Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Critical Infrastructure Cyber Security

Research Proposal
by

Saud Nassir

on 1 June 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Critical Infrastructure Cyber Security

Cost Benefits of Implementing
U.S Critical Infrastructure
Security Measures in
Australia Alex Apte, Yousif Aljuaib & Saud Nassir Quantitative Outlines Background Research Methods Conclusion - Introduction
- Aim & Research Question
- Objective
- Background
- Research Significance
- Research Methods
- Conclusion Question Time Research
Significance Aim of this research Objectives 2nd 3rd 4th 1st CO$T ualitative Q 300m VS 23m
High Co$t Thank You Critical Infrastructure &
Critical Information Structure DDoS 25+ Business RANSOMWARE 2012 20% of Organizations Experienced Cyber Incidents
In the last 12 month 17% Lost
Financial
Documents 16% DDoS Financial Fraud 10% Worried About Reputation 20% UNITED STATES STANDARDS BENEFITS AND CONCERNS AUSTRALIAN INFRASTRUCTURE PUBLIC & PRIVATE PARTNERSHIPS
million
vs $4.7 BILLION GAPS $480 Analysis Current Attacks Review the efficiency of
new measures implemented in the U.S & Australia Co$t Benefit Analysis How can we implement policies SCADA - Identification of assets
- Security Management controls
- Staff screening and training
- Electronic and physical security parameters
- System Security
- Reporting incidents
- Response and recovery plan
Full transcript