Paper
28 October 2022 Research on security protection path of information infrastructure: how to identify the critical information infrastructure of the communication industry
Zhiliang Si
Author Affiliations +
Proceedings Volume 12453, Third International Conference on Computer Communication and Network Security (CCNS 2022); 124530A (2022) https://doi.org/10.1117/12.2659251
Event: Third International Conference on Computer Communication and Network Security (CCNS 2022), 2022, Hohhot, China
Abstract
With the rapid development of information and communication technology, network attacks and sabotage methods emerge one after another, and the internal and external risks facing the critical information infrastructure in the communication industry are becoming increasingly prominent. In order to improve the effectiveness and pertinence of the security protection of critical information infrastructure, the security protection path of critical information infrastructure is proposed. Through the analysis of structural equation model (SEM), it is confirmed that the identification factors of critical information infrastructure in the communication industry include three kinds of factors: importance, harmfulness and relevance. It also points out the influence degree of each factor on the critical degree value and each secondary index on the three factors, which has a certain reference significance for the effective identification of the critical information infrastructure in the communication industry.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Zhiliang Si "Research on security protection path of information infrastructure: how to identify the critical information infrastructure of the communication industry", Proc. SPIE 12453, Third International Conference on Computer Communication and Network Security (CCNS 2022), 124530A (28 October 2022); https://doi.org/10.1117/12.2659251
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Information security

Network security

Telecommunications

Data centers

Data modeling

Reliability

Scanning electron microscopy

Back to Top