ABSTRACT

This chapter focuses on an analysis of the stakeholders in Critical Information Infrastructure Protection (CIIP) incidents and their interactions, it believes that the main benefit of the workshop was that it brought participants together in these two exercises. It also contains information derived from the research project, which is of a more theoretical nature and represents an analysis of the stakeholders. Many different sectors are potential victims of a CIIP incident, and there are many possible types of incident and many technical infrastructures which can be at risk. For these reasons we have suggested a road map of the organizations involved in CIIP, and used two table top exercises to identify some of the routes that organizations might take across the map under given circumstances. It has stopped the attack and shut the Toastnet system down, but there are still an unknown number of infected systems where the malware is still running.