To see the other types of publications on this topic, follow the link: Cyber-infrastructure.

Journal articles on the topic 'Cyber-infrastructure'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cyber-infrastructure.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

MANUILOV, Y. "Cyber security of critical infrastructure during cyber warfare." INFORMATION AND LAW, no. 1(44) (March 28, 2023): 154–67. http://dx.doi.org/10.37750/2616-6798.2023.1(44).287780.

Full text
Abstract:
The concepts and characteristics of critical infrastructure are defined. The role and place of critical infrastructure in the structure of national security of Ukraine is highlighted. The factors that affect the security of critical infrastructure are detailed. The principles of state policy in the field of cyber security of critical infrastructure are outlined. The threats that affect the security of critical infrastructure in the conditions of cyber warfare have been identified. The expediency of conducting periodic reviews of the state of cyber security of critical infrastructure of strateg
APA, Harvard, Vancouver, ISO, and other styles
2

Satya Praveen Kumar, Naga. "Cybersecurity and Cyber Attacks in Cloud Infrastructure." International Journal of Science and Research (IJSR) 12, no. 4 (2023): 1915–20. https://doi.org/10.21275/sr24628043205.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

White, Garry L. "Infrastructure Cyber-Attack Awareness Training." International Journal of Information Security and Privacy 16, no. 1 (2022): 1–26. http://dx.doi.org/10.4018/ijisp.291702.

Full text
Abstract:
The purpose of this study is to provide insight as to how infrastructure countermeasures awareness training will impact individuals dealing with a nationwide catastrophic cyber-attack. Can this awareness training lessen the psychological effect of an attack? This study showed no value for this type of training. Reading about such an attack, the subjects had lower technical optimism and cyber self-efficacy. Reading about infrastructure countermeasures, before or after reading about a cyber-attack, did not improve or maintain the subjects’ optimism and self-efficacy. A possible explanation is th
APA, Harvard, Vancouver, ISO, and other styles
4

Boughton, Nick. "Protecting infrastructure from cyber attack." Network Security 2019, no. 4 (2019): 18–19. http://dx.doi.org/10.1016/s1353-4858(19)30051-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kelic, Andjelka. "Cyber Risk in Critical Infrastructure." ACM SIGMETRICS Performance Evaluation Review 46, no. 2 (2019): 72–75. http://dx.doi.org/10.1145/3305218.3305243.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ramage, Xavier, Khutso Lebea, and Siphesihle Sithungu. "Cyber Warfare and Critical Infrastructure." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 566–75. https://doi.org/10.34190/eccws.24.1.3526.

Full text
Abstract:
This paper identifies the growing threat that cyber warfare poses to a country's Critical Infrastructure (CI) and the Critical Information Infrastructure (CII) that accompanies it. CI is a term that describes all of the essential systems and services needed for the nation to function. CII describes the Information Systems responsible for the CI's operation. This includes energy grids, finance, water supplies, transportation, and healthcare facilities. This paper will focus mainly on the CI related to energy grids and finance. With the growing integration of digital technologies into these sect
APA, Harvard, Vancouver, ISO, and other styles
7

Rai, Roshan. "From Digital India to Digital Economy: Understanding India's Cyber Infrastructure and Cyber Security." International Journal of Science and Research (IJSR) 10, no. 10 (2021): 1421–26. https://doi.org/10.21275/mr211010171914.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Maliarchuk, Tamara, Yuriy Danyk, and Chad Briggs. "Hybrid Warfare and Cyber Effects in Energy Infrastructure." Connections: The Quarterly Journal 18, no. 1-2 (2019): 93–110. http://dx.doi.org/10.11610/connections.18.1-2.06.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

CIAPA, S. "Legal and organizational provision of protection of the critical information infrastructure from cyberattacks." INFORMATION AND LAW, no. 4(39) (December 9, 2021): 121–28. http://dx.doi.org/10.37750/2616-6798.2021.4(39).248832.

Full text
Abstract:
The article considers the legal and organizational aspects of ensuring the protection of the critical information infrastructure from cyberattacks. Attention is drawn to the positive experience of the United States in ensuring the resilience of the objects of critical infrastructure. The provisions of the new Cyber Security Strategy of Ukraine are analyzed, one of the priorities of which is to improve the regulatory framework for cyber security of critical information infrastructure. The shortcomings of the previous Cyber Security Strategy of Ukraine (2016) are noted. Contains a detailed analy
APA, Harvard, Vancouver, ISO, and other styles
10

Khydyntsev, M. M., V. Yu Zubok, and I. L. Palazhchenko. "Approaches to the Analysis of Sets of Cyber Statistics Indicators." Èlektronnoe modelirovanie 46, no. 6 (2024): 72–96. https://doi.org/10.15407/emodel.46.06.072.

Full text
Abstract:
The work is devoted to solving the urgent problem of assessing cybersecurity, the state of cyber defense, cyber resilience (cyber resilience) at the facility, sectoral, national and interna-tional levels by forming sets and analyzing cyber statistics data, which is gradually being sepa-rated into a special area of cybersecurity. The terminological base for collecting and processing cyber statistics data was analyzed and developed as well as the existing and new approaches to the formation of sets of cyber statistics indicators were proposed. Existing practices (established practices, framework
APA, Harvard, Vancouver, ISO, and other styles
11

Muhammad Jamshid Khan. "Securing network infrastructure with cyber security." World Journal of Advanced Research and Reviews 17, no. 2 (2023): 803–13. http://dx.doi.org/10.30574/wjarr.2023.17.2.0308.

Full text
Abstract:
In today's digital age, securing network infrastructure has become a critical concern for organizations of all sizes. With the increasing number of cyber threats, it is essential to implement effective measures to protect sensitive information and prevent unauthorized access to network infrastructure. This article explores the various methods that organizations can use to secure their network infrastructure and maintain the integrity of their sensitive information. This article provides valuable insights into the various methods that organizations can use to secure their network infrastructure
APA, Harvard, Vancouver, ISO, and other styles
12

Muhammad, Jamshid Khan. "Securing network infrastructure with cyber security." World Journal of Advanced Research and Reviews 17, no. 2 (2023): 803–13. https://doi.org/10.5281/zenodo.8109753.

Full text
Abstract:
In today's digital age, securing network infrastructure has become a critical concern for organizations of all sizes. With the increasing number of cyber threats, it is essential to implement effective measures to protect sensitive information and prevent unauthorized access to network infrastructure. This article explores the various methods that organizations can use to secure their network infrastructure and maintain the integrity of their sensitive information. This article provides valuable insights into the various methods that organizations can use to secure their network infrastruc
APA, Harvard, Vancouver, ISO, and other styles
13

Chester, Mikhail V., and Braden R. Allenby. "Perspective: The Cyber Frontier and Infrastructure." IEEE Access 8 (2020): 28301–10. http://dx.doi.org/10.1109/access.2020.2971960.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Onyeji, Ijeoma, Morgan Bazilian, and Chris Bronk. "Cyber Security and Critical Energy Infrastructure." Electricity Journal 27, no. 2 (2014): 52–60. http://dx.doi.org/10.1016/j.tej.2014.01.011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Winter, H. Henning, and Marian Mours. "The cyber infrastructure initiative for rheology." Rheologica Acta 45, no. 4 (2005): 331–38. http://dx.doi.org/10.1007/s00397-005-0041-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Kwon, Sungmoon, Seokcheol Lee, Jiwoong Jang, and Taeshik Shon. "Cyber Security Framework for Critical Infrastructure." Journal of the Korea Institute of Information Security and Cryptology 27, no. 2 (2017): 241–50. http://dx.doi.org/10.13089/jkiisc.2017.27.2.241.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Vesić, Slavimir, and Martin Bjelajac. "Cyber security of a critical infrastructure." Pravo - teorija i praksa 40, no. 2 (2023): 77–88. http://dx.doi.org/10.5937/ptp2302077v.

Full text
Abstract:
A critical infrastructure consists of basic assets and facilities whose functioning has a significant impact on the society and economy of a country, as well as on its security. The life and work of the citizens of a country are largely dependent on a smooth operation of various energy, telecommunication, water and sewage facilities, as well as the network of hospitals and health institutions, transportation, etc. The safe functioning of these systems is a prerequisite for the existence and development of a social community in an area. Therefore, it is necessary to undertake all necessary acti
APA, Harvard, Vancouver, ISO, and other styles
18

Ganapathy, Apoorva. "Cyber Security for the Cloud Infrastructure." Asian Journal of Applied Science and Engineering 8, no. 1 (2019): 15–24. http://dx.doi.org/10.18034/ajase.v8i1.8.

Full text
Abstract:
The need to protect cyberspace through cloud security cannot be over-emphasized. Hence, this article aims to appraise the full meaning of Cloud security comprehensively, its essence, how it works, and the bountiful benefits associated with it. It also x-rayed how one can master the usage to prevent security bridges by encouraging the use of passwording for such protection.
APA, Harvard, Vancouver, ISO, and other styles
19

KAMIŃSKI, Marcin. "CYBER SECURITY REQUIREMENTS FOR PORT INFRASTRUCTURE." Cybersecurity & Cybercrime 1, no. 1 (2021): 85–99. http://dx.doi.org/10.5604/01.3001.0053.8012.

Full text
Abstract:
The purpose of this article is to characterize cybersecurity threats related to thefunctioning of seaport infrastructure. The escalation of the use of modernteleinformation systems in maritime transport allows for the development of theefficiency of transshipment processes, improvement of the movement of multimodaltransport means and logistic processes and increasing their safety. Due to the wide useof these technologies, the possibility of cyberspace security incidents is growing. Thereis a need to define universal, basic cybersecurity requirements that will constitute thefoundation for creat
APA, Harvard, Vancouver, ISO, and other styles
20

Progoulakis, Iosif, Nikitas Nikitakos, Dimitrios Dalaklis, and Razali Yaacob. "Cyber-physical security for ports infrastructure." International Maritime Transport and Logistic Journal 11 (August 30, 2022): 105. http://dx.doi.org/10.21622/marlog.2022.11.105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Apoorva, .Ganapathy. "Cyber Security for the Cloud Infrastructure." Asian Journal of Applied Science and Engineering 8, no. 1 (2019): 15–24. https://doi.org/10.5281/zenodo.5522424.

Full text
Abstract:
The need to protect cyberspace through cloud security cannot be over-emphasized. Hence, this article aims to appraise the full meaning of Cloud security comprehensively, its essence, how it works, and the bountiful benefits associated with it. It also x-rayed how one can master the usage to prevent security bridges by encouraging the use of passwording for such protection.
APA, Harvard, Vancouver, ISO, and other styles
22

İmamoğlu, Mustafa Bilgehan. "CYBER INFRASTRUCTURE GUIDE: IT/OT INTEGRATION." Ömer Halisdemir Üniversitesi İktisadi ve İdari Bilimler Fakültesi Dergisi 18, no. 1 (2025): 378–91. https://doi.org/10.25287/ohuiibf.1558269.

Full text
Abstract:
Innovations in information and communication technologies have led to complex and dangerous security problems. Industries face financial and reputational losses due to inadequate applications in the field of cybersecurity. This situation increases the importance of industrial cybersecurity, which tries to protect industrial systems from cyber threats and attacks. Industrial cybersecurity is responsible for the protection of operational technologies and industrial control systems used in various branches of the industry, focusing on the continuity of business and the security of processes. It e
APA, Harvard, Vancouver, ISO, and other styles
23

Shkitov, A. "Features of creating a multi-level model of cyber security of critical infrastructure data: an interdisciplinary approach." COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, no. 56 (September 27, 2024): 71–77. http://dx.doi.org/10.36910/6775-2524-0560-2024-56-08.

Full text
Abstract:
The article examines the model of ensuring cyber security of Ukraine and documents the organizational and legal support for the protection of critical infrastructure objects from cyber attacks. The main concepts are described: multi-level data model, identification of cyber security, and critical infrastructure facilities. The levels of protection of critical infrastructure objects and measures at each level that ensure cyber security are highlighted and described. The stability of the critical infrastructure object is substantiated, and the formula for determining risks in critical infrastruc
APA, Harvard, Vancouver, ISO, and other styles
24

Mashtaliar, Yana, Valerii Kozachok, Zoreslava Brzhevska, and Oleksandr Bohdanov. "RESEARCH OF DEVELOPMENT AND INNOVATION OF CYBER PROTECTION AT CRITICAL INFRASTRUCTURE FACILITIES." Cybersecurity: Education, Science, Technique 2, no. 22 (2023): 156–67. http://dx.doi.org/10.28925/2663-4023.2023.22.156167.

Full text
Abstract:
Critical infrastructure objects — infrastructure objects, systems, their parts and their totality, which are important for the economy, national security and defense, the malfunctioning of which can harm vital national interests. Classification of objects as critical infrastructure is carried out in accordance with the procedure established by the Cabinet of Ministers of Ukraine. The assignment of banks, other entities operating in the financial services markets, state regulation and supervision of the activities of which is carried out by the National Bank of Ukraine, payment organizations, p
APA, Harvard, Vancouver, ISO, and other styles
25

Khudyntsev, Mykola M., and Igor L. Palazhchenko. "Cybersecurity maturity models for cybersecurity assessment in critical infrastructure." Environmental safety and natural resources 52, no. 4 (2024): 122–34. https://doi.org/10.32347/2411-4049.2024.4.122-134.

Full text
Abstract:
The paper includes a list of existing maturity models (cybersecurity maturity) and an analysis of the application of these models for assessing cybersecurity, the level, and maturity of cyber security, the maturity of systems and processes for ensuring cybersecurity in critical infrastructure sectors, in the national cybersecurity system, the development of indicators and indices of the state of security (network, information security, cybersecurity).The paper substantiates and proposes a hierarchy of models for assessing the maturity of cyber security in the national cyber security ecosystem
APA, Harvard, Vancouver, ISO, and other styles
26

Wright, Marc, Hassan Chizari, and Thiago Viana. "A Systematic Review of Smart City Infrastructure Threat Modelling Methodologies: A Bayesian Focused Review." Sustainability 14, no. 16 (2022): 10368. http://dx.doi.org/10.3390/su141610368.

Full text
Abstract:
Smart city infrastructure and the related theme of critical national infrastructure have attracted growing interest in recent years in academic literature, notably how cyber-security can be effectively applied within the environment, which involves using cyber-physical systems. These operate cross-domain and have massively improved functionality and complexity, especially in threat modelling cyber-security analysis—the disparity between current cyber-security proficiency and the requirements for an effective cyber-security systems implementation. Analysing risk across the entire analysed syste
APA, Harvard, Vancouver, ISO, and other styles
27

Bielska, Tetiana. "MECHANISMS OF CRITICAL INFRASTRUCTURE CYBERSECURITY MANAGEMENT AT THE STATE LEVEL." Global Scientific Trends: Economics and Public Administration 1/2024 (February 15, 2024): 27–38. https://doi.org/10.5281/zenodo.10635274.

Full text
Abstract:
The authors form mechanisms of critical infrastructure cybersecurity management at the state level on the basis of analysis and synthesis of cyber threats for critical infrastructure. The authors show that the type of cyber security management strategy of the specified infrastructure is determined not by one or more of these parameters, but by the role of the department officially responsible for the national cyber security of this infrastructure in the process of implementing measures to protect critical resources from cyber-attacks. Without the involvement of representatives of each specific
APA, Harvard, Vancouver, ISO, and other styles
28

Okori, Washington, and Sarah Buteraba. "Cyber Security Exploits and Management in Telecommunication Companies: The Case of Uganda." Journal of Computer Science and Technology Studies 6, no. 4 (2024): 67–76. http://dx.doi.org/10.32996/jcsts.2024.6.4.10.

Full text
Abstract:
This study examined the risks faced by telecommunication companies due to cyber-attacks and threats to their critical information infrastructure. It suggests control measures to avert the vulnerabilities of such infrastructure to cyber attackers. Critical information infrastructure is important to the companies as a revenue enabler and reputation identifier. However, the infrastructure, if not well protected, can be a national security threat, affect the national economy, and disrupt societal integration and business globally. Cyber security is the protection of internet-connected systems, inc
APA, Harvard, Vancouver, ISO, and other styles
29

Berezdetskyi, Yurii, and Maksym Palchyk. "Some Aspects of Cybersecurity Protection Provided for Critical Infrastructure Objects: Experience that can be Implemented in Ukraine." Information Security of the Person, Society and State, no. 27 (2019): 49–56. http://dx.doi.org/10.51369/2707-7276-2019-3-5.

Full text
Abstract:
The article considers issues of legal regulation and ways aimed at controlling critical infrastructure objects pre-paredness for cyber attacks and cyber incidents under the foreign jurisdiction. The auther offered solutions of current issues which can be implemented in Ukraine. Key words: information security, cy-bersecurity, cyber attacks, cyber incidents critical infrastructure, unlawful interference, information audit.
APA, Harvard, Vancouver, ISO, and other styles
30

Rao, Nageswara, Chris Ma, Fei He, David Yau, and Jun Zhuang. "Cyber–Physical Correlation Effects in Defense Games for Large Discrete Infrastructures." Games 9, no. 3 (2018): 52. http://dx.doi.org/10.3390/g9030052.

Full text
Abstract:
In certain critical infrastructures, correlations between cyber and physical components can be exploited to launch strategic attacks, so that disruptions to one component may affect others and possibly the entire infrastructure. Such correlations must be explicitly taken into account in ensuring the survival of the infrastructure. For large discrete infrastructures characterized by the number of cyber and physical components, we characterize the cyber–physical interactions at two levels: (i) the cyber–physical failure correlation function specifies the conditional survival probability of the c
APA, Harvard, Vancouver, ISO, and other styles
31

Tkachov, Andrii, Roman Korolov, Irada Rahimova, Iryna Aksonova, and Yelyzaveta Sevriukova. "CYBERSECURITY CHALLENGES AND SOLUTIONS FOR CRITICAL INFRASTRUCTURE PROTECTION." Ukrainian Scientific Journal of Information Security 30, no. 1 (2024): 58–66. http://dx.doi.org/10.18372/2225-5036.30.18604.

Full text
Abstract:
Critical infrastructure can be vulnerable to attack from natural disasters or malicious actors such as hackers or terrorists. If these threats are not addressed quickly, they can lead to significant disruption in service delivery or even complete shutdowns which could have devastating consequences for those relying on them for their day-to-day activities. Therefore, it is important that governments take steps towards protecting critical infrastructure from potential threats by implementing comprehensive security measures both online and offline. Based on a comprehensive analysis of current iss
APA, Harvard, Vancouver, ISO, and other styles
32

Ibanga, Isaac John, Karnilius Gideon Fwah, and Adebayo John Idowu. "Assessing the Vulnerabilities: Cybersecurity Challenges in Power System Infrastructure in Nigeria." June-July 2024, no. 44 (June 17, 2024): 22–35. http://dx.doi.org/10.55529/ijitc.44.22.35.

Full text
Abstract:
This study examined the Cyber security Challenges in Power System Infrastructure in Nigeria. Four research questions guided the study which employed a survey research design. The population of the study was 46 respondents comprising 23 Technical Units Heads and 23 Heads of Cyber security Units from the (23) power-generating plants in Nigeria. The entire population was used hence, there was no sampling. The instrument used for data collection was a structured questionnaire titled: Cyber security Challenges in Power System Infrastructure Questionnaire (CCPSIQ) developed by the researchers. A rel
APA, Harvard, Vancouver, ISO, and other styles
33

Youn, Jaepil, Kookjin Kim, Daeyoung Kang, Jaeil Lee, Moosung Park, and Dongkyoo Shin. "Research on Cyber ISR Visualization Method Based on BGP Archive Data through Hacking Case Analysis of North Korean Cyber-Attack Groups." Electronics 11, no. 24 (2022): 4142. http://dx.doi.org/10.3390/electronics11244142.

Full text
Abstract:
North Korean cyber-attack groups such as Kimsuky, Lazarus, Andariel, and Venus 121 continue to attempt spear-phishing APT attacks that exploit social issues, including COVID-19. Thus, along with the worldwide pandemic of COVID-19, related threats also persist in cyberspace. In January 2022, a hacking attack, presumed to be Kimsuky, a North Korean cyber-attack group, intending to steal research data related to COVID-19. The problem is that the activities of cyber-attack groups are continuously increasing, and it is difficult to accurately identify cyber-attack groups and attack origins only wit
APA, Harvard, Vancouver, ISO, and other styles
34

Bakalynskyi, O., and D. Pakholchenko. "Analysis of Cybersecurity Requirements of Automated Process Control Systems As Critical Information Infrastructure." Èlektronnoe modelirovanie 43, no. 4 (2021): 103–12. http://dx.doi.org/10.15407/emodel.43.04.103.

Full text
Abstract:
The analysis of the current legislation and the best world practices on cyber protection of automated control systems of technological processes in which requirements for realization of cyber protection of objects of critical information infrastructure are offered is carried out. Problematic issues related to cyber security of critical information infrastructure objects are given.
APA, Harvard, Vancouver, ISO, and other styles
35

Progoulakis, Iosif, Paul Rohmeyer, and Nikitas Nikitakos. "Cyber Physical Systems Security for Maritime Assets." Journal of Marine Science and Engineering 9, no. 12 (2021): 1384. http://dx.doi.org/10.3390/jmse9121384.

Full text
Abstract:
The integration of IT, OT, and human factor elements in maritime assets is critical for their efficient and safe operation and performance. This integration defines cyber physical systems and involves a number of IT and OT components, systems, and functions that involve multiple and diverse communication paths that are technologically and operationally evolving along with credible cyber security threats. These cyber security threats and risks as well as a number of known security breach scenarios are described in this paper to highlight the evolution of cyber physical systems in the maritime d
APA, Harvard, Vancouver, ISO, and other styles
36

Saxena, Ritesh. "Securing IT Infrastructure – A Complete Solution." Global Journal of Enterprise Information System 8, no. 1 (2016): 59. http://dx.doi.org/10.18311/gjeis/2016/7292.

Full text
Abstract:
The book beings with introduction to Cyber Security discuss the alarming growth rate of Cyber crime and its consequences. It acquaints the users with the risks and vulnerabilities of the cyber world. It emphasizes on the need of a secured IT infrastructure.
APA, Harvard, Vancouver, ISO, and other styles
37

Limba, Tadas, Tomas Plėta, Konstantin Agafonov, and Martynas Damkus. "Cyber security management model for critical infrastructure." Entrepreneurship and Sustainability Issues 4, no. 4 (2017): 559–73. http://dx.doi.org/10.9770/jesi.2017.4.4(12).

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Harris, A. "The Invisible [cyber attacks on critical infrastructure]." Engineering & Technology 8, no. 10 (2013): 40–42. http://dx.doi.org/10.1049/et.2013.1003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Tonn, Gina, Jay P. Kesan, Linfeng Zhang, and Jeffrey Czajkowski. "Cyber risk and insurance for transportation infrastructure." Transport Policy 79 (July 2019): 103–14. http://dx.doi.org/10.1016/j.tranpol.2019.04.019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Komissarova, Natalia, and Pavlo Krutikov. "CYBER PROTECTION SYSTEM FOR CRITICAL INFRASTRUCTURE FACILITIES IN WARFARE CONDITIONS." Науковий вісник Київського інституту Національної гвардії України, no. 2 (December 31, 2024): 43–48. https://doi.org/10.59226/2786-6920.2.2024.43-48.

Full text
Abstract:
The article outlines the problem of the impact of information threats, cyber attacks, and cyber espionage on critical infrastructure facilities in the context of warfare. The work allows for a better understanding of the importance of protecting critical infrastructure facilities for ensuring national security. To identify information threats, cyber attacks, manifestations of cyber espionage, which are potential threats and risks to critical infrastructure objects and to identify shortcomings in existing protection systems. The main types of information threats are described, which include cyb
APA, Harvard, Vancouver, ISO, and other styles
41

Xia, Yingjie, Jia Hu, and Michael D. Fontaine. "A Cyber-ITS Framework for Massive Traffic Data Analysis Using Cyber Infrastructure." Scientific World Journal 2013 (2013): 1–9. http://dx.doi.org/10.1155/2013/462846.

Full text
Abstract:
Traffic data is commonly collected from widely deployed sensors in urban areas. This brings up a new research topic, data-driven intelligent transportation systems (ITSs), which means to integrate heterogeneous traffic data from different kinds of sensors and apply it for ITS applications. This research, taking into consideration the significant increase in the amount of traffic data and the complexity of data analysis, focuses mainly on the challenge of solving data-intensive and computation-intensive problems. As a solution to the problems, this paper proposes a Cyber-ITS framework to perfor
APA, Harvard, Vancouver, ISO, and other styles
42

Chinthamu, Narender, Shobana Jayakumar, Manasa K, Revathi M P, Syed Zahidur Rashid, and Jansirani D. "Cyber-Physical Systems Security Protecting Critical Infrastructure from Cyber Threats and Attacks." ITM Web of Conferences 76 (2025): 03005. https://doi.org/10.1051/itmconf/20257603005.

Full text
Abstract:
Cyber-Physical Systems (CPS) are vital of critical infrastructure such as energy, transportation, healthcare, and manufacturing. Increasingly, however, these systems are the target of sophisticated cyber threats, with dire economic and operational implications. The CPS security literature mainly covers theory models and technology-specific security and control measures, but known techniques have low implementation/efficiency/robustness. To address these gaps, in this paper we propose a generalizable, cost-effective, and AI-enabled adaptive security framework by coupling a real-time threat moni
APA, Harvard, Vancouver, ISO, and other styles
43

Kilani, Yanal. "Cyber-security effect on organizational internal process: mediating role of technological infrastructure." Problems and Perspectives in Management 18, no. 1 (2020): 449–60. http://dx.doi.org/10.21511/ppm.18(1).2020.39.

Full text
Abstract:
Adopting the technologies among organizations comes with the continuous worries of protection and hacking. The idea of cyber-security has become over the years the main interest of many organizations, which depend on technologies in its operations, which requires them to pay extra attention to their technological infrastructure. The current study aims at examining the influence of cyber-security forces on organizational internal operations and the role of technological infrastructure in defining and controlling the level of protection that cyber-security has on organizational internal processe
APA, Harvard, Vancouver, ISO, and other styles
44

Maltseva, Irina, Yuliya Chernysh, and Viacheslav Ovsiannikov. "ANALYSIS OF CYBER RESISTANCE ASSESSMENT METHODS OF CRITICAL INFRASTRUCTURE." Cybersecurity: Education, Science, Technique 12, no. 4 (2021): 29–35. http://dx.doi.org/10.28925/2663-4023.2021.12.2935.

Full text
Abstract:
The availability of critical infrastructure through cyberspace makes national security dependent on the degree of its security. Critical infrastructure is a set of automated management systems, which provide the interaction of information and telecommunications networks that solve problems of public administration, defense, security and law enforcement, and others. The protection of critical infrastructure directly depends on the possession of the relevant structures of new weapons, the degree of its effectiveness, methods of use and means of protection against the same weapons of the enemy. I
APA, Harvard, Vancouver, ISO, and other styles
45

Rudy, Agus Gemilang Gultom, and Farid Wajdi Ahmad. "Development of Six Ware Cyber Defense Framework (SWCDF) Design as a Standardization of Computer Network Protection State Defense Information System." International Journal of Arts and Social Science 5, no. 3 (2023): 293–310. https://doi.org/10.5281/zenodo.7751136.

Full text
Abstract:
: Cyber attacks are actions aimed at altering, disrupting, deceiving, degrading, or destroying information technology systems and their networks or existing information and programs (flowing) and stored in the system. Development of a cyber defense system for critical military infrastructure, and building readiness in the face of cyber warfare because the virtual world is a battlefield that will determine victory in war. This study aims to find an effective cyber defense system design to protect the Ministry of Defense's critical infrastructure and state defense information system (Sisinfo
APA, Harvard, Vancouver, ISO, and other styles
46

ALEKSEIEVA, O. "Legal support of cyber security of critical infrastructure objects." INFORMATION AND LAW, no. 4(47) (November 29, 2023): 168–76. http://dx.doi.org/10.37750/2616-6798.2023.4(47).291633.

Full text
Abstract:
The article highlights the issue of legal support of cyber security of critical infrastructure objects. The conceptual apparatus in this area is considered. It contains an analysis of the current legislation of Ukraine in the field of cyber security. The project of the Law of Ukraine “On Amendments to Some Laws of Ukraine Regarding Urgent Measures to Strengthen Cybersecurity Capacities of State Information Resources and Critical Information Infrastructure Objects” is analyzed in the context of optimizing Ukrainian legislation in the field of cyber security. The expediency of applying a compreh
APA, Harvard, Vancouver, ISO, and other styles
47

Board, Editorial. "Well-known Personality in a Technical World and Information System." Global Journal of Enterprise Information System 8, no. 1 (2016): 62. http://dx.doi.org/10.18311/gjeis/2016/7294.

Full text
Abstract:
We are pleased to share profile of Col. Inderjit Singh (Retd). Inderjit is a an experienced Information Systems and Information Security Professional with experience of more than 25 year across a wide spectrum of areas spanning Solution Architecture, Program/Project Management Telecom, IT Infrastructure Management, Info Security Advisory and Architecture, Cyber Security, Cyber Warfare and Cyber Forensics, Data Centers Design and Operations, Cloud Computing and E-Commerce Startup. An experienced Information Systems Professional with experience of more than 25 year across a wide spectrum of area
APA, Harvard, Vancouver, ISO, and other styles
48

Ilyenko, Anna, Valentyna Teliushchenko, and Olena Dubchak. "MODERN CYBER THREATS TO CRITICAL INFRASTRUCTURE IN UKRAINE AND THE WORLD." Cybersecurity: Education, Science, Technique 3, no. 27 (2025): 150–64. https://doi.org/10.28925/2663-4023.2023.27.719.

Full text
Abstract:
Critical infrastructure is the basis for the stable functioning of the state and society, but its dependence on digital technologies makes it vulnerable to cyber threats. In 2024, more than 3 million information security events were recorded, of which 28,000 were classified as critical, requiring in-depth analysis and development of new approaches to risk management. This article examines the current cyber threats to critical infrastructure, including cyber espionage, embezzlement, information and psychological operations, and attacks on industrial systems. Based on the analysis, the main type
APA, Harvard, Vancouver, ISO, and other styles
49

Achar, Sandesh, Nuruzzaman Faruqui, Md Whaiduzzaman, Albara Awajan, and Moutaz Alazab. "Cyber-Physical System Security Based on Human Activity Recognition through IoT Cloud Computing." Electronics 12, no. 8 (2023): 1892. http://dx.doi.org/10.3390/electronics12081892.

Full text
Abstract:
Cyber-physical security is vital for protecting key computing infrastructure against cyber attacks. Individuals, corporations, and society can all suffer considerable digital asset losses due to cyber attacks, including data loss, theft, financial loss, reputation harm, company interruption, infrastructure damage, ransomware attacks, and espionage. A cyber-physical attack harms both digital and physical assets. Cyber-physical system security is more challenging than software-level cyber security because it requires physical inspection and monitoring. This paper proposes an innovative and effec
APA, Harvard, Vancouver, ISO, and other styles
50

Abu Al-Jibeen, Dr Mohamed. "Integration of Management Information Systems (Cyber Infrastructure) and Operations Research." Indian Journal of Applied Research 4, no. 6 (2011): 316–20. http://dx.doi.org/10.15373/2249555x/june2014/97.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!