share this Article

Downloads: 118

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 1476 - 1478

Employing Big Data for cyber Attacks Analysis

Ankit Srivastava, K. Venkatesh

Share this Article

Downloads: 123

Research Paper, Information Technology, Malaysia, Volume 5 Issue 12, December 2016

Pages: 325 - 329

Critical Infrastructure Protection of ICT in Muslim World

Sami Mohammed Abdulrahman Ali, Muhammad Abdu, Jamaludin Bin Ibrahim

Share this Article

Downloads: 127

Research Paper, Information Technology, Malaysia, Volume 6 Issue 11, November 2017

Pages: 2062 - 2065

Framework for Improving Critical Infrastructure Cyber Security

Naby Nouhou Nassou Conde, Jamaludin Bin Abrahim

Share this Article

Similar Articles with Keyword 'crime'

Downloads: 6 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 307 - 310

CCTV Cameras Hacking and Prevention Techniques

Preeti Rana

Share this Article

Downloads: 103 | Monthly Hits: ⮙1

Research Paper, Information Technology, Nigeria, Volume 5 Issue 5, May 2016

Pages: 2051 - 2058

ICTs and Child Labour in Nigeria: Patterns, Implications and Prevention Strategies

Jimoh Femi Olatunji, Amah Nnachi Lofty, Dr. Oyedemi Jacob

Share this Article

Downloads: 106 | Weekly Hits: ⮙1

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 2073 - 2076

Healthcare Insurance Fraud Detection Leveraging Big Data Analytics

Prajna Dora, Dr. G. Hari Sekharan

Share this Article

Downloads: 110

Research Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2791 - 2794

Internet Usage Analysis Using Karl Pearson's Coefficient of Correlation - A Computer Forensic Investigation

Suneeta Satpathy, Sateesh K. Pradhan, Subhasish Mohapatra

Share this Article

Downloads: 114

Research Paper, Information Technology, Iraq, Volume 3 Issue 11, November 2014

Pages: 346 - 351

Analyzing the Terrorist Operations in Baghdad Using the RS and GIS Techniques

S. M. Ali, Fouad K. Mashee

Share this Article



Top