Introduction to the E-Government Infrastructure Security Minitrack

2012 
Gregory B. White Wm. Arthur Conklin Rayford B. Vaughn, Jr. Center for Infrastructure Dept of Info & Logistics Tech William L. Giles Distinguished Prof. Assurance and Security College of Technology Associate Vice Pres. Of Research UT-San Antonio University of Houston Dir, Critical Infrastructure Prot. Ctr. greg.white@utsa.edu, waconkli@UH.EDU Mississippi State Univ. MS 39762 vaughn@research.msstate.edu This minitrack examines aspects associated with the security of information and information technology used by governments and critical infrastructures (with an emphasis on automated control systems) and explores ways that IT can enhance the ability of governments to ensure the safety and security of its citizens. This year’s submissions cover a broad spectrum of security topics including the continued operation of critical systems during an emergency, technology that can be used to better protect industrial control systems, a maturity model designed to help states and communities protect their cyber assets, a method to securely share information between identified entities, and examinations of one of the most common form of cyber attack today, phishing. ICT-enabled City Government Field Operations: Resiliency during Extreme Events proposes recommendations for radically re-thinking extreme event response scenarios through data integration, training and effective use of ICTs, planning and preparedness. Extreme events include both natural and man-made emergencies, disasters, and catastrophes of exceptional unthinkable magnitude, which would surpass the capacity of local government to effectively respond. A Retrofit Network Intrusion Detection System for MODBUS RTU and ASCII Industrial Control Systems discusses the need to retrofit serial based industrial control systems to add Snort intrusion detection and intrusion prevention capabilities. A Grassroots Cyber Security Program to Protect the Nation describes a program centered around a maturity model that is being used to help states and communities develop viable and sustainable cyber security programs to protect their critical cyber infrastructures. Seeing the Real World: Sharing Protected Data In Real Time describes a new capability for “owners” of protected data to quickly and securely share real-time data among networked decision-support and real-time control devices with whom the “owners” of the data have explicitly decided to “share” the data. This paper was nominated from this mini-track for consideration of the best paper award. The Influences of Social Networks on Phishing Vulnerability outlines an attempt to reduce the overall success rate of a phishing attack by applying the foundations of social network analysis to identify how social network structures among a military company of future US Army officers can be influential in reducing the spread of a phishing attack. How Could I Fall for That? Exploring Phishing Victimization with the Heuristic-Systematic Model proposes a study on victimization by phishing based on the Heuristic-Systematic Model of information processing. 2012 45th Hawaii International Conference on System Sciences
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    0
    References
    1
    Citations
    NaN
    KQI
    []