Scheduled System Maintenance:
On May 6th, system maintenance will take place from 8:00 AM - 12:00 PM ET (12:00 - 16:00 UTC). During this time, there may be intermittent impact on performance. We apologize for the inconvenience.
By Topic

Protecting the critical information infrastructure

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Caloyannides, M. ; Mitretek Syst., USA

The same advantage that technologically advanced businesses have over their competitors-their advanced information technology infrastructure-has become a major new vulnerability. As businesses adopt increasingly sophisticated information infrastructures, the complexity of protecting those infrastructures becomes enormous. And the problem isn't helped by the misunderstandings between business and government over what protecting the infrastructure means. So what should you do about hackers? There are three types of problems to be solved: technological, legal, and financial. An overall solution requires effective solutions in each of these three areas

Published in:

IT Professional  (Volume:2 ,  Issue: 4 )