z-logo
open-access-imgOpen Access
Methods of securing and controlling critical infrastructure assets allocated in information and communications technology sector companies in leading
Author(s) -
Piotr Sieńko
Publication year - 2015
Publication title -
securitologia
Language(s) - English
Resource type - Journals
eISSN - 2449-7436
pISSN - 1898-4509
DOI - 10.5604/18984509.1210263
Subject(s) - business , critical infrastructure , computer security , information technology , information and communications technology , telecommunications , computer science , world wide web , operating system
Critical Infrastructure (CI) plays a significant role in maintaining public order and national security. The state may use many different methods to protect and control CI allocated to commercial companies. This article describes the three most important ones: legislation, ownership and government institutions and agencies. The data presented in this paper is the result of research done on the most developed countries in the EU (United Kingdom, France, Germany and Italy) and their strategic enterprises in the ICT sector, one of the most important sectors in any national security system

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here