Abstract
To gain a better appreciation of why and how we must protect our CIs, we need to understand briefly the fundamental scientific and technological underpinnings of their vulnerabilities.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Doug Page. (2006, January 15). ’03 Blackout finally trips grid-hardening effort. In Homeland Technology. Retrieved from http://www.homeland1.com/print.asp?act=print\&vid=349971
Lerner, E. J. (2003, October/November). What’s wrong with the electric grid? In The Industrial Physicist. USA: American Institute of Physics.
Ghosh, S. (2003, September). Algorithm design for networked information technology systems: Principles and applications. New York: Springer.
Marks P. (2009, September 11). How to short-circuit the US power grid. Retrieved from http://www.newscientist.com/article/mg20327255.900-how-to-shortcircuit-the-%us-power-grid.html?full=true\&print=true, Issue 2725.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Ghosh, S. (2011). Scientific and Technological Nature of Critical Infrastructure Vulnerabilities. In: Ghosh, S., Turrini, E. (eds) Cybercrimes: A Multidisciplinary Analysis. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13547-7_12
Download citation
DOI: https://doi.org/10.1007/978-3-642-13547-7_12
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13546-0
Online ISBN: 978-3-642-13547-7
eBook Packages: Humanities, Social Sciences and LawLaw and Criminology (R0)