Artificial intelligence (3rd ed.)
Artificial intelligence (3rd ed.)
Loading databases using dataflow parallelism
ACM SIGMOD Record
The Wiki way: quick collaboration on the Web
The Wiki way: quick collaboration on the Web
Nested Data Cubes for OLAP (Extended Abstract)
ER '98 Proceedings of the Workshops on Data Warehousing and Data Mining: Advances in Database Technologies
ACM SIGMOD Record
cgmOLAP: Efficient Parallel Generation and Querying of Terabyte Size ROLAP Data Cubes
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
Data Mining: Practical Machine Learning Tools and Techniques, Second Edition (Morgan Kaufmann Series in Data Management Systems)
Implementing the ISO/IEC 17799 standard in practice: experiences on audit phases
AISC '08 Proceedings of the sixth Australasian conference on Information security - Volume 81
Determinacy analysis as a diclique extracting task
ECC'08 Proceedings of the 2nd conference on European computing conference
Capturing software-engineering tacit knowledge
ECC'08 Proceedings of the 2nd conference on European computing conference
Modeling UML software design patterns using fundamental modeling concepts (FMC)
ECC'08 Proceedings of the 2nd conference on European computing conference
ECC'08 Proceedings of the 2nd conference on European computing conference
ECC'08 Proceedings of the 2nd conference on European computing conference
IT and infrastructure's lost dependability
SE '08 Proceedings of the IASTED International Conference on Software Engineering
Hi-index | 0.00 |
There are number of systems, such as transport and logistic, power and telecommunication, hydropower and nuclear power stations; that are critical systems for the functioning of day-to-day life of the society in Finland. When assessing possible risks, it is only seldom taken into account that power, hydropower and nuclear power plants are critically dependent on the reliability and security of information systems. Information security is often enhanced by purchasing and extending technical solutions without considering any systematic planning and knowledge of how to protect the different segments of the system. In this case study, the risk is not only to investing of the information security resources to the wrong targets but also to take more risks. As the unplanned integration of systems and the related information security components may even create new security risks. As a result, systems that are critical for society may not work as they should. The Rescuing of Intelligence and Electronic Security Core Applications (RIESCA) project is targeted to do contributive and constructive solutions to this problem. The research object is produce information security and continuity management methods that can be used to ensure the proper functioning of critical systems under varying circumstances. Furthermore, it also leads to the development of an integrative action and environment for critical systems development, management and evaluation. This study: (1) describes the RIESCA project; (2) proposes enhanced data mining collection and analysis architecture model for critical systems evaluation; (3) includes Business Continuing Management (BCM) method creation perspective to context of critical systems and (4) describes the RIESCA action and process implementation model.