Framework for Improving Critical Infrastructure Cyber Security
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Information Technology | Malaysia | Volume 6 Issue 11, November 2017

Framework for Improving Critical Infrastructure Cyber Security

Naby Nouhou Nassou Conde, Jamaludin Bin Abrahim

Cybersecurity are becoming vital in the national critical infrastructure systems. Due to the rapid increase of sophisticated cyber threats with exponentially destructive effects, security systems become systematically evolve. The security aspects of ICS are broad, ranging from security for, hardware/firmware used in industrial control systems to system aspects of ICS such as secure architectures and vulnerability screening to the human aspects of cyber security and training. Both research and practical aspects of security considerations in systems are in interest. In this paper, this special issue focuses on innovative methods and techniques called framework in order to address unique security issues relating to ICS.

Keywords: Critical, Infrastructure, Cybersecurity, Framework, protection, cyber, crime

Edition: Volume 6 Issue 11, November 2017

Pages: 2062 - 2065

Share this Article

How to Cite this Article?

Naby Nouhou Nassou Conde, Jamaludin Bin Abrahim, "Framework for Improving Critical Infrastructure Cyber Security", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20178341, Volume 6 Issue 11, November 2017, 2062 - 2065

157 PDF Views | 123 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Critical'

Survey Paper, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 1307 - 1311

A Survey on Authentication Techniques and User Recognition

Vyanktesh Dorlikar, Anjali Chandavale

Share this Article

Research Paper, Information Technology, Ghana, Volume 4 Issue 3, March 2015

Pages: 1535 - 1538

Digitally Mediated Learning and Pre-Service Teachers in Less Resourced Regions

Samuel Adu Gyamfi, Kwame Ansong-Gyimah

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 2073 - 2076

Healthcare Insurance Fraud Detection Leveraging Big Data Analytics

Prajna Dora, Dr. G. Hari Sekharan

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 1246 - 1249

From Jammer to Gambler: Modeling and Detection of Jamming Attacks against Time Critical Traffic

P. Sudha, K. Durairaj

Share this Article

Research Paper, Information Technology, Indonesia, Volume 6 Issue 8, August 2017

Pages: 1983 - 1987

Cyclomatic Complexity Test Design Flowgraph Registration of Emergency Installation Patients in Wava Husada Hospital Using SEM

Handy Lala, Puguh Yudho Trisnanto, Adil Candra

Share this Article

Similar Articles with Keyword 'Infrastructure'

Survey Paper, Information Technology, Ghana, Volume 8 Issue 6, June 2019

Pages: 64 - 69

The Use of Information and Communication Technology (ICT) in Teaching and Learning of Mathematics in Al-Faruq College of Education, Wenchi-Ghana

Abu Sulemana, Yahuza Abdul-Kadir

Share this Article

Masters Thesis, Information Technology, Kenya, Volume 10 Issue 2, February 2021

Pages: 151 - 158

An Analysis of Factors Affecting the Use of Information and Communication Technologies among Women for Social Empowerment in Muranga County, Kenya

Esther Mwangi

Share this Article

Research Paper, Information Technology, Kenya, Volume 3 Issue 9, September 2014

Pages: 1843 - 1851

Implementing a Web-based Routine Health Information System in Kenya: Factors Affecting Acceptance and Use

Josephine KARURI, Peter WAIGANJO, Daniel ORWA

Share this Article

Survey Paper, Information Technology, India, Volume 3 Issue 12, December 2014

Pages: 1137 - 1140

A Literature Survey on Virtualization Security Threats in Cloud Computing

Brona Shah, Jignesh Vania

Share this Article

Research Paper, Information Technology, India, Volume 3 Issue 5, May 2014

Pages: 790 - 797

ICT Integration in Universities in Relation to ICT Challenges and Work Motivation of Lecturers in Zimbabwe

Dr. Elisha Chamunorwa Kujeke, Dr. Thomas Kennedy

Share this Article

Similar Articles with Keyword 'Cybersecurity'

Research Paper, Information Technology, Malaysia, Volume 6 Issue 11, November 2017

Pages: 2062 - 2065

Framework for Improving Critical Infrastructure Cyber Security

Naby Nouhou Nassou Conde, Jamaludin Bin Abrahim

Share this Article

Review Papers, Information Technology, Malaysia, Volume 7 Issue 12, December 2018

Pages: 1410 - 1415

Cyberwar Preparedness

Mamady Aissata Conde, Jamaludin Ibrahim

Share this Article

Research Paper, Information Technology, Philippines, Volume 7 Issue 3, March 2018

Pages: 1805 - 1810

Assessment of the Digital Literacy of Agency Authorized Officers and Electronic File Handlers of GSIS Cagayan de Oro

Crystal Sylvette Lavender Palacio-Raro, Dr. Maria Angeles Dano-Hinosolango

Share this Article

Similar Articles with Keyword 'Framework'

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 91 - 93

A Scalable Two-Phase Bottom-Up Specialization Prospective for Data Anonymization Using Map Reduce on Cloud

Dilipprasad.E, Ajay.R, K. Durairaj

Share this Article

Research Paper, Information Technology, Kenya, Volume 9 Issue 12, December 2020

Pages: 881 - 889

Factors Determining Adoption of Block Chain in the Insurance Industry: A Case of Kenya

Kanuku Musyoku, Shitanda Douglas, Nganu Margaret

Share this Article

Survey Paper, Information Technology, India, Volume 4 Issue 5, May 2015

Pages: 2439 - 2441

Improving the Reliability of the Automation Framework based on Code Coverage Analysis

Snehalata Giraddi, Merin Meleet

Share this Article

Research Paper, Information Technology, Kenya, Volume 5 Issue 2, February 2016

Pages: 1723 - 1725

An E-Government-Integration Framework for County Governments in Kenya

Florence K. Maweu, Josphat Karani

Share this Article

Informative Article, Information Technology, Tanzania, Volume 3 Issue 11, November 2014

Pages: 950 - 953

An Overview of Multi-Platform Mobile Application with Mobile Push Message Technology

R. Jayaraj

Share this Article

Similar Articles with Keyword 'protection'

Research Paper, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 2588 - 2589

Big Data Storage, Collection, & Protection with Islamic Perspective

Ibrahim Nasreldin Ibrahim Ahmed, Mohamad Fauzan Noordin

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2100 - 2103

Automatic Patch Generation for Control Hijacking Attacks

Saud Adam Abdulkadir, Savaridassan P.

Share this Article

Research Paper, Information Technology, Nigeria, Volume 5 Issue 5, May 2016

Pages: 2051 - 2058

ICTs and Child Labour in Nigeria: Patterns, Implications and Prevention Strategies

Jimoh Femi Olatunji, Amah Nnachi Lofty, Dr. Oyedemi Jacob

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2137 - 2140

Protection Figures Hitting by Refining Depiction Fragment Torrent

P Siddharthan, C Mahesh

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 1390 - 1394

Efficient Privacy Protection in Social Networks

Bharath Kumar Gowru, Ramadevi Polagani

Share this Article

Similar Articles with Keyword 'cyber'

Research Paper, Information Technology, Kenya, Volume 6 Issue 4, April 2017

Pages: 1676 - 1681

A Novel Approach for Combating Cyber-Security Issues in Cloud Based E-Learning in Kenyan Universities

Judith Chepkemoi Boit, Watson Musyoki Kanuku

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 1476 - 1478

Employing Big Data for cyber Attacks Analysis

Ankit Srivastava, K. Venkatesh

Share this Article

Research Paper, Information Technology, Malaysia, Volume 5 Issue 12, December 2016

Pages: 325 - 329

Critical Infrastructure Protection of ICT in Muslim World

Sami Mohammed Abdulrahman Ali, Muhammad Abdu, Jamaludin Bin Ibrahim

Share this Article

Research Paper, Information Technology, Malaysia, Volume 6 Issue 11, November 2017

Pages: 2062 - 2065

Framework for Improving Critical Infrastructure Cyber Security

Naby Nouhou Nassou Conde, Jamaludin Bin Abrahim

Share this Article

Review Papers, Information Technology, Malaysia, Volume 7 Issue 12, December 2018

Pages: 1410 - 1415

Cyberwar Preparedness

Mamady Aissata Conde, Jamaludin Ibrahim

Share this Article

Similar Articles with Keyword 'crime'

Research Paper, Information Technology, Nigeria, Volume 5 Issue 5, May 2016

Pages: 2051 - 2058

ICTs and Child Labour in Nigeria: Patterns, Implications and Prevention Strategies

Jimoh Femi Olatunji, Amah Nnachi Lofty, Dr. Oyedemi Jacob

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 2073 - 2076

Healthcare Insurance Fraud Detection Leveraging Big Data Analytics

Prajna Dora, Dr. G. Hari Sekharan

Share this Article

Research Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2791 - 2794

Internet Usage Analysis Using Karl Pearson?s Coefficient of Correlation -A Computer Forensic Investigation

Suneeta Satpathy, Sateesh K. Pradhan, Subhasish Mohapatra

Share this Article

Research Paper, Information Technology, Iraq, Volume 3 Issue 11, November 2014

Pages: 346 - 351

Analyzing the Terrorist Operations in Baghdad Using the RS and GIS Techniques

S. M. Ali, Fouad K. Mashee

Share this Article

Research Paper, Information Technology, Malaysia, Volume 5 Issue 12, December 2016

Pages: 325 - 329

Critical Infrastructure Protection of ICT in Muslim World

Sami Mohammed Abdulrahman Ali, Muhammad Abdu, Jamaludin Bin Ibrahim

Share this Article
Top