Cybersecurity and Critical Information Infrastructures | ISPI
Skip to main content

Search form

  • INSTITUTE
  • CLERICI PALACE
  • CONTACT US
  • MEDMED

  • login
  • EN
  • IT
Home
  • INSTITUTE
  • CLERICI PALACE
  • CONTACT US
  • MEDMED
  • Home
  • RESEARCH
    • CENTRES
    • Asia
    • Cybersecurity
    • Europe and Global Governance
    • Business Scenarios
    • Middle East and North Africa
    • Radicalization and International Terrorism
    • Russia, Caucasus and Central Asia
    • Infrastructure
    • PROGRAMMES
    • Africa
    • Energy Security
    • Global cities
    • Latin America
    • Migration
    • Religions and International Relations
    • Transatlantic Relations
  • ISPI SCHOOL
  • Publications
  • EVENTS
  • CORPORATE PROGRAMME
    • about us
    • Closed-door meetings
    • Scenario Conferences
    • Members
    • Executive Education
  • EXPERTS

  • Home
  • RESEARCH
    • CENTRES
    • Asia
    • Cybersecurity
    • Europe and Global Governance
    • Business Scenarios
    • Middle East and North Africa
    • Radicalization and International Terrorism
    • Russia, Caucasus and Central Asia
    • Infrastructure
    • PROGRAMMES
    • Africa
    • Energy Security
    • Global cities
    • Latin America
    • Migration
    • Religions and International Relations
    • Transatlantic Relations
  • ISPI SCHOOL
  • Publications
  • EVENTS
  • CORPORATE PROGRAMME
    • about us
    • Closed-door meetings
    • Scenario Conferences
    • Members
    • Executive Education
  • EXPERTS
Analysis

Cybersecurity and Critical Information Infrastructures

30 October 2013

Abstract

The critical information infrastructure (CII) represents the indispensable "nerves and blood" that allow modern societies to work and live. In fact, without it, there would be no distribution of energy, no services like banking or finance, no air traffic control and so on. The CII allows remote control and management of commodities and services, thus reducing costs, to utility companies and consumers alike, and improving efficiency. But the CII was born and developed with an intrinsic, and potentially disastrous, defect: security was never considered a top priority. Today, organized crime, rogue groups or even states may plan to disrupt or destroy portion of the CII or essential services, thus putting in serious dangers governments and economies around the world. This paper outlines the major elements of the CII and the risks to which it might be subject today and tomorrow.

Giampiero Giacomello, PhD in Political Science (EUI), University of Bologna, Department of Political and Social Sciences.

VAI ALLO STUDIES

Read more:

Washington and the Gulf: A New Opportunity to Engage, Differently
Sanam Vakil
Chatham House
Shifting Priorities: The US and the Middle East In a Multipolar World
Jonathan Panikoff
Atlantic Council
The Rise of Complex ‘Intermediate Zones’: the Ukraine War and China’s Opportunity and Dilemma in the Middle East
She Gangzheng
Tsinghua University
Risk or Opportunity? How Russia Sees a Changing MENA Region
Mark N. Katz
George Mason University
Biden Goes to Saudi Arabia: US Policy in a Changing Middle East
Federico Manfredi Firmian
Sciences Po Paris
NATO Summit: The Future of Global Security at a Critical Juncture
Gianluca Pastori
ISPI
,
Nicola Missaglia
ISPI

Tags

cybersecurity Cyberspace USA CII War Cyber war cyberattacks Defense Nato
Versione stampabile
Download PDF

GET OUR UPDATES

SUBSCRIBE TO NEWSLETTER

About ISPI - Work with us - Experts - Contact - For Media - Privacy

ISPI (Italian Institute for International Political Studies) - Palazzo Clerici (Via Clerici 5 - 20121 Milan) - P.IVA IT02141980157