You are here: Home Contents V10 N2 V10N2_Sosnkowski.html
Personal tools

Improving Critical Infrastructure Protection



Full text

Journal of Information Systems Security
Volume 10, Number 2 (2014)
Pages 5965
ISSN 1551-0123 (Print)
ISSN 1551-0808 (Online)
Michael D. Sosnkowski — Virginia Commonwealth University, USA
Information Institute Publishing, Washington DC, USA




To judge the efficacy of the Executive Order 13636, “Improving Critical Infrastructure Cyber-security”, which was signed by President Obama in February of 2013, the success criteria should be whether the three main aspects of the legislation have been met, which are the: sharing of threat information between private and public institutions; privacy of general public; and mitigation of critical infrastructure to cyber-attacks. This is illustrated by highlighting the current reviews about its implementation by critics and supporters.




Stands, Standardization, Critical Infrastructure Protection, 13636




Chowdhuri, R, & Dhillon, G. (2012). Understanding Information Security. Journal of Information System Security 8.2.

Dhillon, G (2014). Essentials of Cyber Security. Washington DC: Paradigm Books.

DHS (2013). Executive Order (EO) 13636 Improving Critical Infrastructure Cybersecurity. (2013, March 13). Retrieved October 1, 2014, from Fact Sheet12March13.pdf

Flowers, A., Zeadally, S., & Murray, A. (2013). Cybersecurity and US Legislative Efforts to address Cybercrime. Journal of Homeland Security and Emergency Management, 10(1), 29–55-29–55. Retrieved October 12, 2014.

Improving Critical Infrastructure Cybersecurity. (2013, March). Retrieved October 15, 2014, from 12March13.pdf

Greenberg, A. (2013, February 12). President Obama's Cybersecurity Executive Order Scores Much Better Than CISPA on Privacy. Retrieved October 17, 2014, from

Hadbah, A., Kalam, A., & Al-Khalidi, H. (2008). The subsequent security problems attributable to increasing interconnectivity of SCADA systems. Australasian Universities Power Engineering Conference, 1-4.

Kolkowska, E, & Dhillon, G (2013). Organizational power and information security rule compliance. Computers & Security 33: 3-11.

Nan, C., Eusgeld, I., & Kröger, W. (2013). Analyzing vulnerabilities between SCADA system and SUC due to interdependencies. Reliability Engineering & System Safety, 113, 76-93.

Narla, S. (2013). The Evolution of Connected Vehicle Technology: From Smart Drivers to Smart Cars to... Self-Driving Cars. Institute of Transportation Engineers, 83(7), 22-26.

Onyeji, I., Bazilian, M., & Bronk, C. (2014). Cyber Security and Critical Energy Infrastructure. The Electricity Journal, 27(2), 52-60. Retrieved October 15, 2014.

Stevenson, J., & Prevost, R. (2013). Securing the Grid: Information Sharing in the Fifth Dimension. The Electricity Journal, 26(9), 42-51.