• Executive Summary
  • 1 Introduction
  • 1.1 Background
  • 1.2 Objectives and Main Purpose of the Study
  • 1.3 Project Embedding
  • 2 Approach and Methodology
  • 2.1 Key Terms
  • 2.1.1 Selection Criteria and Process
  • 2.2 Modelling
  • 2.2.1 Identifying European Critical Infrastructures
  • 2.2.2 Identifying high ICT-dependent ECI
  • 2.2.3 ICT Threats and Vulnerabilities
  • 3 Critical Technical Objects and Processes
  • 3.1 Sector Energy Infrastructures
  • 3.1.1 ... Electricity
  • 3.1.2 ...Gas
  • 3.1.3 ... Oil
  • 3.2 Sector Finance Infrastructures
  • 3.2.1 ... Securities Transactions
  • 3.2.2 ... Payment Systems
  • 3.3 Sector Transport Infrastructures
  • 23.3.1 ... Air Traffic
  • 3.3.2 ... Waterways
  • 3.3.3 Sub-sector Railways
  • 3.3.4 ... Road
  • 4 Critical ICT Dependencies
  • 4.1 Sector Energy Infrastructures
  • 4.1.1 ... Electricity
  • 4.1.2 ... Gas
  • 4.1.3 ... Oil
  • 4.2 Sector Finance Infrastructures
  • 4.2.1 ... Securities Transactions
  • 4.2.2 ... Payment Systems
  • 4.3 Sector Transport Infrastructures
  • 4.3.1 ... Air Traffic
  • 4.3.2 ... Waterways
  • 4.3.3 ... Railways
  • 4.3.4 ... Road
  • 4.4 Secure Private Network
  • 4.4.1 Electronic Highway
  • 4.4.2 SWIFTNet
  • 4.4.3 SIAnet
  • 4.5 Summary of Sectoral Findings
  • 5 Relevant Risks, Threats and Vulnerabilities
  • 5.1 Overview
  • 5.2 ICT-Threats
  • 5.2.1 ...
  • 6 Existing Protection Strategies
  • 6.1 Standards
  • ...
  • 6.2 Best Practises
  • 6.2.1 ...
  • 7 Synergies, Conclusions and Trends
  • 7.1 Standards
  • 7.2 Best Practises
  • 7.3 Conclusions
  • 7.4 Trends
  • 8 Policy Lines
  • ...
  • 9 Stakeholder Involvement
  • ...
  • A Annex