{"title":"Securing the Critical National Infrastructure","authors":"David Mussington","doi":"10.1093/oxfordhb/9780198800682.013.26","DOIUrl":null,"url":null,"abstract":"Critical infrastructure cybersecurity has risen to the forefront of national policy in much of the world. These systems use information and communications technologies (ICTs) to deliver key services and opportunities central to participation in the digital economy. Not only are critical national infrastructures (CNIs) of importance to the health and well-being of citizens, they also contribute to the economic, military, and political functioning of modern societies. Targeting of these systems by cyber actors has become a commonplace concern for both experts and policymakers. This chapter addresses the state of these efforts, and their utility for defining new norms of state interaction that constrain escalation and instability in international security.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"229 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"The Oxford Handbook of Cyber Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1093/oxfordhb/9780198800682.013.26","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Critical infrastructure cybersecurity has risen to the forefront of national policy in much of the world. These systems use information and communications technologies (ICTs) to deliver key services and opportunities central to participation in the digital economy. Not only are critical national infrastructures (CNIs) of importance to the health and well-being of citizens, they also contribute to the economic, military, and political functioning of modern societies. Targeting of these systems by cyber actors has become a commonplace concern for both experts and policymakers. This chapter addresses the state of these efforts, and their utility for defining new norms of state interaction that constrain escalation and instability in international security.