ABSTRACT

This chapter addresses a number of issues. Placing critical information infrastructure protection in context is followed by current issues, threats and ways to co-operate. Reference is made to a joint training approach and then attention is given to organizational culture and corporate security education. Infrastructures create interdependencies and it is these interdependencies that policy makers and their advisors need to recognize as being weak links in the Critical Information Infrastructure (CII) chain. The software system can be applied to many sectors, e.g., critical information infrastructure, transport and defence, and helps to build better resilience, more cheaply. It uses web-based software to write exercises quickly and easily. Safety incidents, security breaches or cyber attacks that have a great impact on an organization can challenge its sustainability. By having adequate security in place, it should be possible to utilize environmental scanning techniques to anticipate and predict a major event, and to possibly repulse it or limit the damage caused.