The Telecoms Inclusion Principle

Author:

Johnson Chris W.1

Affiliation:

1. University of Glasgow, UK

Abstract

Communications and information technologies play an increasingly important role both within and between national critical infrastructures. From the food that we eat to the water that we drink, to the energy that we use across all modes of transportation to the systems that protect us when we travel in those systems; we rely on information infrastructures. These interdependencies will increase rapidly in coming years. For instance, the European SESAR programme and the US NextGen initiative are using computational systems to increase the efficiency and maintain the safety of air traffic management with increasing numbers of flights. Similarly, a range of ‘smart grid’ initiatives depend upon computational infrastructures to coordinate the supply and demand of renewable and conventional power sources. The benefits that are provided by telecommunications and information technologies also creates new vulnerabilities, for instance, it is increasingly difficult for national critical infrastructures to recover and reorganise their service provision in the aftermath of computational failures. It is for these reasons that this chapter proposes a telecoms inclusion principle. This states that it order to assess the resilience of any national critical infrastructure we must consider the failure modes and resilience capabilities of telecommunications infrastructures. A consequence of this principle is that the failure of telecommunications infrastructures must be considered in all contingency plans, in drills and exercises, as well as the recovery strategies that are used to mitigate the consequences of an adverse event.

Publisher

IGI Global

Reference22 articles.

1. Alvardo, F., & Oren, S. (2002). Transmission system operation and interconnection. US National Transmission Grid Study, U.S. Department of Energy: Technical Report A1-A35. Retrieved from http://certs.lbl.gov/ntgs/issue-1.pdf

2. A Screening Methodology for the Identification and Ranking of Infrastructure Vulnerabilities Due to Terrorism

3. ENISA. (2011). The Netherlands country report. Heraklion, Greece: Author. Retrieved from http://www.enisa.europa.eu/activities/stakeholder-relations/files/country-reports/Netherlands.pdf

4. Hanea, D. (2009). Building a decision support tool using Bayesian networks. PhD Thesis, Delft University of Technology, Delft, Netherlands, 2009.

Cited by 2 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. References Part 3;Building an Effective Security Program for Distributed Energy Resources and Systems;2021-04-09

2. Cascading Effects of Common-Cause Failures in Critical Infrastructures;Critical Infrastructure Protection VII;2013

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3