To see the other types of publications on this topic, follow the link: Critical Infrastructure Protection (CIP).

Journal articles on the topic 'Critical Infrastructure Protection (CIP)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Critical Infrastructure Protection (CIP).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Tabansky, L. "Critical Infrastructure Protection." International Journal of Cyber Warfare and Terrorism 3, no. 3 (2013): 80–87. http://dx.doi.org/10.4018/ijcwt.2013070106.

Full text
Abstract:
Cyber Warfare holds a grave hazard of striking national infrastructure while circumventing traditional defense systems. This article examines the evolution of Critical Infrastructure Protection (CIP) policy in Israel and analyses its performance. Israel has developed a unique legal and regulatory model for critical infrastructure protection, which was implemented in late 2002. Recently, a comprehensive review of cyber security posture has been conducted, and significant policy changes are in progress. The Israeli approach to CIP and beyond, fostering cooperation between public, security, acade
APA, Harvard, Vancouver, ISO, and other styles
2

Brem, Stefan. "Critical Infrastructure Protection from a National Perspective." European Journal of Risk Regulation 6, no. 2 (2015): 191–99. http://dx.doi.org/10.1017/s1867299x00004499.

Full text
Abstract:
This article addresses conceptional components of national strategies on critical infrastructure protection (CIP). In particular, it focuses on the Swiss CIP programme and its strategic components. As in other countries, Switzerland divides its national infrastructure into critical sectors, but rather distinctively it subdivides them into critical subsectors and even lists specific critical infrastructure objects in a classified inventory. The article stresses the importance of a pragmatic public private partnership in further strengthening the CI's resiliency, but also argues for a more expli
APA, Harvard, Vancouver, ISO, and other styles
3

Trifunović, Darko. "Elements of Critical Infrastructure Resilience." National security and the future 20, no. 1-2 (2020): 51–61. http://dx.doi.org/10.37458/nstf.20.1-2.6.

Full text
Abstract:
This Article points to key elements of Critical Infrastructure Resilience (CIR) and how they differ from Critical Infrastructure Protection (CIP). CIP is still very important and one of the key systems that the society relies upon to ensure the continuity of operation of CI. However, CIP cannot predict an adequate number of major threats that would allow to conduct the preparedness and response at the level which would ensure the sufficient operation of CI in all cases. In that sense CIR sets a new paradigm with a quality that reduces vulnerability, minimizes the consequences of threats, accel
APA, Harvard, Vancouver, ISO, and other styles
4

Schmitz, W. "Simulation and test: Instruments for Critical Infrastructure Protection (CIP)." Information Security Technical Report 12, no. 1 (2007): 2–15. http://dx.doi.org/10.1016/j.istr.2007.02.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Große, Christine, Pär M. Olausson, and Susanne Wallman-Lundåsen. "Left in the Dark: Obstacles to Studying and Performing Critical Infrastructure Protection." Electronic Journal of Business Research Methods 19, no. 2 (2021): pp58–70. http://dx.doi.org/10.34190/ejbrm.19.2.2509.

Full text
Abstract:
This paper highlights major methodological obstacles to studying and performing critical infrastructure protection (CIP) in general and CIP governance in particular. The study simultaneously examines a research project on and practice in the context of Swedish CIP. The complex planning approach of interest is called Styrel, a Swedish acronym for Steering Electricity to prioritised power consumers. It aims to identify and prioritise power consumers of societal importance, collectively referred to as critical infrastructure (CI), to provide an emergency response plan for the event of a national
APA, Harvard, Vancouver, ISO, and other styles
6

Yigit, Yagmur, Mohamed Amine Ferrag, Mohamed C. Ghanem, et al. "Generative AI and LLMs for Critical Infrastructure Protection: Evaluation Benchmarks, Agentic AI, Challenges, and Opportunities." Sensors 25, no. 6 (2025): 1666. https://doi.org/10.3390/s25061666.

Full text
Abstract:
Critical National Infrastructures (CNIs)—including energy grids, water systems, transportation networks, and communication frameworks—are essential to modern society yet face escalating cybersecurity threats. This review paper comprehensively analyzes AI-driven approaches for Critical Infrastructure Protection (CIP). We begin by examining the reliability of CNIs and introduce established benchmarks for evaluating Large Language Models (LLMs) within cybersecurity contexts. Next, we explore core cybersecurity issues, focusing on trust, privacy, resilience, and securability in these vital systems
APA, Harvard, Vancouver, ISO, and other styles
7

Wiater, Patricia. "On the notion of “Partnership” in Critical Infrastructure Protection." European Journal of Risk Regulation 6, no. 2 (2015): 255–62. http://dx.doi.org/10.1017/s1867299x00004554.

Full text
Abstract:
This article is a critical reflection on the manifoldness of the notion of “partnership” in Critical Infrastructure Protection. It is argued that the partnership arrangement can be a promising political approach to CIP if the details of public-private cooperation – that is: the participants, the duration, the responsibilities and duties, as well as possible financial compensation – are formalized. Illusionary ideas of a “partner-like” relationship between the public and the private, such as those laid down in the German “National Strategy for Critical Infrastructure Protection”, are, however,
APA, Harvard, Vancouver, ISO, and other styles
8

Mohammed, Amir, Fasil Muddeen, Lincoln Marine, and Craig J. Ramlal. "The Exigency for Resilient and Cyber-Secure Critical Infrastructure in the Caribbean." West Indian Journal of Engineering 45, no. 2 (2023): 35–49. http://dx.doi.org/10.47412/deox2766.

Full text
Abstract:
Critical Infrastructures (CIs) are essential assets used to maintain vital societal functions, for example utilities such as power, water, gas, and telecommunication networks. CIs comprise two main parts, namely a: Cyber component and a Physical component, which allow them to operate. Therefore, the occurrence of faults or attacks in either domain can result in the disruption of services, causing negative impacts beyond the system itself. The purpose of this article is to raise awareness within Trinidad and Tobago and, by extension, the Caribbean on the importance of maintaining resilient and
APA, Harvard, Vancouver, ISO, and other styles
9

Nwizu, Udoka Ngozi. "Securing America’s Critical Infrastructure: Strengthening Compliance with NERC Cybersecurity Standards." Journal of Technology and Systems 7, no. 2 (2025): 33–47. https://doi.org/10.47941/jts.2636.

Full text
Abstract:
Purpose: Critical infrastructure, including energy, transportation, and water systems, is increasingly vulnerable to cyber threats and physical attacks. This paper examines the current state of America’s critical infrastructure security, focusing on the challenges posed by sophisticated cyberattacks, aging infrastructure, and regulatory compliance. The study evaluates the effectiveness of existing security frameworks, including the North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) standards, and highlights gaps in their implementation. Methodology:
APA, Harvard, Vancouver, ISO, and other styles
10

Schweizer, Rainer J. "State Duties to Protect." European Journal of Risk Regulation 6, no. 2 (2015): 219–28. http://dx.doi.org/10.1017/s1867299x00004529.

Full text
Abstract:
Most European countries’ constitutional obligations guarantee and protect public security and fundamental rights. One aspect and often a prerequisite for the protection of public security and individual rights is the protection of critical infrastructure (CIP). CIP is of great importance in Switzerland, which is inevitable in an economically and technologically sophisticated and densely populated country.
APA, Harvard, Vancouver, ISO, and other styles
11

García de Soto, Borja, Alexandru Georgescu, Bharadwaj Mantha, Žiga Turk, Abel Maciel, and Muammer Semih Sonkor. "Construction cybersecurity and critical infrastructure protection: new horizons for Construction 4.0." Journal of Information Technology in Construction 27 (June 16, 2022): 571–94. http://dx.doi.org/10.36680/j.itcon.2022.028.

Full text
Abstract:
One of the key concepts of Construction 4.0 is cyber-physical systems. The construction industry is increasingly creating valuable digital assets, but it is also gradually using digital technology to plan, design, build, monitor, and control the physical ones. This makes construction sites and operations vulnerable to cyber-attacks. While the damage to digital assets can have financial implications, attacks on digitally-controlled physical assets may impact people’s well-being and, in worst-case scenarios, result in casualties. The problem is amplified by the emerging cyber-physical nature of
APA, Harvard, Vancouver, ISO, and other styles
12

Todorović, Branislav, Darko Trifunović, Marina Todorović, and Mina Marković. "Problematika eksploatacije i održavanja vezana za zaštita kritične infrastrukture u domenu procesne industrije." Procesna tehnika 34, no. 1 (2022): 24. http://dx.doi.org/10.24094/ptc.022.34.1.24.

Full text
Abstract:
Proper operation of Critical Infrastructure (CI) is by definition of high importance for a region, nation or even several countries connected in some way. The term and idea of Critical Infrastructure Protection (CIP) has to do with the preparedness and response to serious incidents that might influence the operation of CI. In Europe, the European Programme for Critical Infrastructure Protection (EPCIP) refers to the doctrine or specific programs created as a result of the European Commission’s directive EU COM(2006) 786 which designates European critical infrastructure that, in case of fault,
APA, Harvard, Vancouver, ISO, and other styles
13

Besenyő, János, and András Fehér. "CRITICAL INFRASTRUCTURE PROTECTION (CIP) AS NEW SOFT TARGETS: PRIVATE SECURITY VS. COMMON SECURITY." Journal of Security and Sustainability Issues 10, no. 1 (2020): 5–18. http://dx.doi.org/10.9770/jssi.2020.10.1(1).

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Pschikal, A. "Sicherung strategischer Infrastrukturen – das europäische und das österreichische Programm CIP (Critical Infrastructure Protection)." e & i Elektrotechnik und Informationstechnik 127, no. 9 (2010): 242–44. http://dx.doi.org/10.1007/s00502-010-0760-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Hulak, Yevhen. "METHOD OF RATIONAL SYNTHESIS OF SUBSYSTEMS FOR CRYPTOGRAPHIC PROTECTION OF INFORMATION IN CRITICAL INFRASTRUCTURE NETWORKS." Cybersecurity: Education, Science, Technique 4, no. 24 (2024): 282–97. http://dx.doi.org/10.28925/2663-4023.2024.24.282297.

Full text
Abstract:
The article examines the state of development of the methodology for building information protection subsystems of information systems of critical infrastructure objects, and separately highlights the issue of creating complex protection for complex systems. It is noted that complex systems are characterized by the presence of a significant number of disparate elements, which are combined into a single system to achieve a certain goal; the existence of complex, sometimes contradictory relationships and influences; powerful information flows between component subsystems. The analysis of the cha
APA, Harvard, Vancouver, ISO, and other styles
16

Chochia, Archil, Shota Gvineria, and Holger Mölder. "Building a Legislative Framework for Securing Georgia’s Strategic Assets." TalTech Journal of European Studies 14, no. 1 (2024): 271–302. http://dx.doi.org/10.2478/bjes-2024-0013.

Full text
Abstract:
Abstract The article discusses the importance of modernizing and securing critical infrastructure in Georgia, particularly within the context of its geopolitical position and evolving economic landscape, by building an appropriate legal framework. The article outlines the signifi cant impact of cyberspace on traditional sectors such as energy, transportation, and telecommunications, necessitating a re-evaluation of critical infrastructure in the digital age. Highlighting Georgia’s aspirations to align with European and Euro-Atlantic structures for enhanced national security and democratization
APA, Harvard, Vancouver, ISO, and other styles
17

Saikrishna Tipparapu. "IAM based Audit Framework to enhance and protect the Critical Infrastructure for Distributed System." Journal of Information Systems Engineering and Management 10, no. 23s (2025): 721–36. https://doi.org/10.52783/jisem.v10i23s.3772.

Full text
Abstract:
Manufacturing facilities, transportation networks, energy distribution networks, and power plants are all examples of Critical Infrastructure (CI) that modern communities depend on to provide goods and services. Due to their size, complexity, and unique features, these CIs frequently require the assistance of Industrial Automation and Control Systems (IACS). IACS manages assets and administers day-to-day activities. With additional processes and networked monitoring and controlling devices, the attack surface of the underlying CIs grows in these increasingly complex IACS. To establish and disc
APA, Harvard, Vancouver, ISO, and other styles
18

Borchert, Heiko. "It Takes Two to Tango." European Journal of Risk Regulation 6, no. 2 (2015): 208–18. http://dx.doi.org/10.1017/s1867299x00004517.

Full text
Abstract:
This article focuses on the information requirements of public and private stakeholders engaged in critical infrastructure protection (CIP).With its emphasis on information management rather than information sharing, the article builds on existing research suggesting that the notion of information sharing inadvertently renders cooperation more difficult as it evokes impressions of information “dominance” rather than joint information ownership. The article proposes a joint public-private information management agenda based on core issues providing actionable information to tackle immediate thr
APA, Harvard, Vancouver, ISO, and other styles
19

Große, Christine. "Multi-Level Planning for Enhancing Critical Infrastructure Resilience against Power Shortages—An Analysis of the Swedish System of Styrel." Infrastructures 6, no. 5 (2021): 71. http://dx.doi.org/10.3390/infrastructures6050071.

Full text
Abstract:
The protection of infrastructure that is critical to society’s functionality, survival and progression has gained significance because of its large-scale and interdependent nature. This complex system-of-system (SoS) imposes extensive requirements on governance efforts to foster critical infrastructure protection (CIP). This paper uses the kaleidoscope for integrative system analysis (KISA) to investigate a Swedish approach for CIP against power shortages, called Styrel. Based on multiple sources of evidence, such as documents with regard to the case, interviews and a survey with involved expe
APA, Harvard, Vancouver, ISO, and other styles
20

Tomasek, Randi, and Yanzhen Qu. "Cybersecurity Regulations in the Energy Industry: A Detriment or a Benefit?" European Journal of Electrical Engineering and Computer Science 9, no. 3 (2025): 9–15. https://doi.org/10.24018/ejece.2025.9.3.709.

Full text
Abstract:
Electrical entities are attractive targets for malicious actors given their significance and necessity in modern critical infrastructure. Maintaining reliability of the electric grid is essential, making good cybersecurity practices necessary within the energy industry to ward off potential cyberattacks and maintain the functionality of electric systems. The North American Electric Reliability Corporation (NERC), an international organization servicing the United States of America and parts of Canda and Mexico, is a regulatory authority that aims to reduce risks to the electric grid. To addres
APA, Harvard, Vancouver, ISO, and other styles
21

Zaman, Dunya, and Mahdi Mazinani. "Cybersecurity in Smart Grids: Protecting Critical Infrastructure from Cyber Attacks." SHIFRA 2023 (August 18, 2023): 1–9. http://dx.doi.org/10.70470/shifra/2023/010.

Full text
Abstract:
The increasing digitalization of smart grids has brought numerous benefits in terms of efficiency, sustainability, and reliability, but it has also exposed these critical infrastructures to significant cybersecurity risks. This study investigates the cybersecurity challenges faced by smart grids, focusing on the vulnerabilities present in communication systems, control networks, and endpoint devices. The problem statement revolves around the growing complexity of smart grid infrastructures, which have become prime targets for cyberattacks such as denial-of-service (DoS), malware, and data brea
APA, Harvard, Vancouver, ISO, and other styles
22

Houston Jr., Clemith J., and Douglas C. Sicker. "Maturity and Process Capability Models and Their Use in Measuring Resilience in Critical Infrastructure Protection Sectors." International Journal of Strategic Information Technology and Applications 5, no. 2 (2014): 44–63. http://dx.doi.org/10.4018/ijsita.2014040104.

Full text
Abstract:
This paper provides a literature review and survey of maturity and process capability models, Critical Infrastructure Protection (CIP) tools and frameworks to identify strategies for assessing and measuring resilience and risk management capabilities, with a specific focus on the electricity generating sector. The focus is on the use of models such as CERT-RMM, and others, as a means of addressing challenges associated with cyber security and risk management. Foundational concepts, terminology and definitions are provided; examples of maturity and process capability models are presented and di
APA, Harvard, Vancouver, ISO, and other styles
23

Suchismita, Chatterjee. "The Importance of Penetration Testing in the Oil and Gas Industry: Mitigating Cyber Risks and Ensuring NERC CIP Compliance." International Journal on Science and Technology 14, no. 3 (2023): 1–12. https://doi.org/10.5281/zenodo.14551772.

Full text
Abstract:
The oil and gas industry, a critical component of global energy infrastructure, faces mounting cybersecurity threats due to the rapid integration of digital technologies with operational environments. The convergence of Information Technology (IT) and Operational Technology (OT) has amplified vulnerabilities, exposing legacy systems, Industrial Control Systems (ICS), and Supervisory Control and Data Acquisition (SCADA) systems to sophisticated cyberattacks. Recent incidents, including ransomware targeting pipelines and espionage campaigns against critical energy assets, highlight the urgency f
APA, Harvard, Vancouver, ISO, and other styles
24

Huang, Yih, David Arsenault, and Arun Sood. "SCIT-DNS: Critical infrastructure protection through secure DNS server dynamic updates." Journal of High Speed Networks 15, no. 1 (2006): 5–19. https://doi.org/10.3233/hsn-2006-274.

Full text
Abstract:
Domain Name Systems (DNS) provide the mapping between easily remembered host names and their IP addresses. While domain name information is typically created and updated off-line, dynamic DNS updates allow clients to manage domain names online, in real time. The current secure DNS standards (DNSSEC) require private keys to be kept online to sign dynamic updates, leaving private keys subject to network-based attacks. In this work, we develop a secure implementation framework of DNS servers that voids the above requirement. Our approach, called Self-Cleansing Intrusion Tolerance (SCIT), strength
APA, Harvard, Vancouver, ISO, and other styles
25

Afiya, Nadien, Arfin Sudirman, and Falhan Hakiki. "One Channel System sebagai Sistem Keamanan Siber untuk Melindungi Pekerja Migran Indonesia di Malaysia." Indonesian Perspective 9, no. 1 (2024): 47–69. http://dx.doi.org/10.14710/ip.v9i1.60882.

Full text
Abstract:
Tingginya angka permasalahan Pekerja Migran Indonesia (PMI) di Malaysia yang terus berlanjut sedari dahulu hingga sekarang membutuhkan upaya kedua pemerintah untuk menanggulangi permasalahan tersebut. Tahun 2022 Indonesia-Malaysia menetapkan MoU yang berisikan One Channel System sebagai satu-satunya kanal penempatan dan pengawasan PMI. One Channel System merupakan sistem terintegrasi antara pemerintah Indonesia dengan Malaysia dalam seluruh proses penempatan, pemantauan, dan kepulangan PMI disana, nantinya semua data yang mencakup lokasi bekerja, identitas majikan dan latar belakang majikan ak
APA, Harvard, Vancouver, ISO, and other styles
26

Alharbi, Fahad, and Denes Csala. "Saudi Arabia’s Solar and Wind Energy Penetration: Future Performance and Requirements." Energies 13, no. 3 (2020): 588. http://dx.doi.org/10.3390/en13030588.

Full text
Abstract:
Saudi Arabia fully depends on fossil fuels such as oil and natural gas to generate its electricity. Fossil fuels may have limited life and a history of fluctuating costs, which will lead to multiple issues that can affect the energy security of this country in the long-term. Critical Infrastructure Protection (CIP) is a concept different to “energy security”, which must consider the solar and wind energy as basic sources of energy supplies in Saudi Arabia. Monte Carlo Simulation (MCS) and Brownian Motion (BM) approaches were employed to predict the future behaviour of solar and wind energy, al
APA, Harvard, Vancouver, ISO, and other styles
27

BARĆ, Marek. "Critical infrastructure protection." Scientific Bulletin of Flight Academy. Section: Economics, Management and Law 3;4 (February 25, 2021): 207–11. http://dx.doi.org/10.33251/2707-8620-2021-3-4-207-211.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Madsen, Wayne. "Critical infrastructure protection." Computer Fraud & Security 1997, no. 3 (1997): 8–9. http://dx.doi.org/10.1016/s1361-3723(97)83576-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Jones, Andrew. "Critical infrastructure protection." Computer Fraud & Security 2007, no. 4 (2007): 11–15. http://dx.doi.org/10.1016/s1361-3723(07)70059-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

George, Richard. "Critical infrastructure protection." International Journal of Critical Infrastructure Protection 1 (December 2008): 4–5. http://dx.doi.org/10.1016/j.ijcip.2008.08.010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Garrett, Terence M. "An analysis of U.S. Custom and Border Protection’s tripartite Mexico border security policy." Annales. Etyka w Życiu Gospodarczym 21, no. 4 (2018): 89–111. http://dx.doi.org/10.18778/1899-2226.21.4.07.

Full text
Abstract:
The Custom and Border Protection (CBP) border security policy was explicitly presented by former Acting Commissioner of CBP, David Aguilar, in testimony before the United States Senate Homeland Security and Governmental Affairs Committee (HSGAC) on April 4, 2017 in testimony on the subject of “Fencing Along the Southwest Border.” Important for discussion here are the key components of the DHS/CBP/Border Patrol’s strategy, or sets of policies, laying forth elements of the border walls (including barriers, fences), personnel, and technology in order to hinder, or intercept, undocumented migrants
APA, Harvard, Vancouver, ISO, and other styles
32

Nickolov, Eugene. "Critical Information Infrastructure Protection." Information & Security: An International Journal 17 (2005): 105–19. http://dx.doi.org/10.11610/isij.1707.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Titis Adityo Nugroho, Aloysius Uwiyono, and Simona Bustani. "Legal politics of communal intellectual property regulation in the national legal framework." International Journal of Science and Research Archive 16, no. 1 (2025): 1008–14. https://doi.org/10.30574/ijsra.2025.16.1.2107.

Full text
Abstract:
This research analyzes the legal politics of protecting Communal Intellectual Property (CIP) in Indonesia, a country rich in ethnic, cultural, and biological diversity. Using a qualitative desk study method, it explores how Indonesia’s legal and political frameworks address the protection of CIP within a predominantly Western, individual-oriented intellectual property (IP) system. While Indonesia has made notable progress—especially through the issuance of Government Regulation No. 56 of 2022 on Communal Intellectual Property—serious implementation challenges remain. The regulation marks an im
APA, Harvard, Vancouver, ISO, and other styles
34

CIEKANOWSKI, ZBIGNIEW, Sławomir Żurawski, and Henryk Wyrębek. "CRITICAL INFRASTRUCTURE THREATS." Studia Administracji i Bezpieczeństwa 13, no. 13 (2023): 263–72. http://dx.doi.org/10.5604/01.3001.0016.2902.

Full text
Abstract:
The aim of the article was to analyze Polish and European Union legislation in the field of critical infrastructure protection in the elements essential for the functioning of the Polish state and the European Union. In the first part, the authors show the role of critical infrastructure in the functioning of the state. Then, they characterize the threats as well as popular systems and methods used to protect CI against terrorist threats. The next part analyzes the legislation which relates to an international organization such as the European Union. Summing up, the authors explain the concept
APA, Harvard, Vancouver, ISO, and other styles
35

BECKVARD, HENRIK P. "PROTECTING CRITICAL INFRASTRUCTURE AND CRITICAL INFORMATION INFRASTRUCTURE." CONTEMPORARY MILITARY CHALLENGES 2022, no. 2 (2022): 15–28. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.24.2.1.

Full text
Abstract:
Abstract Regardless of how you define critical infrastructure, and critical information infrastructure as part of it, these are elements necessary for the functioning, integrity and security of a digitised society. Mapping what is critical (information) infrastructure and assessing the risks and hazards to it is a first step towards protection, along with a risk decision to either mitigate, remediate or accept the risk. For the protection of critical (information) infrastructure it is necessary to coordinate efforts and collaboration between sectors, which are often interdependent. Public-Priv
APA, Harvard, Vancouver, ISO, and other styles
36

Sadowski, Józef. "The critical infrastructure protection. Legislation." AUTOBUSY – Technika, Eksploatacja, Systemy Transportowe 19, no. 6 (2018): 1242–48. http://dx.doi.org/10.24136/atest.2018.260.

Full text
Abstract:
The content outline: in accordance with law, the Polish critical infrastructure constitutes 11 sectors, vital for national security and public safety persistence. Two of the sectors (energy sector and transportation systems sector), are elements of the European Critical Infrastructure, and due to Poland’s EU and NATO membership, are subject to particular protection. The paper describes general principles of Polish critical infrastructure safety law acts and critical infrastructure sectors. Later in this paper, 4 alert states (THREATCON), and their impact on the critical infrastructure safety a
APA, Harvard, Vancouver, ISO, and other styles
37

TYBURSKA, Agata. "POLICE AND CRITICAL INFRASTRUCTURE PROTECTION." Scientific Journal of the Military University of Land Forces 161, no. 3 (2011): 143–62. http://dx.doi.org/10.5604/01.3001.0002.3052.

Full text
Abstract:
Police is an organization mainly identified as the authority responsible for public order and safety. Providing the country with the appropriate level of security requires a new look at the role of the authorities, including the police, involved in security matters. New, so far non-existing threats result from human dependence upon scientific and technological achievements. Efficient sectors such as energy, fuel, transportation, telecommunications, finance, health care, or any other sector ensuring continuity of public administration bodies, make our lives easier but at the same time pose a gr
APA, Harvard, Vancouver, ISO, and other styles
38

SKALICKÁ, Petra. "CRITICAL INFRASTRUCTURE PROTECTION - CASE STUDY." Krízový Manažment 16, no. 2 (2017): 70–77. http://dx.doi.org/10.26552/krm.c.2017.2.70-77.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Westrin, Peter. "Critical Information Infrastructure Protection (CIIP)." Information & Security: An International Journal 7 (2001): 67–79. http://dx.doi.org/10.11610/isij.0704.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Trapolino, Scott L. "GIS for Critical Infrastructure Protection." Photogrammetric Engineering & Remote Sensing 83, no. 11 (2017): 733. http://dx.doi.org/10.14358/pers.83.10.733.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Todd, Mike, Carl Colwill, and Dave Allen. "Benchmarking for Critical Infrastructure Protection." Information Security Technical Report 7, no. 2 (2002): 37–49. http://dx.doi.org/10.1016/s1363-4127(02)02005-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Shull, Casey, J. Eric Dietz, and C. Robert Kenley. "CRITICAL INFRASTRUCTURE PROTECTION AND RECOVERY." INSIGHT 19, no. 4 (2016): 47–49. http://dx.doi.org/10.1002/inst.12127.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Pavlov, Georgi, Teodora Gechkova, and Tiana Kaleeva. "CRITICAL INFRASTRUCTURE PROTECTION – STRATEGIC OPPORTUNITIES." International Journal for Quality Research 19, no. 1 (2025): 281–96. https://doi.org/10.24874/ijqr19.01-18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Hruza, Petr. "Resilience and Protection of Critical Information Infrastructure Resilience and Protection of Critical Information Infrastructure." Communications - Scientific letters of the University of Zilina 20, no. 2 (2018): 110–14. http://dx.doi.org/10.26552/com.c.2018.2.110-114.

Full text
Abstract:
The article deals with resilience and protection of critical information infrastructure elements. The elements affect rapid recovery of the system to its original state and the increase of resistance during the subsequent emergency events. The article also deals with sectoral and cross-sectional criteria for determining the critical information infrastructure elements, which are closely related to resilience and protection. Risk assessment has been conducted in the area of critical information infrastructure. Finally, amendments of the Czech Cyber Security Act have been mentioned.
APA, Harvard, Vancouver, ISO, and other styles
45

KLYMENKO, Kateryna, and Maksym SAVOSTIANENKO. "Strengthening the protection of critical infrastructure: domestic realities and international cooperation." Naukovi pratsi NDFI 2021, no. 2 (2021): 44–68. http://dx.doi.org/10.33763/npndfi2021.02.044.

Full text
Abstract:
The article emphasizes that the creation of a state system of critical infrastructure protection requires legal regulation of the basic principles of its operation, the introduction of common approaches to the management of system facilities at the state and local levels, defining the principles of interaction between state bodies and society. and citizens. Specific problematic aspects of the sphere of critical infrastructure protection in the process of reform are considered, among which: lack of a unified national system of critical infrastructure protection; insufficiency and inconsistency
APA, Harvard, Vancouver, ISO, and other styles
46

Azarenko, O., Yu Honcharenko, M. Diviziniuk, A. Khmyrova, R. Shevchenko, and O. Shevchenko. "CHARACTERISATION OF METHODS OF PROTECTING THE STATE’S CRITICAL INFRASTRUCTURE FROM TERRORIST ACTIVITIES." Municipal economy of cities 1, no. 182 (2024): 202–9. http://dx.doi.org/10.33042/2522-1809-2024-1-182-202-209.

Full text
Abstract:
The study describes methods for protecting the critical infrastructure of a state. The article aims to determine the combination of protecting methods of the state’s critical infrastructure from terrorist activities, namely security, physical protection, protection of critical infrastructure, protection of critical information infrastructure, and prevention of emergencies of a terrorist nature at objects of critical infrastructure. It is necessary to fulfil the following objectives to achieve the aim: to consider the difference and interrelation of the concepts of critical infrastructure and i
APA, Harvard, Vancouver, ISO, and other styles
47

Sadowski, Józef. "The critical infrastructure protection. The genesis." AUTOBUSY – Technika, Eksploatacja, Systemy Transportowe 19, no. 6 (2018): 1237–41. http://dx.doi.org/10.24136/atest.2018.259.

Full text
Abstract:
The concept of critical infrastructure was already known in a number of ancient civilizations across different continents. Critical infrastructure was considered vital, enabling civilization a proper functioning. The purpose of this article is to present reason and sequence of practice actions for selected Poland associated administrative offices and countries organizations. A cause and an historical overview of the preparation of the United States, European and Polish critical infrastructure protection was provided. According to the manuscripts, critical infrastructure of majority of nations
APA, Harvard, Vancouver, ISO, and other styles
48

Warren, Matthew J., and Shona Leitch. "Critical supply chain systems and critical infrastructure protection." International Journal of Logistics Economics and Globalisation 2, no. 2 (2010): 107. http://dx.doi.org/10.1504/ijleg.2010.032427.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Alexandru, Adriana, Victor Vevera, and Ella Magdalena Ciupercă. "National Security and Critical Infrastructure Protection." International conference KNOWLEDGE-BASED ORGANIZATION 25, no. 1 (2019): 8–13. http://dx.doi.org/10.2478/kbo-2019-0001.

Full text
Abstract:
Abstract The link between national security and the protection of critical infrastructure is vital to the progress of any society and its proper social functioning. The term critical infrastructure was developed by the United States in the 1990s and it has evolved in time; nowadays, most of the current definitions include the security dimension in their content. Along with its many benefits, the technological advancement has brought with it the diversification of threats that could lead to the malfunctioning of critical infrastructures. The new weapons of the 21st century and the new asymmetri
APA, Harvard, Vancouver, ISO, and other styles
50

G. Quijano, Eduardo, David Ríos Insua, and Javier Cano. "Critical networked infrastructure protection from adversaries." Reliability Engineering & System Safety 179 (November 2018): 27–36. http://dx.doi.org/10.1016/j.ress.2016.10.015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!