To see the other types of publications on this topic, follow the link: Critical infrastructure facilities.

Journal articles on the topic 'Critical infrastructure facilities'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Critical infrastructure facilities.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Fedotova, G. V., Yu A. Kapustina, A. G. Churaev, and Z. Yu Yuldashbayeva. "Cybersecurity of Critical Infrastructure Facilities." Proceedings of the Southwest State University. Series: Economics. Sociology. Management 13, no. 4 (2023): 111–22. http://dx.doi.org/10.21869/2223-1552-2023-13-4-111-122.

Full text
Abstract:
Relevance. The cybersecurity of information systems and services is becoming one of the important criteria for the quality of services and production of goods in modern society, just like the stability and speed of data transfer. Developers of software products and applications are concerned about the increase in the number of attacks on their systems, the increase in the theft of information and assets. The confrontation between Russia and NATO countries has intensified the growth of geopolitical threats and hacker intrusions into the information system of Russia with the aim of destabilizing
APA, Harvard, Vancouver, ISO, and other styles
2

BATIUK, Oleg. "Essence of the criminal legal protection of critical infrastructure facilities." Scientific Bulletin of Flight Academy. Section: Economics, Management and Law 3;4 (February 25, 2021): 212–18. http://dx.doi.org/10.33251/2707-8620-2021-3-4-212-218.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ivanytska, Olha, and Oleksandr Voznenko. "Risk management of critical infrastructure." Fìnansi Ukraïni 2024, no. 6 (2024): 93–107. http://dx.doi.org/10.33763/finukr2024.06.093.

Full text
Abstract:
Introduction. In the conditions of war and other systemic challenges, deepening the scientific understanding of risk management of critical infrastructure facilities (CIF) is an urgent scientific and practical task of public administration. Creating a systemic conceptual vision of the application of approaches, methods, forms and tools for managing CIF risks will help to respond quickly and timely to external disturbances, attacks, and disruptions to the normal operation of such facilities. Problem Statement. Risk management of critical infrastructure facilities. The purpose is to deepen scien
APA, Harvard, Vancouver, ISO, and other styles
4

Bohdana, Bohdan, Oksana Kuzmenko, and Viktoriіa Chorna. "ECONOMIC MEASURES FOR MANAGING CRITICAL INFRASTRUCTURE FACILITIES IN UKRAINE." Baltic Journal of Economic Studies 9, no. 3 (2023): 22–32. http://dx.doi.org/10.30525/2256-0742/2023-9-3-22-32.

Full text
Abstract:
Purpose. This article defines the variety of economic measures for the management of critical infrastructure objects. Attention is paid to their nature and characteristics, and it is shown how they affect the area under study. The object of the article is social relations arising in the spheres of critical infrastructure. The subject is economic measures of management of critical infrastructure objects of Ukraine Economic measures of management of critical infrastructure objects of Ukraine. Research methods are a system of ways of knowledge that allow to determine the concepts, types and chara
APA, Harvard, Vancouver, ISO, and other styles
5

Azarenko, O., Yu Honcharenko, M. Divizinyuk, R. Shevchenko, and O. Shevchenko. "CHARACTERISTICS OF FACILITIES OF CRITICAL STATE INFRASTRUCTURE (FEATURES OF NUCLEAR AND OTHER STRATEGIC FACILITIES)." Municipal economy of cities 1, no. 175 (2023): 160–68. http://dx.doi.org/10.33042/2522-1809-2023-1-175-160-168.

Full text
Abstract:
The work defines the objects of the state's critical infrastructure, their relationship with strategic and other dangerous objects and productions. It should be noted that today Ukraine, as a state that defends its independence in the war, faces many different tasks, one of which is the protection of critical infrastructure objects from military-terrorist influence, the solution of which not only saves the lives of civilians, but also ensures the defense of sovereignty, territorial integrity and independent existence of the state. The solution of this task is carried out both in wartime and in
APA, Harvard, Vancouver, ISO, and other styles
6

McShane, Ian, and Brian Coffey. "Rethinking community hubs: community facilities as critical infrastructure." Current Opinion in Environmental Sustainability 54 (February 2022): 101149. http://dx.doi.org/10.1016/j.cosust.2022.101149.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

LEONOV, B., and V. SERІGIN. "Problems of legal support of anti-sabotage protection of critical infrastructure f facilities in conditions of martial law." INFORMATION AND LAW, no. 3(42) (September 20, 2022): 55–64. http://dx.doi.org/10.37750/2616-6798.2022.3(42).270103.

Full text
Abstract:
The article is devoted to the analysis of the problems of legal provision of anti-sabotage protection of critical infrastructure facilities in the conditions of martial law. Legislation is analyzed, which determines the features of ensuring the protection of critical infrastructure facilities in these conditions. The classification of relationships between critical infrastructure facilities is considered. The content of the system of anti-sabotage protection of the critical infrastructure facilities of the state is determined. Approaches to the protection of critical infrastructure facilities
APA, Harvard, Vancouver, ISO, and other styles
8

Kohut, Yurii. "Measures for protection of the information systems of Ukraine’s critical infrastructures against cyberattacks." Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje 38, no. 38 (2020): 57–65. http://dx.doi.org/10.5604/01.3001.0014.5939.

Full text
Abstract:
The article deals with protective measures against cyberattacks of information systems of the critical infrastructures and highlights some features of the cyberattacks against the information resources of national authorities. The main objective of the article is to define the characteristics of cyberattacks and the elements of a plan to counter cyberattacks of the critical information facilities. It has been found that a professionally organized cyberattack consists of several phases related to targeting, intelligence, access to the system, direct execution of the attack, and destruction of e
APA, Harvard, Vancouver, ISO, and other styles
9

KUCHERINA, S., and D. OLEYNIKOV. "Current state of criminal protection of the critical infrastructure facilities." INFORMATION AND LAW, no. 1(36) (March 11, 2021): 90–98. http://dx.doi.org/10.37750/2616-6798.2021.1(36).238187.

Full text
Abstract:
The scientific analysis of the current state of criminal law, which establishes criminal liability for encroachment on critical infrastructure or their information infrastructure, and evaluates their effectiveness in terms of systemic criminal law protection. It is revealed that currently the level of criminal protection of critical infrastructure is insufficient and unsystematic. This is due to: the lack of legislation that establishes criminal liability for socially dangerous acts, an individualized approach to critical infrastructure in general and its facilities in particular; not taking i
APA, Harvard, Vancouver, ISO, and other styles
10

Gavdan, Grigory P., Vitaliy G. Ivanenko, Elina P. Rybalko, and Denis P. Rybalko. "Sustainability of the functioning of critical information infrastructure facilities." Bezopasnost informacionnyh tehnology 29, no. 4 (2022): 53–66. http://dx.doi.org/10.26583/bit.2022.4.05.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Gerasymenko, O. M. "Critical infrastructure of Ukraine as a subject of scientific knowledge: theoretical aspect." Uzhhorod National University Herald. Series: Law 4, no. 85 (2024): 42–49. http://dx.doi.org/10.24144/2307-3322.2024.85.4.6.

Full text
Abstract:
The article is devoted to the study of theoretical aspects of critical infrastructure as a subject of scientific knowledge. The importance of critical infrastructure facilities for ensuring Ukraine’s national security, the stability of its economy and the state’s defense capability is determined. Legislative regulation in this area is analyzed, in particular, the Law of Ukraine «On Critical Infrastructure», «On National Security of Ukraine», the Criminal Procedure Code of Ukraine, the National Security Strategy of Ukraine, etc. normative legal acts that contain definitions of terms. Attention
APA, Harvard, Vancouver, ISO, and other styles
12

Boyle, Philip, and Tia Dafnos. "Infrastructures of Pacification: Vital Points, Critical Infrastructure, and Police Power in Canada." Canadian Journal of Law and Society / Revue Canadienne Droit et Société 34, no. 01 (2019): 79–98. http://dx.doi.org/10.1017/cls.2019.5.

Full text
Abstract:
AbstractThough described as the first milestone towards securing Canada’s critical infrastructure (CI), the 2009 National Strategy for Critical Infrastructure is the most recent effort in decades of federal engagement with the problem of how to secure the material elements that underpin state, economy, and society. In this article, we show how a little-known civil defence program initiated after WWII to protect important industrial facilities from military enemies has transformed in the contemporary period into the monitoring of a range of political and social movements as perceived dangers to
APA, Harvard, Vancouver, ISO, and other styles
13

Komissarova, Natalia, and Pavlo Krutikov. "CYBER PROTECTION SYSTEM FOR CRITICAL INFRASTRUCTURE FACILITIES IN WARFARE CONDITIONS." Науковий вісник Київського інституту Національної гвардії України, no. 2 (December 31, 2024): 43–48. https://doi.org/10.59226/2786-6920.2.2024.43-48.

Full text
Abstract:
The article outlines the problem of the impact of information threats, cyber attacks, and cyber espionage on critical infrastructure facilities in the context of warfare. The work allows for a better understanding of the importance of protecting critical infrastructure facilities for ensuring national security. To identify information threats, cyber attacks, manifestations of cyber espionage, which are potential threats and risks to critical infrastructure objects and to identify shortcomings in existing protection systems. The main types of information threats are described, which include cyb
APA, Harvard, Vancouver, ISO, and other styles
14

Vesić, Slavimir, and Martin Bjelajac. "Cyber security of a critical infrastructure." Pravo - teorija i praksa 40, no. 2 (2023): 77–88. http://dx.doi.org/10.5937/ptp2302077v.

Full text
Abstract:
A critical infrastructure consists of basic assets and facilities whose functioning has a significant impact on the society and economy of a country, as well as on its security. The life and work of the citizens of a country are largely dependent on a smooth operation of various energy, telecommunication, water and sewage facilities, as well as the network of hospitals and health institutions, transportation, etc. The safe functioning of these systems is a prerequisite for the existence and development of a social community in an area. Therefore, it is necessary to undertake all necessary acti
APA, Harvard, Vancouver, ISO, and other styles
15

Yefimenko, Ihor, Volodymyr Slipchenko, and Adrián Vaško. "Critical infrastructure as an object of criminal encroachment: General characteristics and features of the investigation organisation." Naukovij vìsnik Nacìonalʹnoï akademìï vnutrìšnìh sprav 28, no. 2 (2023): 41–51. http://dx.doi.org/10.56215/naia-herald/2.2023.41.

Full text
Abstract:
New technologies used in infrastructure systems add complexity to the management and protection of these systems, and therefore, the consideration of issues related to criminal attacks on critical infrastructure and the organisation of investigations are becoming increasingly important. The main goal was to identify the problematic aspects and unique features of organising pre-trial investigation of crimes committed at critical infrastructure facilities. The methodological tools of scientific research were based on the diagnostic method for studying social and legal phenomena, analytical, dogm
APA, Harvard, Vancouver, ISO, and other styles
16

Kozachok, Valerii, and Mykhailo Drapatyi. "ANALYSIS OF SECURITY INCIDENT INVESTIGATION TECHNOLOGI AT CRITICAL INFRASTRUCTURE FACILITIES." Cybersecurity: Education, Science, Technique 2, no. 26 (2024): 374–91. https://doi.org/10.28925/2663-4023.2024.26.699.

Full text
Abstract:
This article aims to analyze and review modern technologies used in the investigation of security incidents at critical infrastructure facilities. Research and implementation of the latest strategies and approaches in this area can contribute to increasing the level of protection of important systems, as well as to the detection and response to new cyber threats, while maintaining the reliability of the functioning of society as a whole. Today, the urgent issue of the security industry is to address the state of information security of critical infrastructure objects with the effective applica
APA, Harvard, Vancouver, ISO, and other styles
17

Zatonatskiy, Dmytro. "Critical infrastructure in the structure of the state's economic security." Fìnansi Ukraïni 2025, no. 6 (2025): 83–100. https://doi.org/10.33763/finukr2025.06.083.

Full text
Abstract:
Introduction. Recently, countries around the world have been experiencing significant economic fluctuations, which in the context of an increasingly integrated global economy has stimulated interest in economic security and forced a rethinking of its meaning. Modern conflicts have turned into a struggle for control over resources, territories with minerals or transport routes. Sustainable development of a national economy requires the protection of its national security and economic security. There are several components of economic security, but each of them requires appropriate critical infr
APA, Harvard, Vancouver, ISO, and other styles
18

Lavrov, Ivan, and Serhii Bielai. "METHODOLOGICAL PRINCIPLES OF STUDYING THE PROBLEMS OF CRITICAL INFRASTRUCTURE PROTECTION." STATE SECURITY 1, no. 3 (2024): 75–82. http://dx.doi.org/10.33405/2786-8613/2024/1/3/309956.

Full text
Abstract:
The relevance of the issue of researching the methodological foundations for studying the problems of critical infrastructure protection is determined. An expert survey was conducted on current problematic issues in the field of critical infrastructure protection in Ukraine. The necessity of developing models for responding to threats to critical infrastructure facilities in different conditions: in a special period and in peacetime is proved. Based on the results of the expert survey, proposals for improving the security of critical infrastructure facilities are formulated. The role and place
APA, Harvard, Vancouver, ISO, and other styles
19

Salkutsan, Alexei A., Grigory P. Gavdan, and Andrey A. Poluyanov. "The methodology for critical processes identifying at information infrastructure facilities." Bezopasnost informacionnyh tehnology 27, no. 2 (2020): 18–34. http://dx.doi.org/10.26583/bit.2020.2.02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Nguyen, Lim. "Conductive Concrete Structures for EMP Protection of Critical Infrastructure Facilities." IEEE Letters on Electromagnetic Compatibility Practice and Applications 1, no. 1 (2019): 26–33. http://dx.doi.org/10.1109/lemcpa.2019.2922877.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Zuievska, N., L. Shaidetska, R. Semchuk, and O. Khalymendyk. "Ensuring the protection of critical infrastructure energy facilities from explosions." Collection of Research Papers of the National Mining University 77 (June 2024): 126–35. http://dx.doi.org/10.33271/crpnmu/77.126.

Full text
Abstract:
Purpose. Analysis of the protection of critical energy infrastructure facilities, which are often destroyed under the influence of a shock wave, which affects the stability of Ukraine's energy systems. Determination of the state of security of critical infrastructure, which ensures the functionality, continuity of work, integrity and stability, which is reflected in the life support of the population. Methodology. To achieve this goal, a simulation of a detonation explosion and the distribution of shock waves within prismatic bodies simulating urban development using the ANSYS AUTODYN software
APA, Harvard, Vancouver, ISO, and other styles
22

Barankova, I., B. Korolev, and S. Pursheva. "Audit of Significant Critical Infrastructure Facilities in the Metallurgical Industry." Bulletin of Science and Practice 11, no. 6 (2025): 129–34. https://doi.org/10.33619/2414-2948/115/18.

Full text
Abstract:
The article considers key aspects of conducting an information security (IS) audit at industrial enterprises, with special attention to the metallurgical complex, where a high degree of automation is combined with the use of vulnerable industrial technologies. The main attention is paid to the methodology for assessing the compliance of information security systems with current regulatory requirements, including both national and international security standards. A classification of the main types of information security audit is presented. Particular emphasis is placed on the analysis of regu
APA, Harvard, Vancouver, ISO, and other styles
23

Franchuk, Vasyl, Pavlo Pryhunov, and Stepan Melnyk. "SAFETY OF CRITICAL INFRASTRUCTURE FACILITIES IN UKRAINE: ORGANIZATIONAL AND REGULATORY PROBLEMS AND APPROACHES." Social & Legal Studios 13, no. 3 (2021): 142–48. http://dx.doi.org/10.32518/2617-4162-2021-3-142-148.

Full text
Abstract:
The theoretical foundations of the functioning of critical infrastructure, which focuses on critical analysis of the content of the concepts of critical infrastructure and critical infrastructure security are revealed in the article. The definition of a number of concepts in the field of critical infrastructure and its safety, which should be used in the relevant legal documents, is proposed and substantiated. The key factors to consider when organizing the security of critical infrastructure are suggested and grounded. It is determined that for the proper organization of the safety of critica
APA, Harvard, Vancouver, ISO, and other styles
24

Czuryk, Małgorzata. "Cybersecurity and Protection of Critical Infrastructure." Studia Iuridica Lublinensia 32, no. 5 (2023): 43–52. http://dx.doi.org/10.17951/sil.2023.32.5.43-52.

Full text
Abstract:
The functioning of critical infrastructure depends on information and communication technologies (ICT) systems that enable its equipment or facilities to operate smoothly. Threats to its functioning can present a major issue for the state and society, as it also spans strategic sectors which overlap with the essential services which remain within the purview of operators of essential services. Because of the relationship that links strategic systems within critical infrastructure and simultaneously supports its operation with essential services, ensuring cybersecurity will also affect the prot
APA, Harvard, Vancouver, ISO, and other styles
25

Shcherbak, O., O. Derevyanko, O. Neshpor, and R. Shevchenko. "METHOD OF DETECTING CENTRAL SIGNS OF EMERGENCY SITUATION DUE TO FIRE AT CRITICAL INFRASTRUCTURE FACILITIES." Municipal economy of cities 1, no. 175 (2023): 105–11. http://dx.doi.org/10.33042/2522-1809-2023-1-175-105-111.

Full text
Abstract:
The work is devoted to the solution of an actual scientific task in the field of civil protection, namely, the development of a method for detecting focal signs of an emergency situation due to a fire at critical infrastructure facilities, with the aim of further developing a method of preventing terrorist emergencies at critical infrastructure facilities of Ukraine. In order to solve the set goal, it is necessary to: provide a description and carry out planning of the procedure for conducting a full-scale experiment to determine the focal signs of an emergency situation due to a fire at criti
APA, Harvard, Vancouver, ISO, and other styles
26

Ramage, Xavier, Khutso Lebea, and Siphesihle Sithungu. "Cyber Warfare and Critical Infrastructure." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 566–75. https://doi.org/10.34190/eccws.24.1.3526.

Full text
Abstract:
This paper identifies the growing threat that cyber warfare poses to a country's Critical Infrastructure (CI) and the Critical Information Infrastructure (CII) that accompanies it. CI is a term that describes all of the essential systems and services needed for the nation to function. CII describes the Information Systems responsible for the CI's operation. This includes energy grids, finance, water supplies, transportation, and healthcare facilities. This paper will focus mainly on the CI related to energy grids and finance. With the growing integration of digital technologies into these sect
APA, Harvard, Vancouver, ISO, and other styles
27

Yefimenko, Ihor, Volodymyr Atamanchuk, and Ivo Svoboda. "Illegal privatisation of critical infrastructure facilities: Problematic aspects and ways to solve them." Ûridičnij časopis Nacìonalʹnoï akademìï vnutrìšnìh sprav 13, no. 4 (2023): 50–61. http://dx.doi.org/10.56215/naia-chasopis/4.2023.50.

Full text
Abstract:
The relevance of the subject of study is due to the practical importance of protecting critical infrastructure facilities in the context of increasing potential threats from criminal encroachments associated with the illegal privatisation of such facilities. The purpose of the study is to analyse the current state of criminal legal protection of critical infrastructure from illegal privatisation, develop separate recommendations on the specifics of organising an investigation into the illegal privatisation of critical infrastructure objects, and provide proposals for improving the national sys
APA, Harvard, Vancouver, ISO, and other styles
28

Mashtaliar, Yana, Valerii Kozachok, Zoreslava Brzhevska, and Oleksandr Bohdanov. "RESEARCH OF DEVELOPMENT AND INNOVATION OF CYBER PROTECTION AT CRITICAL INFRASTRUCTURE FACILITIES." Cybersecurity: Education, Science, Technique 2, no. 22 (2023): 156–67. http://dx.doi.org/10.28925/2663-4023.2023.22.156167.

Full text
Abstract:
Critical infrastructure objects — infrastructure objects, systems, their parts and their totality, which are important for the economy, national security and defense, the malfunctioning of which can harm vital national interests. Classification of objects as critical infrastructure is carried out in accordance with the procedure established by the Cabinet of Ministers of Ukraine. The assignment of banks, other entities operating in the financial services markets, state regulation and supervision of the activities of which is carried out by the National Bank of Ukraine, payment organizations, p
APA, Harvard, Vancouver, ISO, and other styles
29

Irankunda, Georges, Wei Zhang, Muhirwa Fernand, and Jianrong Zhang. "Assessing the Resilience of Critical Infrastructure Facilities toward a Holistic and Theoretical Approach: A Multi-Scenario Evidence and Case Study." Sustainability 16, no. 20 (2024): 8735. http://dx.doi.org/10.3390/su16208735.

Full text
Abstract:
Given the increasing frequency of natural disasters, which result in substantial damage to critical infrastructures and disrupt the functioning of modern societies, numerous studies have been conducted in recent decades to propose sustainable preventive and enhancement measures to safeguard the environmental and societal development. This paper contributes to the existing literature by introducing a novel environmentally conscious infrastructural resilience assessment approach named the Novel Infrastructure Resilience Assessment Curve (NIRAC). Unlike past works which typically focused on a sin
APA, Harvard, Vancouver, ISO, and other styles
30

Mohd Taqi, Swati Bidhuri, Susmita Sarkar, Wani Suhail Ahmad, and Padma Wangchok. "Rural Healthcare Infrastructural Disparities in India: a Critical Analysis of Availability and Accessibility." Journal of Multidisciplinary Research in Healthcare 3, no. 2 (2017): 125–49. http://dx.doi.org/10.15415/jmrh.2017.32011.

Full text
Abstract:
Health and well being of human resource plays an important role in the economic as well as social development of the country. To ensure better health of the people an adequate healthcare infrastructure is of primary importance. Inadequate infrastructure generally leads to poor quality of health services which is positively dangerous to health and welfare of the community at large. About 68% of India’s population still lives in rural areas, yet healthcare infrastructures in these areas are in pathetic condition. There are very few government health centers and even those are devoid of most of t
APA, Harvard, Vancouver, ISO, and other styles
31

Denysov, Andrii Ighorovych, Hennadii Yevhenovych Bershov, Viacheslav Vitaliiovych Krykun, and Olha Zhydovtseva. "Protection of Critical Infrastructure Facilities as a Component of the National Security." Cuestiones Políticas 39, no. 71 (2021): 789–99. http://dx.doi.org/10.46398/cuestpol.3971.48.

Full text
Abstract:
The issue of protecting critical infrastructure as one of the components of national security is analyzed. The following methods were used in the study: bibliographic, dialectical, empirical, and theoretical, comparative, and legal. The essence of the term "critical infrastructure” is explained both according to the opinions of scientists and from the very position of the authors of the article. The importance of proper protection and proper functioning of infrastructure in Ukraine is well founded. It emphasizes the fact that for many years the issue of the importance of protecting critical in
APA, Harvard, Vancouver, ISO, and other styles
32

Timothy, Kwaku. "Securing Critical National Infrastructure Against Hacktivist." Advances in Multidisciplinary and scientific Research Journal Publication 10, no. 4 (2022): 33–42. http://dx.doi.org/10.22624/aims/digital/v10n4p5.

Full text
Abstract:
The acts of hacktivists in today's modern world might have extremely negative repercussions for the order and peace of countries. Hacktivists, by the very nature of their methodology, invariably target important government installations. This research focuses mostly on investigating the myriad of approaches that may be taken to cyber-secure important national infrastructure against the maneuvers that can be carried out by hacktivists. Inferences are drawn in this study from hacktivism episodes that occurred in the past and were documented by a variety of sources, some of which may be verified.
APA, Harvard, Vancouver, ISO, and other styles
33

Herasymenko, O. M., and D. S. Melnyk. "The Security Service of Ukraine’s counteraction to criminal offences at critical infrastructure facilities: organisational aspect." Bulletin of Kharkiv National University of Internal Affairs 106, no. 3 (2024): 128–42. http://dx.doi.org/10.32631/v.2024.3.11.

Full text
Abstract:
The article is devoted to the theoretical foundations of organisation and management of the process of countering criminal offences by the Security Service of Ukraine at critical infrastructure facilities. Modern technological systems and their parts related to critical infrastructure facilities are subject to unlawful encroachments. The negative dynamics of the level of threats and losses from criminal attacks on these objects requires solving existing problems, and therefore consideration of issues related to solving existing problems becomes relevant for scientists. The main purpose of the
APA, Harvard, Vancouver, ISO, and other styles
34

Mokhor, V., S. Gonchar, and О. Dybach. "Methods for the Total Risk Assessment of Cybersecurity of Critical Infrastructure Facilities." Nuclear and Radiation Safety, no. 2(82) (June 6, 2019): 4–8. http://dx.doi.org/10.32918/nrs.2019.2(82).01.

Full text
Abstract:
The paper presents the analysis of national and foreign literature on the methods of cybersecurity risk assessment including critical infrastructure facilities. It is stated that cybersecurity and risk assessment are an important issue of critical infrastructure facilities. The paper proposes graphical and analytical methods for assessing the total cybersecurity risk of I&C systems including critical infrastructure facilities. These total risk assessment methods are based on determining the maximum values of consequences for each risk. It is shown that the maximum values of cyber threat ef
APA, Harvard, Vancouver, ISO, and other styles
35

Kichata, N., and O. Tretyakov. "DEVELOPMENT OF A COMPREHENSIVE APPROACH TO RECOMMENDATIONS FOR THE PROTECTION OF CRITICAL INFRASTRUCTURE OBJECTS FROM EMERGENCY SITUATIONS." Scientific heritage, no. 152 (January 6, 2025): 23–27. https://doi.org/10.5281/zenodo.14603499.

Full text
Abstract:
The article is devoted to current issues of protecting critical infrastructure (CI) objects from emergencies. An analysis of critical infrastructure protection strategies in global practice was conducted, and shortcomings in the Ukrainian protection system were identified. A threat response algorithm was developed. A set of recommendations aimed at reducing the risks of emergencies, minimizing their consequences, and ensuring the continuity of critical infrastructure facilities was proposed. The implementation of these recommendations will effectively enhance the security of strategically sign
APA, Harvard, Vancouver, ISO, and other styles
36

Wojtasik, Karolina, Marek Grochowski, and Vit Horák. "System and Human Safety: Critical Infrastructure and Anti-Terrorist Attachment." System Safety: Human - Technical Facility - Environment 1, no. 1 (2019): 894–901. http://dx.doi.org/10.2478/czoto-2019-0114.

Full text
Abstract:
AbstractThe critical infrastructure (CI) has an important place in Polish security system. The article discusses legal acts and characterises the notion of critical infrastructure as an element essential for the functioning of the society. As a result of the entry into force of the Anti-terrorism Act from 10 June 2016 (Journal of Laws [Dz. U.], item 904), the current procedure of security plan Accepted was extended to include participation of the Internal Security Agency through the requirement to submit a so-called anti-terrorist attachment. The article is an analysis of the constituent parts
APA, Harvard, Vancouver, ISO, and other styles
37

Toliupa, S., S. Buchyk, O. Buchyk, and O. Kulinich. "PROTECTION OF STATE MANAGEMENT OF CRITICAL INFRASTRUCTURE OBJECTS UNDER THE INFLUENCE OF CYBER ATTACKS." Information and communication technologies, electronic engineering 2, no. 2 (2022): 33–41. http://dx.doi.org/10.23939/ictee2022.02.033.

Full text
Abstract:
Critical infrastructure describes physical assets and cyber systems that are so vital to the nation that their incapacitation or destruction would have an important impact on our physical and economic security or public health and safety. The critical infrastructure of country provides essential services that are the foundation of Ukrainian society. Being in the current state of hybrid war significantly increases the threat to critical infrastructure. National security largely depends on the protection of such facilities. The article proposes a method for managing the protection state against
APA, Harvard, Vancouver, ISO, and other styles
38

Shkitov, A. "Features of creating a multi-level model of cyber security of critical infrastructure data: an interdisciplinary approach." COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, no. 56 (September 27, 2024): 71–77. http://dx.doi.org/10.36910/6775-2524-0560-2024-56-08.

Full text
Abstract:
The article examines the model of ensuring cyber security of Ukraine and documents the organizational and legal support for the protection of critical infrastructure objects from cyber attacks. The main concepts are described: multi-level data model, identification of cyber security, and critical infrastructure facilities. The levels of protection of critical infrastructure objects and measures at each level that ensure cyber security are highlighted and described. The stability of the critical infrastructure object is substantiated, and the formula for determining risks in critical infrastruc
APA, Harvard, Vancouver, ISO, and other styles
39

Mohammed, Anwar. "Ransomware in Critical Infrastructure: Impact and Mitigation Strategies." Ransomware in Critical Infrastructure: Impact and Mitigation Strategies 2, no. 1 (2019): 1–9. https://doi.org/10.5281/zenodo.14760301.

Full text
Abstract:
Ransomware attacks have emerged as a significant threat to critical infrastructure systems, such as power grids, water treatment facilities, and healthcare services. This paper analyzes the effects of ransomware attacks on these essential systems and explores various mitigation strategies that can enhance resilience and security. By examining recent case studies and best practices, this research aims to provide insights into effective approaches for safeguarding critical infrastructure from ransomware threats.
APA, Harvard, Vancouver, ISO, and other styles
40

Khoronovskyi, Oleg, Andriy Orlean, Inesa Kostenko, Oksana Melnyk, and Maksym Sokiran. "Threats to critical infrastructure: A study of transnational organized crime in Ukraine." Revista Amazonia Investiga 13, no. 84 (2024): 118–30. https://doi.org/10.34069/ai/2024.84.12.7.

Full text
Abstract:
The purpose of the article is to study the nature and content of threats to critical infrastructure facilities related to the activities of transnational organized criminal groups. In the course of the research, the following scientific methods were used: historical, monographic, logical, dogmatic, normative analyses, system and structural, legal modelling, prognostic, summarization. The conceptual apparatus and criteria for classification of threats to state security, proposed in the scientific literature and relevant legal instruments are considered. The authors’ definition of the concept of
APA, Harvard, Vancouver, ISO, and other styles
41

Cook, PhD, Jeffrey J., Eliza Hotchkiss, MEng, Xiangkun Li, MSc, and Jesse Cruce, MSc. "Planning for the storm: Considering renewable energy for critical infrastructure resilience." Journal of Emergency Management 18, no. 4 (2020): 295–309. http://dx.doi.org/10.5055/jem.2020.0475.

Full text
Abstract:
Objective: Benchmark the economic value of renewable energy and battery storage systems to extend operation of certain critical infrastructure facilities in different markets.Design: This study uses the renewable energy optimization model to assess three critical facilities in North Carolina. Techno-economic results were then compared to analyses completed for critical facilities in California and New York to assess energy system cost effectiveness.Results: Though solar photovoltaic (PV) arrays are cost-effective across each of the three North Carolina facilities, adopting battery storage to e
APA, Harvard, Vancouver, ISO, and other styles
42

Berezutskyi, Viacheslav, and Tetiana Tokhtamysh. "Risks of critical infrastructures during war." Law and innovative society, no. 2 (23) (December 2024): 55–70. https://doi.org/10.37772/2309-9275-2024-2(23)-5.

Full text
Abstract:
Critical infrastructure becomes one of the main targets in times of war because of its important role in ensuring the functioning of the state and society. Destruction or damage to critical facilities can have catastrophic consequences for security, economy, and the lives of citizens. The article considers current issues related to determining the risk of critical infrastructure in wartime. The ChatGPT chat is used to determine the probability of risks to critical infrastructure facilities. This chat provides a general overview of probabilities based on assumptions made on the analysis of mode
APA, Harvard, Vancouver, ISO, and other styles
43

Ibrаhimov, B. G., and T. H. Mammadov. "Research methods for increasing the security of communication systems important objects of critical information infrastructure." T-Comm 18, no. 6 (2024): 61–66. https://doi.org/10.36724/2072-8735-2024-18-6-61-66.

Full text
Abstract:
The efficiency indicators of the functioning critical information infrastructures in the communication system are analyzed based on the architectural concept of future networks. The object of the study is hardware and software complexes of security management systems for communication systems critical information infrastructures for special purposes. Critical information infrastructure represents information and telecommunication communication systems, the maintenance, reliability and security of which are necessary for the safe operation important facilities when per forming various business
APA, Harvard, Vancouver, ISO, and other styles
44

Melnyk, D. S. "Creating a model of threats to Ukraine’s national critical infrastructure as a basis for ensuring its security and resilience." Bulletin of Kharkiv National University of Internal Affairs 104, no. 1 (2024): 237–50. http://dx.doi.org/10.32631/v.2024.1.20.

Full text
Abstract:
The article presents the current problems of protecting Ukraine’s critical infrastructure, current threats to its security and the need to organise proper counteraction under martial law. Threats to critical infrastructure include factors that can actually or potentially harm the stability of its operation, functionality, integrity, resilience or lead to its destruction.
 The purpose of the article is to create an up-to-date threat model that formalises the likely impacts on Ukraine’s critical infrastructure, which will improve the effectiveness of its protection. The scientific novelty o
APA, Harvard, Vancouver, ISO, and other styles
45

GRABOWSKI, Andrzej, and Mieszko WODZYŃSKI. "The Use of Virtual Reality for Training in Securing the Functioning of Critical Infrastructure." Problems of Mechatronics Armament Aviation Safety Engineering 11, no. 4 (2020): 73–82. http://dx.doi.org/10.5604/01.3001.0014.5645.

Full text
Abstract:
Our national security, economic prosperity and national welfare depend on a set of highly interdependent elements of critical infrastructure. Examples of critical infrastructure facilities include the national electricity grid, oil and gas systems, telecommunication and information networks, transportation networks, water systems and banking and financial systems. Given their importance, it is crucial to maintain the reliability of critical infrastructure facilities, especially power plants, both in times of peace and also in times of crisis or under conditions of attack. For this purpose, on
APA, Harvard, Vancouver, ISO, and other styles
46

Blintsov, V., and P. Maidaniuk. "CLASSIFICATION OF PROJECTS FOR THE PROTECTION OF MARINE CRITICAL INFRASTRUCTURE FACILITIES." Odes’kyi Politechnichnyi Universytet Pratsi 3, no. 59 (2019): 80–89. http://dx.doi.org/10.15276/opu.3.59.2019.11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Mel'nikova, Ekaterina, and Andrey Rodionov. "Issues of qualification of unauthorized access to critical information infrastructure facilities." Legal Science and Practice: Journal of Nizhny Novgorod Academy of the Ministry of Internal Affairs of Russia 2024, no. 3 (2024): 208–15. http://dx.doi.org/10.36511/2078-5356-2024-3-208-215.

Full text
Abstract:
The article provides a criminal legal analysis of the crime provided for in part. 2.4 tbsp. 2741 of the Criminal Code of the Russian Federation — unlawful access to objects of critical information infrastructure of the Russian Federation. The authors conducted a comparative study of the objects regulated by the federal law no. 187-FZ of July 26, 2017 “On the security of critical information infrastructure of the Russian Federation” and part. 2.4 tbsp. 2741 of the Criminal Code of the Russian Federation, a legal assessment is given to criminal actions expressed in unlawful access using someone
APA, Harvard, Vancouver, ISO, and other styles
48

Magomedov, Andrii. "Sustainability of Critical Infrastructure Facilities in the Context of Public Administration." Modern Economics 46, no. 1 (2024): 69–76. https://doi.org/10.31521/modecon.v46(2024)-10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Gerasimenko, O. M. "Problems and prospects of the application of artificial intelligence in the combat of criminal offenses by The Security Service of Ukraine at critical infrastructure facilities." Analytical and Comparative Jurisprudence, no. 5 (October 12, 2024): 680–87. http://dx.doi.org/10.24144/2788-6018.2024.05.105.

Full text
Abstract:
The article is devoted to the study of the problems and prospects of the use of artificial intelligence in countering criminal offenses by the Security Service of Ukraine at critical infrastructure facilities. The peculiarities of state policy, the current state of legal regulation of the use of innovative technology in Ukraine are considered, and problematic issues of the use of artificial intelligence in the course of the tasks of prevention, detection, termination, and pre­trial investigation of criminal proceedings in the relevant field are analyzed. The main areas of application of artifi
APA, Harvard, Vancouver, ISO, and other styles
50

Rao, Yichen. "Discourse as infrastructure: How “New Infrastructure” policies re-infrastructure China." Global Media and China 8, no. 3 (2023): 254–70. http://dx.doi.org/10.1177/20594364231198605.

Full text
Abstract:
The term “New Infrastructure” has been highlighted in China’s recent policies. It refers to a set of new, and expanding, policies and the discourse surrounding them which support the development of facilities, equipment, and systems derived from the latest technologies, including 5G Internet of Things, AI, cloud computing, and data centers. This article reviews China’s New Infrastructure policies, analyzing their specific discursive ontologies and how they relate to major state projects to “re-infrastructure” China’s economy. It introduces the concept of “discursive infrastructure” and argues
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!