To see the other types of publications on this topic, follow the link: National Critical Infrastructures.

Journal articles on the topic 'National Critical Infrastructures'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'National Critical Infrastructures.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Neikova, Maria. "LEGAL APPROACH TO IMPLEMENTING SECURITY MEASURES FOR COMBATTING THREATS TO NATIONAL CRITICAL INFRASTRUCTURES." ENVIRONMENT. TECHNOLOGIES. RESOURCES. Proceedings of the International Scientific and Practical Conference 4 (June 22, 2024): 190–93. http://dx.doi.org/10.17770/etr2024vol4.8240.

Full text
Abstract:
The quality of life and security of all citizens, including all EU citizens, is closely related to the provision of essential services through interaction of different critical infrastructures. Cross sectoral measures are required to be implemented in order to obtain high level of protection and optimal minimisation of potential risks for critical infrastructures, as various potential risks could also affect national security. Taking into account the fact that the general framework on critical infrastructure sometimes could not sufficiently address all various challenges to critical infrastructures in each and every country, it is possible to consider complex legislative approach for implementation of security measures for combatting threats to national critical infrastructures. The current articles outlines the specifics of implementing legal approach in reference to combatting threats to national critical infrastructures in line with the EU regulatory framework and focusing also to Bulgarian national legal sources and practical challenges.
APA, Harvard, Vancouver, ISO, and other styles
2

PĂTRAȘCU, Petrișor. "National Security Strategies and Critical Infrastructure: An Analysis of the European Union Member States." Romanian Military Thinking 2022, no. 3 (2022): 10–29. http://dx.doi.org/10.55535/rmt.2022.3.01.

Full text
Abstract:
"The national security strategies of the European Union Member States emphasise the role of critical infrastructure in providing essential services to society and the necessity to protect them in the context of national security and defence. Thus, the protection of critical infrastructure lies not only with the critical infrastructure operator or administrator, but also with governmental institutions. Threats to critical infrastructure are actually threats to national security. An unwanted event involving one or more critical infrastructures involves the intervention of local, regional and national structures. The EU Member States are aware that threats to critical infrastructure pose serious threats to national security and even to the EU’s security and defence. In this regard, the EU Member States have included in their national security strategies a number of critical infrastructure issues, such as their importance, necessity, development, functionality, efficiency and last but not least their protection and resilience to all types of threats. This study highlights the inclusion of critical infrastructure in the security strategies of the EU Member States and the involvement of states in ensuring and strengthening the appropriate protection of national and European critical infrastructures."
APA, Harvard, Vancouver, ISO, and other styles
3

PĂTRAȘCU, Petrișor. "Strategiile naționale de securitate și infrastructurile critice: o analiză a statelor membre ale Uniunii Europene." Gândirea Militară Românească 2022, no. 3 (2022): 10–29. http://dx.doi.org/10.55535/gmr.2022.3.01.

Full text
Abstract:
"The national security strategies of the European Union Member States emphasise the role of critical infrastructure in providing essential services to society and the necessity to protect them in the context of national security and defence. Thus, the protection of critical infrastructure lies not only with the critical infrastructure operator or administrator, but also with governmental institutions. Threats to critical infrastructure are actually threats to national security. An unwanted event involving one or more critical infrastructures involves the intervention of local, regional and national structures. The EU Member States are aware that threats to critical infrastructure pose serious threats to national security and even to the EU’s security and defence. In this regard, the EU Member States have included in their national security strategies a number of critical infrastructure issues, such as their importance, necessity, development, functionality, efficiency and last but not least their protection and resilience to all types of threats. This study highlights the inclusion of critical infrastructure in the security strategies of the EU Member States and the involvement of states in ensuring and strengthening the appropriate protection of national and European critical infrastructures."
APA, Harvard, Vancouver, ISO, and other styles
4

Alexandru, Adriana, Victor Vevera, and Ella Magdalena Ciupercă. "National Security and Critical Infrastructure Protection." International conference KNOWLEDGE-BASED ORGANIZATION 25, no. 1 (2019): 8–13. http://dx.doi.org/10.2478/kbo-2019-0001.

Full text
Abstract:
Abstract The link between national security and the protection of critical infrastructure is vital to the progress of any society and its proper social functioning. The term critical infrastructure was developed by the United States in the 1990s and it has evolved in time; nowadays, most of the current definitions include the security dimension in their content. Along with its many benefits, the technological advancement has brought with it the diversification of threats that could lead to the malfunctioning of critical infrastructures. The new weapons of the 21st century and the new asymmetric threats constitute real dangers to the good functioning of every critical infrastructure. Once they may be interrupted, the normal functioning of the whole society would be endangered because of the domino effects it causes. In this article we will look at how the link between critical infrastructure and national security is reflected in national regulations and crisis scenarios, highlighting the main strengths and the existing legislative gaps along with discussing their applicability.
APA, Harvard, Vancouver, ISO, and other styles
5

Houck, David J., Eunyoung Kim, Gerard P. O'Reilly, David D. Picklesimer, and Huseyin Uzunalioglu. "A network survivability model for critical national infrastructures." Bell Labs Technical Journal 8, no. 4 (2004): 153–72. http://dx.doi.org/10.1002/bltj.10093.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

CHIȚAC, Georgiana-Cătălina. "CRITICAL INFRASTRUCTURES AND THEIR IMPORTANCE IN MODERN SOCIETIES – PROTECTION, SAFETY, SECURITY." STRATEGIES XXI - Command and Staff College 17, no. 1 (2021): 389–98. http://dx.doi.org/10.53477/2668-2028-21-51.

Full text
Abstract:
Abstract: Nowadays, the modern security environment has it foundation based on some vital pilons, that are also important for the normal functionality of the modern society. This paper will offer a new perspective on critical infrastructure protection, defining the relationships that take place freely in a modern society. The international security could be analyzed from functional (systemic) and structural points of view. From the systemic point of view, the global security is characterized by five major systems: political, economic, social (socio-demographic), cultural and ecological. From the structural point of view, besides the above systems there are other ones: military, intelligence, communications and infrastructure (the critical infrastructure, health, financial, culture, education and research). There are certain infrastructures such as: telecommunications, transports, systems of power or water supply, IT systems, diverse systems and emergency services, that are actually fundamental to a prosperous economy and therefore critical to the development of human society. Telecommunications, power systems and transport infrastructures are essential infrastructures that ensure not only the mobility, but also the adequate performance of the armed forces, which is one more reason for which these infrastructures are critical. The degree of development and resilience of national and European critical infrastructures is essential for the economic growth and for ensuring the security and welfare of society on the whole. Therefore, the modern national security, seen as a system or a structure, has been passing through a reform and modernization process in order to adapt to the challenges of the 21st Century and the requirements triggered by North Atlantic Treaty Organization and European Union memberships, and not only. In this context there is a need for some security politics and strategy which could increase the national security condition.
APA, Harvard, Vancouver, ISO, and other styles
7

Obodoeze, Fidelis Chukwujekwu, Ifeyinwa Nkemdilim Obiokafor, and Tochukwu Chijindu Asogwa. "SCADA for National Critical Infrastructures: Review of the Security Threats, Vulnerabilities and Countermeasures." International Journal of Trend in Scientific Research and Development Volume-2, Issue-2 (2018): 974–82. http://dx.doi.org/10.31142/ijtsrd9556.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Dawson, Maurice, Robert Bacius, Luis Borges Gouveia, and Andreas Vassilakos. "Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors." Land Forces Academy Review 26, no. 1 (2021): 69–75. http://dx.doi.org/10.2478/raft-2021-0011.

Full text
Abstract:
Abstract The cybersecurity of critical infrastructures is an essential topic within national and international security as 16 critical infrastructure sectors touch various aspects of American society. Because the failure to provide adequate cybersecurity controls within the critical infrastructure sectors renders the country open to an attack that could have a debilitating effect on security, national public health, safety, and economic security, this matter is so vital that there is the Presidential Policy Directive (PPD) 21 Critical Infrastructure Security and Resilience advances a national policy to strengthen and maintain secure, functioning and resilient critical infrastructure. An organization identified as the Cybersecurity and Infrastructure Security Agency (CISA) at the Department of Homeland Security (DHS) has the mission to be the risk advisor for the United States (US). Other organizations, such as the National Security Agency (NSA), have approved a specific Knowledge Unit (KU) to address cybersecurity for critical infrastructures associated with doctoral-level granting programs. To address this challenge, it is necessary to identify threats better and defend against them while mitigating risks to an acceptable level. Only then can a nation build a more secure and resilient infrastructure for the future while defending against present-day bad actors as cyberwarfare, cyber espionage, and cybersecurity attacks are the modern-day threats that need to be addressed in planning, designing, implementation, and maintenance. Therefore, the researchers developed a case study reviewing threats against different sectors defined in the PPD.
APA, Harvard, Vancouver, ISO, and other styles
9

Maglaras, Leandros, Ioanna Kantzavelou, and Mohamed Amine Ferrag. "Digital Transformation and Cybersecurity of Critical Infrastructures." Applied Sciences 11, no. 18 (2021): 8357. http://dx.doi.org/10.3390/app11188357.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Monstadt, Jochen, and Martin Schmidt. "Urban resilience in the making? The governance of critical infrastructures in German cities." Urban Studies 56, no. 11 (2019): 2353–71. http://dx.doi.org/10.1177/0042098018808483.

Full text
Abstract:
Over the last decade, the protection of urban infrastructures has become a focus in German security policies. These point not solely to the multiple external infrastructural threats (e.g. natural disasters, terrorist and cyber-attacks), but also to the endogenous risks of cascading failures across geographical and functional borders that arise from interlocking and often mutually dependent infrastructures. As geographical nodes in infrastructurally mediated flows, cities are considered to be particularly vulnerable to infrastructure breakdowns. Their capability to prevent and to prepare for infrastructural failures, and thus to manage infrastructural interdependencies, is seen as a major prerequisite for resilient societies. However, as our article demonstrates, the institutional capacity of the local authorities and utility companies for risk mitigation and preparedness is limited. Drawing on qualitative research in selected German cities, we argue that the governance of critical infrastructures involves considerable challenges: it overarches different, often fragmented, policy domains and territories and institutionally unbundled utility (sub-) domains. Moreover, risk mitigation and preparedness are usually not based on experience from past events, but on destructive scenarios. They involve considerable uncertainty and contestations among local decision-makers. Interviews with local experts indicate that effective governance of critical infrastructures requires more regulatory efforts by national policies. At the same time, they point to the need for identifying and assessing place-based vulnerabilities, for defining locally differentiated mitigation and preparedness strategies and for the training of local utility companies as well as crisis management.
APA, Harvard, Vancouver, ISO, and other styles
11

Geers, Kenneth. "The Cyber Threat to National Critical Infrastructures: Beyond Theory." Journal of Digital Forensic Practice 3, no. 2-4 (2010): 124–30. http://dx.doi.org/10.1080/15567281.2010.536735.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Geers, Kenneth. "The Cyber Threat to National Critical Infrastructures: Beyond Theory." Information Security Journal: A Global Perspective 18, no. 1 (2009): 1–7. http://dx.doi.org/10.1080/19393550802676097.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Proca, Maria, and Nicolae Panfilii. "The role of critical IT -infrastructures in ensuring national security." Moldoscopie, no. 2(99) (April 2024): 36–49. http://dx.doi.org/10.52388/1812-2566.2023.2(99).04.

Full text
Abstract:
The complexity and diversity of risks and threats, increasingly interconnected and characterized by multiple determinations, call for an integrative, systemic and comprehensive approach to security objectives, with an emphasis on protecting those vital components for safety and the smooth running of socio-economic life.The activity of protecting critical infrastructures no longer takes into account national borders and involves joint efforts, in the sense of identifying and evaluating any of their vulnerable points. As such, the protection of critical infrastructures - a determining element for maintaining the state of stability and security - requires the amplification of the concerns of the main international actors (states and international organizations) to elaborate and harmonize some strategies in the field. They must allow the identification and early warning of risks, simultaneously with the adoption and timely initiation of decisions/approaches for preventive intervention and countermeasures. Critical infrastructures have always been the most sensitive and vulnerable area of any system and process. Their sensitivity stems from their particular role within the structure. No matter how well protected, critical infrastructures will always have a high ratio of vulnerability, as they are usually the first to be targeted when seeking to destabilize and even destroy a system or process or even when an emergency situation occurs.
APA, Harvard, Vancouver, ISO, and other styles
14

Boyle, Philip, and Tia Dafnos. "Infrastructures of Pacification: Vital Points, Critical Infrastructure, and Police Power in Canada." Canadian Journal of Law and Society / Revue Canadienne Droit et Société 34, no. 01 (2019): 79–98. http://dx.doi.org/10.1017/cls.2019.5.

Full text
Abstract:
AbstractThough described as the first milestone towards securing Canada’s critical infrastructure (CI), the 2009 National Strategy for Critical Infrastructure is the most recent effort in decades of federal engagement with the problem of how to secure the material elements that underpin state, economy, and society. In this article, we show how a little-known civil defence program initiated after WWII to protect important industrial facilities from military enemies has transformed in the contemporary period into the monitoring of a range of political and social movements as perceived dangers to what is understood today as CI. We view these changes as indicative of transformations in the exercise of police power through which the contemporary colonial-liberal order is enacted.
APA, Harvard, Vancouver, ISO, and other styles
15

Yigit, Yagmur, Mohamed Amine Ferrag, Mohamed C. Ghanem, et al. "Generative AI and LLMs for Critical Infrastructure Protection: Evaluation Benchmarks, Agentic AI, Challenges, and Opportunities." Sensors 25, no. 6 (2025): 1666. https://doi.org/10.3390/s25061666.

Full text
Abstract:
Critical National Infrastructures (CNIs)—including energy grids, water systems, transportation networks, and communication frameworks—are essential to modern society yet face escalating cybersecurity threats. This review paper comprehensively analyzes AI-driven approaches for Critical Infrastructure Protection (CIP). We begin by examining the reliability of CNIs and introduce established benchmarks for evaluating Large Language Models (LLMs) within cybersecurity contexts. Next, we explore core cybersecurity issues, focusing on trust, privacy, resilience, and securability in these vital systems. Building on this foundation, we assess the role of Generative AI and LLMs in enhancing CIP and present insights on applying Agentic AI for proactive defense mechanisms. Finally, we outline future directions to guide the integration of advanced AI methodologies into protecting critical infrastructures. Our paper provides a strategic roadmap for researchers and practitioners committed to fortifying national infrastructures against emerging cyber threats through this synthesis of current challenges, benchmarking strategies, and innovative AI applications.
APA, Harvard, Vancouver, ISO, and other styles
16

De Felice, Fabio, Ilaria Baffo, and Antonella Petrillo. "Critical Infrastructures Overview: Past, Present and Future." Sustainability 14, no. 4 (2022): 2233. http://dx.doi.org/10.3390/su14042233.

Full text
Abstract:
Industrialized societies depend on the proper functioning of a whole range of technological infrastructures, such as electricity, road and railway networks and telecommunications which, due to their importance, are generically referred to as critical infrastructures (CIs). Technical failures, natural disasters and malicious events, if not terrorist, could have devastating effects on these infrastructures. The events of the last few years have accelerated efforts to identify and designate CIs at national and European levels and have reinforced concerns about increasing their protection in sensitive sectors for the safety of the individual and the community. The aim of this research is to provide the basic elements to understand the issue along with the reasons for its importance both at national, European and international level. In particular, after analyzing the origin of the problem, a systematic literature review is carried out to study the current research around future perspectives relating to the management of Cis, with particular focus on three research questions: RQ1 “What types of risk assessment methods are used to manage CIs?”, RQ2 “What are the environmental risk mitigation strategies for CIs?” and RQ3 “What is the role of the human factor in the prevention of risks for CIs?”. The results aim to be guidelines for decision makers and researchers interested in this topic.
APA, Harvard, Vancouver, ISO, and other styles
17

FÎȚĂ, Nicolae Daniel, Sorin Mihai RADU, and Dragoș PĂSCULESCU. "THE RESILIENCE OF CRITICAL INFRASTRUCTURES WITHIN THE NATIONAL ENERGY SYSTEM IN ORDER TO ENSURE ENERGY AND NATIONAL SECURITY." BULLETIN OF "CAROL I" NATIONAL DEFENCE UNIVERSITY 11, no. 2 (2022): 57–67. http://dx.doi.org/10.53477/2284-9378-22-75.

Full text
Abstract:
Energy security and implicitly the regional energy architecture composed of critical energy infrastructures (power substations and overhead lines at 400 kV), can undergo various mutations and transformations caused by a possible syncope in the extraction, transport and exploitation of energy resources and energy, due to energy dynamism. The vulnerability of these critical energy infrastructures generates a number of risks and threats to them, thus endangering societal life, creating malfunctions and generating extreme damage to the state. Critical energy infrastructures thus become indispensable to society, without which the state and its mechanisms cannot function and ensure societal well-being, and their protection becomes a major national and European objective, prompting representatives of the member states of the European Union to take action to identify and manage any risk or threat. In the face of the vulnerabilities, threats and risks Romania faces in the new dynamic, turbulent and unpredictable geopolitical context of global, regional and Euro-Atlantic security, amid the military and health crisis and amplified by the global energy crisis manifested by the unfounded and unexpected increase in energy price, the Romanian state should have a strategy for strengthening the resilience of critical energy infrastructures, based on predictability, flexibility, continuity, adaptability and resilience.
APA, Harvard, Vancouver, ISO, and other styles
18

Turskis, Zenonas, Nikolaj Goranin, Assel Nurusheva, and Seilkhan Boranbayev. "A Fuzzy WASPAS-Based Approach to Determine Critical Information Infrastructures of EU Sustainable Development." Sustainability 11, no. 2 (2019): 424. http://dx.doi.org/10.3390/su11020424.

Full text
Abstract:
Critical information infrastructure exists in different sectors of each country. Its loss or sustainability violation will lead to a negative impact on the supply of essential services, as well as on the social or economic well-being of the population. It also may even pose a threat to people’s health and lives. In the modern world, such infrastructure is more vulnerable and unstable than ever, due to rapid technological changes, and the emergence of a new type of threat—information threats. It is necessary to determine which infrastructure are of crucial importance when decision-makers aim to achieve the reliability of essential infrastructure. This article aims to solve the problem of ensuring the sustainable development of EU countries in terms of identifying critical information infrastructures. Integrated multi-criteria decision-making techniques based on fuzzy WASPAS and AHP methods are used to identify essential information infrastructures, which are related to a new type of potential threat to national security. The paper proposes a model for identifying critical information infrastructures, taking into account the sustainable development of countries.
APA, Harvard, Vancouver, ISO, and other styles
19

Liu, Yiying, Guangxing Shan, Yucheng Liu, Abdullah Alghamdi, Iqbal Alam, and Sujit Biswas. "Blockchain Bridges Critical National Infrastructures: E-Healthcare Data Migration Perspective." IEEE Access 10 (2022): 28509–19. http://dx.doi.org/10.1109/access.2022.3156591.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Johnson, Chris. "Socio-technical approaches to risk assessment in national critical infrastructures." Risk Management 11, no. 3-4 (2009): 155–58. http://dx.doi.org/10.1057/rm.2009.9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Newlove-Eriksson, Lindy, Giampiero Giacomello, and Johan Eriksson. "The Invisible Hand? Critical Information Infrastructures, Commercialisation and National Security." International Spectator 53, no. 2 (2018): 124–40. http://dx.doi.org/10.1080/03932729.2018.1458445.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Iura, Adrian. "Economic and Financial Elements of Critical Infrastructure Augmentation." International conference KNOWLEDGE-BASED ORGANIZATION 30, no. 2 (2024): 1–6. http://dx.doi.org/10.2478/kbo-2024-0051.

Full text
Abstract:
Abstract This article will explore the intersections between economics and finance that underpin the strengthening of critical infrastructure systems. Exploring this area, I can realise that improving critical infrastructures is a necessity that every country depends on. Given the technological advances and threats that are constantly developing, we will be able to conclude that the need to understand the importance of these infrastructures and how to develop them depends on the economic implications that are part of a country’s investment plan. Through a comprehensive review of case studies and economic theories, this article will highlight various factors that influence critical infrastructure development decisions, ranging from fiscal and budgetary constraints to development or upgrading decisions. In addition, this paper will analyse, from a theoretical point of view, the importance of public-private partnerships, government funding and risk management strategies that underpin the resilience and sustainability of critical infrastructure. Finally, this paper will provide a nuanced perspective on economic and financial management, the growth of critical systems that are vital to the optimal and effective functioning of national security.
APA, Harvard, Vancouver, ISO, and other styles
23

Stephens, Marion. "Unmasking the Subconscious Fallacies Within Critical Infrastructure Protection." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 752–58. http://dx.doi.org/10.34190/eccws.23.1.2213.

Full text
Abstract:
Cybersecurity, a vital challenge in today’s ever-changing digital world, it has gained prominence with the global shift towards cyber-enabled critical infrastructures. Critical infrastructure protection efforts are fundamental for the continuation of essential services. Traditionally constituted as separate sectors, these infrastructures are increasingly interconnected, leading to potential domino effects during security breaches. For instance, failures within the power grid could have cascading effects on multiple sectors that depend on electricity for their operations, creating large-scale failures that affect functions on which society depends. The multidimensional nature of the infrastructures presents complex challenges for solutions, given their status as long-established legacy systems needing further development and enhancements to withstand the digital world. The lack of a concerted and focused infrastructure enhancement strategy has led to incremental approaches versus a comprehensive revamp to ensure a holistic cyber protection program. A lack of national focus has created inconsistencies that can lead to potentially catastrophic consequences. Understanding the decision-making processes within a complex environment is critical to the mission success. One significant risk is the cognitive roadblocks that have the potential to influence one’s judgements as this often outweighs balanced decisions. This study aims to investigate the subconscious biases that arise from a perceived resolution of the problem which can lead to de-prioritization within the decision-making processes. The study employs a convergent parallel mixed methods design to collect and analyse the data. The study then will compare the results allowing for the exploration of various aspects of the research. This approach is aligned to provide a thorough understanding of the challenges associated with protecting the infrastructures and the underlying subconscious fallacies in the digital age, thereby devising effective mitigation strategies, and fostering a more sustainable and resilient critical infrastructure that is useful for a variety of stakeholders, including policymakers, infrastructure owners and operators, cybersecurity professionals, and researchers
APA, Harvard, Vancouver, ISO, and other styles
24

Odumu, Wesley O., Barnabas I. Gwaivangmin, and Ademola P. Adewoye. "Safeguarding National Critical Energy Infrastructure using Cybersecurity Frameworks and Collaborative Approach for a Resilient Energy Future." NEWPORT INTERNATIONAL JOURNAL OF SCIENTIFIC AND EXPERIMENTAL SCIENCES 6, no. 1 (2025): 31–47. https://doi.org/10.59298/nijses/2025/61.3147.

Full text
Abstract:
The government heavy reliance on information communication technology for their daily activities and administration to drive the operations of critical infrastructures cannot be overemphasized. This is evident largely in industrial control systems (ICS) among which the supervisory control and data acquisition (SCADA) system is used to monitor and manage essential operations exposing it to cyber threats and attacks. Cyber threats and attacks on critical infrastructure result to denial of service, vandalism, theft or manipulation of data and even physical harm which can lead to catastrophic national security and economic downturn. These are attributed to the integration and increasing interconnectivity of enterprise information technology and operational technology with standard solution instead of proprietary protocol and software. This paper presents analysis of threat: environment, classification and their attributes and cyber-security frameworks to guard against threats and attacks on critical energy infrastructures using case study approach to demonstrate practical applications in real-world scenarios. The emphasis is on supervisory control and data acquisition (SCADA) system for remote controlling switches, pumps and surveillance systems. This is for government to shape the cyber-security outlook of the critical energy infrastructures to be more secured, resilient, adaptive and sustainable. This will help government make meaningful informed decisions on the cyber-security solutions most appropriate to meet their specific needs and challenges. Besides, it will promote collaboration and knowledge sharing amongst professionals and stakeholders in government, energy companies, regulators, and cyber-security experts for greater innovation and advancement. Keywords: Cybersecurity Framework, Critical Infrastructure, Cyber Threat, Energy, Supervisory Control and Data Acquisition Systems (SCADA), Collaboration.
APA, Harvard, Vancouver, ISO, and other styles
25

Kohut, Yurii. "Measures for protection of the information systems of Ukraine’s critical infrastructures against cyberattacks." Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje 38, no. 38 (2020): 57–65. http://dx.doi.org/10.5604/01.3001.0014.5939.

Full text
Abstract:
The article deals with protective measures against cyberattacks of information systems of the critical infrastructures and highlights some features of the cyberattacks against the information resources of national authorities. The main objective of the article is to define the characteristics of cyberattacks and the elements of a plan to counter cyberattacks of the critical information facilities. It has been found that a professionally organized cyberattack consists of several phases related to targeting, intelligence, access to the system, direct execution of the attack, and destruction of evidence of unauthorized interference. The results show that to protect the critical infrastructure facilities from cyberattacks, developed and implemented national cybersecurity standards must be developed in Ukraine, in particular for automated control systems of critical infrastructure facilities.
APA, Harvard, Vancouver, ISO, and other styles
26

Eismann, Christine. "Trends in Critical Infrastructure Protection in Germany." TRANSACTIONS of the VŠB – Technical University of Ostrava, Safety Engineering Series 9, no. 2 (2014): 26–31. http://dx.doi.org/10.2478/tvsbses-2014-0008.

Full text
Abstract:
Abstract Critical Infrastructures failures cause harmful consequences to the population, because they disrupt the supply of necessary goods and services. The failures pose an indirect threat, as they will regularly be triggered by natural hazards, technical failure/human error or intentional acts. In the risk analyses on the national level in Germany, Critical Infrastructure failures are qualitatively described to estimate their impacts on society. Critical Infrastructure Protection is seen as a joint task of many different stakeholders. Rules and regulations with different degrees of compulsion build the framework for their cooperation, and a strategy is in place that promotes the trustful exchange of information among all the relevant stakeholders. The most important stakeholder groups are public authorities, infrastructure operators, and the population. An example is given on how a joint risk management of public authorities and infrastructure operators may be performed, and the cooperation of public authorities and the population is discussed. As Civil Protection covers the entire risk and crisis management cycle with its phases prevention, preparedness, response and recovery, the article ends with examples of the support, which the German Federal Office of Civil Protection and Disaster Assistance and the Federal Ministry of the Interior offer for other stakeholders in order to achieve well-protected infrastructures and, in consequence, well-protected citizens.
APA, Harvard, Vancouver, ISO, and other styles
27

Pöyhönen, Jouni, Viivi Nuojua, Martti Lehto, and Jyri Rajamäki. "Cyber Situational Awareness and Information Sharing in Critical Infrastructure Organization." Information & Security: An International Journal 43, no. 2 (2019): 236–56. https://doi.org/10.11610/isij.4318.

Full text
Abstract:
Cybersecurity-related capabilities play an ever-growing role in national security, as well as securing the functions vital to society. The national cyber capability includes the resilience of companies running critical infrastructures, their cyber situational awareness (SA) and the sharing of cybersecurity information required for cyber SA. As critical infrastructures become more complex and interdepend-ent, ramifications of incidents multiply. The EU Network and Information Security Directive calls for cybersecurity collaboration between EU member states regarding critical infrastructures and places the most crucial service providers and digital service providers under security-related obligations. Developing better SA requires information sharing between the different interest groups and enhances the preparation for and management of incidents. The arrangement is based on drawing correct situation-specific conclusions and, when needed, on sharing critical knowledge in the cyber networks. The target state is achieved with an efficient process that includes a three-level—strategic, operational and technical/tactical—operating model to support decision-making by utilizing national and international strengths. In the dynamic cyber environment strategic agility and speed are needed to prepare for incidents.
APA, Harvard, Vancouver, ISO, and other styles
28

Cîrdei, Ionuţ Alin. "Improving The Level of Critical Infrastructure Protection by Developing Resilience." Land Forces Academy Review 23, no. 4 (2018): 237–43. http://dx.doi.org/10.2478/raft-2018-0028.

Full text
Abstract:
Abstract Modern society is characterized by the increasing interdependence between the actors of the international environment, in the conditions of globalization of all the fields of social life. Increasing interdependencies, together with the emergence of new risks and threats, which attempt to exploit systemic vulnerabilities, which are increasingly numerous and difficult to eliminate, bring a new issue to states and other security environment actors: to ensure the protection the infrastructure elements that are indispensable to the normal activity of the population, economic agents, nongovernmental organizations and state institutions. Critical Infrastructure Protection becomes an important point on the agenda of all decision-makers who are in a position to counter the asymmetric threats that jeopardize national interests and democratic values. Due to the multiplication of risks and threats and the multiplication of interdependencies between the various infrastructure elements, the protection of critical infrastructures can not be achieved effectively only by ensuring their physical protection. The cascading effects of a disturbance can be felt at the level of society as a whole, and it is therefore necessary to address the issue of ensuring the protection of critical infrastructures in a comprehensive manner including infrastructure and community resilience issues.
APA, Harvard, Vancouver, ISO, and other styles
29

Ravishankar, Monica, D. Vijay Rao, and C. R. S. Kumar. "A Game Theoretic Software Test-bed for Cyber Security Analysis of Critical Infrastructure." Defence Science Journal 68, no. 1 (2017): 54. http://dx.doi.org/10.14429/dsj.68.11402.

Full text
Abstract:
<p class="p1">National critical infrastructures are vital to the functioning of modern societies and economies. The dependence on these infrastructures is so succinct that their incapacitation or destruction has a debilitating and cascading effect on national security. Critical infrastructure sectors ranging from financial services to power and transportation to communications and health care, all depend on massive information communication technology networks. Cyberspace is composed of numerous interconnected computers, servers and databases that hold critical data and allow critical infrastructures to function. Securing critical data in a cyberspace that holds against growing and evolving cyber threats is an important focus area for most countries across the world. A novel approach is proposed to assess the vulnerabilities of own networks against adversarial attackers, where the adversary’s perception of strengths and vulnerabilities are modelled using game theoretic techniques. The proposed game theoretic framework models the uncertainties of information with the players (attackers and defenders) in terms of their information sets and their behaviour is modelled and assessed using a probability and belief function framework. The attack-defence scenarios are exercised on a virtual cyber warfare test-bed to assess and evaluate vulnerability of cyber systems. Optimal strategies for attack and defence are computed for the players which are validated using simulation experiments on the cyber war-games testbed, the results of which are used for security analyses.</p>
APA, Harvard, Vancouver, ISO, and other styles
30

Zhu, Qianxiang, Yuanqing Qin, Yue Zhao, and Zhou Chunjie. "A hierarchical colored Petri net–based cyberattacks response strategy making approach for critical infrastructures." International Journal of Distributed Sensor Networks 16, no. 1 (2020): 155014771988980. http://dx.doi.org/10.1177/1550147719889808.

Full text
Abstract:
Critical infrastructures are essential for national security, economy, and public safety. As an important part of security protection, response strategy making provides useful countermeasures to reduce the impacts of cyberattacks. However, there have been few researches in this domain that investigate the cyberattack propagation within a station and the incident spreading process in the critical infrastructure network simultaneously, let along analyzing the relationships between security strategy making for a station and scheduling strategy for the critical infrastructure network. To tackle this problem, a hierarchical colored Petri net–based cyberattacks response strategy making approach for critical infrastructures is presented. In this approach, the relationships among cyberattacks, security measures, devices, functions, and station capacity are analyzed and described in a hierarchical way, and the system loss is calculated with the input of abnormal station capacities. Then, based on the above model, the security strategy making for a station and the scheduling strategy making for the critical infrastructure network are investigated in depth. Finally, the effectiveness of the proposed approach is demonstrated on a simulated water supply system.
APA, Harvard, Vancouver, ISO, and other styles
31

Rus, Simona, and Ana Ion. "Protecting The National And European Critical Underwater Infrastructures With The Help Of Divers." International conference KNOWLEDGE-BASED ORGANIZATION 21, no. 1 (2015): 105–14. http://dx.doi.org/10.1515/kbo-2015-0018.

Full text
Abstract:
Abstract The contemporary security environment is characterized by a high degree of instability and unpredictability, in which the current trend is to transform the great wars in terrorist fights and attack. Directive 2008/114/of the European Council proposes the identification and designation of national and European Critical Infrastructures (ECI), and also the evaluation of the need to improve their protection. In this regard, the paper presents the activity of a special category of workers, i.e. divers. Their work contributes to ensuring peace and security all along the Romanian Black Sea coast, which is a European and national border. The divers, through their activity, manage to eliminate the obstacles that jeopardize the immersed critical infrastructure, and the underwater environment in general, thus, ensuring prosperity, stability and security in the region.
APA, Harvard, Vancouver, ISO, and other styles
32

Kalnawat, Aarti, Dharmesh Dhabliya, Kasichainula Vydehi, Anishkumar Dhablia, and Santosh D. Kumar. "Safeguarding Critical Infrastructures: Machine Learning in Cybersecurity." E3S Web of Conferences 491 (2024): 02025. http://dx.doi.org/10.1051/e3sconf/202449102025.

Full text
Abstract:
It has become essential to protect vital infrastructures from cyber threats in an age where technology permeates every aspect of our lives. This article examines how machine learning and cybersecurity interact, providing a thorough overview of how this dynamic synergy might strengthen the defence of critical systems and services. The hazards to public safety and national security from cyberattacks on vital infrastructures including electricity grids, transportation networks, and healthcare systems are significant. Traditional security methods have failed to keep up with the increasingly sophisticated cyber threats. Machine learning offers a game-changing answer because of its ability to analyse big datasets and spot anomalies in real time. The goal of this study is to strengthen the defences of key infrastructures by applying machine learning algorithms, such as CNN, LSTM, and deep reinforcement learning for anomaly algorithm. These algorithms can anticipate weaknesses and reduce possible breaches by using historical data and continuously adapting to new threats. The research also looks at issues with data privacy, algorithm transparency, and adversarial threats that arise when applying machine learning to cybersecurity. For machine learning technologies to be deployed successfully, these obstacles must be removed. Protecting vital infrastructures is essential as we approach a day where connectivity is pervasive. This study provides a road map for utilising machine learning to safeguard the foundation of our contemporary society and make sure that our vital infrastructures are robust in the face of changing cyberthreats. The secret to a safer and more secure future is the marriage of cutting-edge technology with cybersecurity knowledge.
APA, Harvard, Vancouver, ISO, and other styles
33

Udeanu, Gheorghe. "Opinions Regarding The New Challenges To The Critical Infrastructures." International conference KNOWLEDGE-BASED ORGANIZATION 21, no. 1 (2015): 127–34. http://dx.doi.org/10.1515/kbo-2015-0021.

Full text
Abstract:
Abstract In Romania, the protection of critical infrastructure is seen as a dynamic process, with a variable geometry, which requires constant reporting to the various types of threats of the external environment: terrorism, organized crime, illegal migration, border insecurity, etc. For this reason, any process of designing/redesigning the concept of national critical infrastructure protection should relate to the complexity and the fluidity of the present international security environment and the fundamental reason of any initiative regarding this process is enhancing the status of “vector of stability” at the Eastern border of the European Union and NATO, considering that many of the transnational threats facing Europe originate from this area.
APA, Harvard, Vancouver, ISO, and other styles
34

Johnson, Chris W. "Anti-social networking: crowdsourcing and the cyber defence of national critical infrastructures." Ergonomics 57, no. 3 (2013): 419–33. http://dx.doi.org/10.1080/00140139.2013.812749.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Huggett, Jeremy. "Deconstructing the Digital Infrastructures Supporting Archaeological Knowledge." Current Swedish Archaeology 31 (February 24, 2024): 11–38. http://dx.doi.org/10.37718/csa.2023.01.

Full text
Abstract:
The last 30 years have seen significant investments in the development of digital infrastructures to support archaeological practice. From field recording systems to national data archives, these have come to play an increasingly dominant role in the collection, management, and access to the data used in the creation of new archaeological knowledge. Although a lot of attention has been paid to the technical creation of such systems, much less is said about the wider political, cultural and social aspects of these infrastructures. Focusing on large-scale national or transnational data infrastructures, this paper seeks to lay the groundwork for such an inquiry by making the infrastructure the centre of analysis, rather than its technical aspects. The paper asks how infrastructures emerge, are sustained, become embedded in practice, and how they subsequently contextualise and influence the formation of archaeological knowledge. The underlying and frequently hidden complexities of infrastructures and their nature as always under development should make a critical understanding of their implementation and application, the opportunities they offer, the constraints they impose, and the perspectives they adopt, an important precursor to their knowledgeable use in practice.
APA, Harvard, Vancouver, ISO, and other styles
36

SZABÓ, Lajos, and Zsuzsanna BALOGH. "PREVENTIVE MEASURES OF INFRASTRUCTURES." Strategic Impact 80, no. 3 (2022): 62–72. http://dx.doi.org/10.53477/1841-5784-21-16.

Full text
Abstract:
The infrastructure elements are often recognized when their continuity stops, although their security is a topic that is often concerning only their cyber protection, not the physical one. There are many examples in the world where the prevention of infrastructure is taken seriously and handled properly. These recommendations and guidance could be easily adapted anywhere. The aim of this paper is to show some of the existing ways, tools, and techniques of protecting (critical) infrastructure elements that can be easily adapted in Hungary. Based on these foreign regulations the Hungarian legislative system could create a national one with the support of the decision makers.
APA, Harvard, Vancouver, ISO, and other styles
37

Gerasymenko, O. M. "Critical infrastructure of Ukraine as a subject of scientific knowledge: theoretical aspect." Uzhhorod National University Herald. Series: Law 4, no. 85 (2024): 42–49. http://dx.doi.org/10.24144/2307-3322.2024.85.4.6.

Full text
Abstract:
The article is devoted to the study of theoretical aspects of critical infrastructure as a subject of scientific knowledge. The importance of critical infrastructure facilities for ensuring Ukraine’s national security, the stability of its economy and the state’s defense capability is determined. Legislative regulation in this area is analyzed, in particular, the Law of Ukraine «On Critical Infrastructure», «On National Security of Ukraine», the Criminal Procedure Code of Ukraine, the National Security Strategy of Ukraine, etc. normative legal acts that contain definitions of terms. Attention is drawn to the fact that the violation of the functioning of the specified objects in the conditions of martial law may cause socially dangerous consequences for society and the state. According to the result of the comparison with foreign experience (USA, EU, Great Britain, China, Japan), it is proved that Ukraine takes into account international approaches to the protection of critical infrastructure, but has its own unique features caused by national threats and challenges. In the US, for example, critical infrastructure is defined as systems and assets so important that their failure to function or damage would have a devastating impact on security, the national economy, and public health. The European Union approaches this issue through the European Critical Infrastructures Directive, focusing on interconnection and coordination between member states. The UK takes care of cyber security, while China and Japan emphasize national control and resilience of facilities. Based on the analysis, recommendations were made for improving the legislative policy of Ukraine in the field of critical infrastructure. A conclusion was made about the relevance of the task of the Security Service of Ukraine to combat criminal offenses at critical infrastructure facilities, and practical recommendations for further improvement of this area were provided. It has been determined that the perspective areas of scientific research are the analysis of the experience of the countries of the European Union in terms of legal protection against criminal offenses at critical infrastructure facilities.
APA, Harvard, Vancouver, ISO, and other styles
38

Pepple, Peter, Ambrose Sunny Okorie, and Patrick Adeel. "Leveraging Artificial Intelligence for Enhancing the Resilience and Security of Critical Infrastructures in the United States." European Journal of Computer Science and Information Technology 13, no. 1 (2025): 16–32. https://doi.org/10.37745/ejcsit.2013/vol13n11632.

Full text
Abstract:
In the rapidly evolving landscape of global security, the United States faces increasingly sophisticated threats to its critical infrastructures and national security. These threats emanate from state and non-state actors employing advanced technologies to disrupt, degrade, and destroy essential systems. In response, Artificial Intelligence (AI) has emerged as a powerful tool for enhancing the resilience and defense mechanisms for critical infrastructures operation. This research paper explores the potential and application of AI in safeguarding the nation's critical assets, including energy grids, transportation networks, gas & oil pipelines, communication systems, financial institutions, water supply systems, healthcare databases, IT networks, and air traffic control systems. By leveraging machine learning algorithms, predictive analytics, and anomaly detection techniques, AI can identify and mitigate vulnerabilities in real-time, preemptively countering cyber-attacks, physical sabotage, and air traffic control disruptions. Additionally, AI-driven systems bolster cybersecurity, ensuring the resilience and security of vital US systems against emerging cyber threats. Furthermore, AI enhances decision-making capabilities, providing security agencies with actionable intelligence and situational awareness, while also contributing to overall security enhancements. This paper examines the ethical considerations, challenges, and future directions of integrating AI into national security frameworks. Through a comprehensive analysis, this study underscores the vital role of AI in fortifying the United States' critical infrastructures against the growing array of adversarial threats.
APA, Harvard, Vancouver, ISO, and other styles
39

Tolіupa, Serhii, Anatoliy Shevchenko, and Andriy Kulko. "PECULIARITIES OF ENSURING THE SECURITY OF CRITICAL INFRASTRUCTURES." Information systems and technologies security, no. 1 (7) (2024): 11–23. http://dx.doi.org/10.17721/ists.2024.7.11-23.

Full text
Abstract:
Background. The rapid development of information technologies over the past two decades has impacted the functioning of critical infrastructure facilities. These technologies have begun to be used not only for the exchange and processing of information, but also as a tool for reducing harm. The protection of sovereign interests in the political context is the primary basis for ensuring the national security of the country, which explains the need for the creation and constant development of strong cyber security. Critical infrastructure facilities are foldable, spaciously distributed, rich in component systems, the stability of the robot is critical for the functioning of the economy and the livelihood of the household. They have a rich structure, which includes: a range of technical components; social rheum; organizational level and level of state governance. Мethods. For monitoring information systems and methods for assessing the security of systems. Results. The investigation of critical infrastructures as socio-technical systems will require an assessment of the complex interactions between the technical, social and organizational levels of the system. Therefore, it is important to look at critical infrastructure as a whole. In this case, it is necessary to speak at a one-hour close examination of the technical, organizational and social factors that indicate the structure of the system and the dynamics of its development. Schobstecchita to the nonsense of such systems, it is not possible to pray beyond the traditions of the tradition to the zziki projected Riziki, to go to the new paradigmes, and the blessing of the nonsense of the critical sinfrastructure for the criterly wrecks to the designed areas. Due to the need to include the consideration of design basis accidents on critical infrastructure, the scope of surveillance may be expanded accordingly. Come to the point of ensuring the safety of those responsible not only for the creation of dry-barriers that occur ahead of the implementation of project-based accidents that are postulated, but also for the improvement of the resistance and survivability of critical infrastructure times beyond the project inflows, in order to focus on avoided large-scale disasters and troubling interruptions in the functioning of , and the creation of a rich criteria model for assessing the level of security of critical infrastructure objects will give a more comprehensive picture of the status of the critical infrastructure object. Conclusions. The current safety methods for technical systems are divided into systems that have clear boundaries and well defined danger flows. For these systems, a database of accident statistics can be created, which allows for precise evaluation and verification of models. These methods, which are based on case-by-case scenario "trees" (models of the type "tree" of ideas, "tree" of views), were fragmented without the coordination of design inputs and do not allow for proper management of the complexity of critical infrastructures functioning in is determined by the interaction of technical, organizational and social factors.
APA, Harvard, Vancouver, ISO, and other styles
40

Thurlby, Robert, and Kim Warren. "Understanding and managing the threat of disruptive events to the critical national infrastructure." Journal of Facilities Management 12, no. 3 (2014): 231–46. http://dx.doi.org/10.1108/jfm-04-2013-0020.

Full text
Abstract:
Purpose – This paper aims to describe a high-level model portraying the relationships between operational, investment, commercial and regulatory pressures, and reports the early findings from testing alternative strategies, both over the long- and short-term. Concern about the vulnerability of utility networks (electricity, gas and water) and other infrastructures, including transport and telecommunications, to environmental, terrorist and other threats has increased in recent years. This has been motivated both by a perceived increase in such threats and by recognition that the commercial pressures and regulation of companies operating these infrastructures could unintentionally have increased that risk. Powerful simulation tools already help utility operators develop asset investment polices to improve both the performance and resilience of their networks, while others have helped increase their capability to respond efficiently when disruptive events occur. However, these tools need to be further developed to increase understanding of how the interdependencies between operational, investment, commercial and regulatory pressures influence and eventually define the strategic policies available to these organisations and what the long-run consequences will be for the resilience of these systems and hence for service continuity. Design/methodology/approach – Use of system dynamics methods and tools to develop a new approach to strategy and policy development for risk management for organisations operating the critical national infrastructure. Findings – System dynamics is a valid approach to address the problem of understanding risk and developing risk mitigation and management strategies for organisations operating the critical national infrastructure. To develop policies that will effectively manage and mitigate risk in the critical national infrastructure, it is essential to identify and model the interactions and interdependencies between the organisational, investment, commercial and regulatory factors. Research limitations/implications – The research has developed a proof-of-concept model and set of simulation tools which produce good results using test data from one type of organisation operating in the critical national infrastructure. The model has not been tested using data from other types of organisations. Similarly, the software written in the model has not been tested in operational conditions and further testing will be required. Practical implications – The model at the moment can only be applied to single organisation. The interactions between organisations are not in scope. Originality/value – Although some work in the field using simulation tools and methods has been done in the USA, the use of system dynamics and its application to the specific situation on the UK and Europe is new. The model uses earlier work which applied system dynamics to the subject of asset investment planning, but is a major step forward from this work. Risk and resilience is one of the major challenges facing operators of the critical national structure. This work will be of potential value to all these organisations.
APA, Harvard, Vancouver, ISO, and other styles
41

Pöyhönen, Jouni, and Martti Lehto. "Architecture Framework for Cyber Security Management." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 388–97. http://dx.doi.org/10.34190/eccws.23.1.2340.

Full text
Abstract:
The smooth operation of contemporary society relies on the collaborative functioning of multiple essential infrastructures, with their collective effectiveness increasingly hinging on a dependable national system of systems construction. The central focus within the realm of cyberspace revolves around safeguarding this critical infrastructure (CI), which includes both physical and electronic components essential for societal operations. The recent surge in cyber-attacks targeting CI, critical information infrastructures, and the Internet, characterized by heightened frequency and increased sophistication, presents substantial threats. As perpetrators become more adept, they can digitally infiltrate and disrupt physical infrastructure, causing harm to equipment and services without the need for a physical assault. The operational uncertainty of CI in these cases is obvious. The linchpin of cyber security lies in a well-executed architecture, a fundamental requirement for effective measures. The framework of this paper emphasizes organizational guidance in cyber security management by integrating the cyber security risks assessment and the cyber resilience process into overall continuity management of organizations business processes.
APA, Harvard, Vancouver, ISO, and other styles
42

Zaman, Dunya, and Mahdi Mazinani. "Cybersecurity in Smart Grids: Protecting Critical Infrastructure from Cyber Attacks." SHIFRA 2023 (August 18, 2023): 1–9. http://dx.doi.org/10.70470/shifra/2023/010.

Full text
Abstract:
The increasing digitalization of smart grids has brought numerous benefits in terms of efficiency, sustainability, and reliability, but it has also exposed these critical infrastructures to significant cybersecurity risks. This study investigates the cybersecurity challenges faced by smart grids, focusing on the vulnerabilities present in communication systems, control networks, and endpoint devices. The problem statement revolves around the growing complexity of smart grid infrastructures, which have become prime targets for cyberattacks such as denial-of-service (DoS), malware, and data breaches, threatening grid stability, data integrity, and national security. The primary objective of this study is to evaluate the current cybersecurity methods used in smart grids, such as encryption, firewalls, intrusion detection systems (IDS), and emerging technologies like artificial intelligence (AI) and blockchain. The study also aims to assess regulatory frameworks, such as the National Institute of Standards and Technology (NIST) and North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) standards and identify gaps in policy that need addressing. The results of the study demonstrate that AI-based anomaly detection systems significantly reduce attack detection times, averaging 2.5 seconds, with a low false positive rate of 7%. Blockchain technology, while increasing energy overhead by 15%, provides enhanced security for decentralized energy transactions. Multi-factor authentication (MFA) proved effective, blocking 98% of unauthorized access attempts. However, regulatory gaps were identified, especially in real-time monitoring and incident response. The study concludes that by adopting a layered security approach, integrating AI and blockchain technologies, and strengthening regulatory frameworks, smart grids can achieve a 75% improvement in cybersecurity efficacy. Continued efforts to address challenges such as legacy system integration, resource limitations, and evolving cyber threats are essential to securing the future of energy infrastructure.
APA, Harvard, Vancouver, ISO, and other styles
43

Fita, Daniel N., Dan C. Petrilean, and Ioan L. Diodiu. "Analysis of the National Power Grid from Romania in the context of identifying vulnerabilities and ensuring energy security." Renewable Energies, Environment and Power Quality Journal 2 (July 2024): 210–16. http://dx.doi.org/10.24084/reepqj24.386.

Full text
Abstract:
The National Power Grid is the most important national energy objective of strategic importance, having in its composition a multitude of critical infrastructures (power substations and overhead power lines of 400 kV and 220 kV) of national and european importance without which the economy and national well-being do not it could work. The proper functioning of all state mechanisms is ensured through the National Power Grid because all public systems are almost entirely dependent on electricity. Not operating the National Power Grid, or not operating at normal parameters, the economic security of our country is endangered, creating the state of economic insecurity, a negative factor with immediate effects on national security and well-being. This paper is of major importance in identifying the vulnerabilities of the National Power Grid and creating strategies for the protection and security of existing critical infrastructures and energy security, for the purpose of safety and security of the National Energy System. Key words. National Power Grid, vulnerabilities, energy security
APA, Harvard, Vancouver, ISO, and other styles
44

Mészáros, István. "Comparison of the Protection of Critical Healthcare Infrastructures in Germany and Hungary." Hadmérnök 18, no. 4 (2023): 97–107. http://dx.doi.org/10.32567/hm.2023.4.7.

Full text
Abstract:
In 2008, the European Union regulated the basics of the protection of critical infrastructures in a directive. The Member States therefore had to ensure that – in addition to the freedom of the method and means of implementation – the provisions of the directive were transposed into their national legal order. Accordingly, some Member States may define different detailed rules. The detailed rules related to the protection of critical infrastructures (e.g. the designation thresholds) are not public in several Member States, but in Germany and Hungary they have been recorded at the legislative level. In my study, I compare the rules related to the protection of critical healthcare infrastructures, including inpatient care institutions, primarily based on legal sources and the experiences of my study tour in Germany, from the selection criteria system to crisis planning. The good practices resulting from the differences and similarities to be discovered can help to revise and standardise the rules and practices related to the protection of critical health infrastructures.
APA, Harvard, Vancouver, ISO, and other styles
45

Thacker, Scott, Raghav Pant, and Jim W. Hall. "System-of-systems formulation and disruption analysis for multi-scale critical national infrastructures." Reliability Engineering & System Safety 167 (November 2017): 30–41. http://dx.doi.org/10.1016/j.ress.2017.04.023.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Fidelis, Chukwujekwu Obodoeze, Nkemdilim Obiokafor Ifeyinwa, and Chijindu Asogwa Tochukwu. "SCADA for National Critical Infrastructures Review of the Security Threats, Vulnerabilities and Countermeasures." International Journal of Trend in Scientific Research and Development 2, no. 2 (2018): 974–82. https://doi.org/10.31142/ijtsrd9556.

Full text
Abstract:
The Supervisory Control And Data Acquisition SCADA networks contain computers and applications that perform key functions in providing essential services and commodities to citizens such as electricity, natural gas, crude oil and refined petroleum products, waste water treatment and transportation. This paper looks at SCADA, its architecture and functions to industrial control system ICS as well its security threats, vulnerabilities and attacks that could prevent SCADA from delivering these functions especially in Nigeria. This paper finally recommended far reaching holistic solutions to the various SCADA's security challenges. Fidelis Chukwujekwu Obodoeze | Ifeyinwa Nkemdilim Obiokafor | Tochukwu Chijindu Asogwa "SCADA for National Critical Infrastructures: Review of the Security Threats, Vulnerabilities and Countermeasures" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-2 , February 2018, URL: https://www.ijtsrd.com/papers/ijtsrd9556.pdf
APA, Harvard, Vancouver, ISO, and other styles
47

Rezvani, Seyed M. H. S., Maria João Falcão Silva, and Nuno Marques de Almeida. "Mapping Geospatial AI Flood Risk in National Road Networks." ISPRS International Journal of Geo-Information 13, no. 9 (2024): 323. http://dx.doi.org/10.3390/ijgi13090323.

Full text
Abstract:
Previous studies have utilized machine learning algorithms that incorporate topographic and geological characteristics to model flood susceptibility, resulting in comprehensive flood maps. This study introduces an innovative integration of geospatial artificial intelligence for hazard mapping to assess flood risks on road networks within Portuguese municipalities. Additionally, it incorporates OpenStreetMap’s road network data to study vulnerability, offering a descriptive statistical interpretation. Through spatial overlay techniques, road segments are evaluated for flood risk based on their proximity to identified hazard zones. This method facilitates the detailed mapping of flood-impacted road networks, providing essential insights for infrastructure planning, emergency preparedness, and mitigation strategies. The study emphasizes the importance of integrating geospatial analysis tools with open data to enhance the resilience of critical infrastructure against natural hazards. The resulting maps are instrumental for understanding the impact of floods on transportation infrastructures and aiding informed decision-making for policymakers, the insurance industry, and road infrastructure asset managers.
APA, Harvard, Vancouver, ISO, and other styles
48

Cypkina, A. V., and A. V. Shaburova. "Categorization of CII objects in the defense industry." Interexpo GEO-Siberia 6 (May 18, 2022): 288–93. http://dx.doi.org/10.33764/2618-981x-2022-6-288-293.

Full text
Abstract:
In modern times, critical information infrastructures of enterprises are increasingly being attacked. Each time these attacks become more malicious. Since the organization's activities directly depend on the smooth operation of its information systems, it is necessary to ensure the safety of these facilities. This article discusses the main stages of categorization of critical information infrastructure objects. We also study the items necessary for organizations to perform, which by default belong to the field of activity that falls within the critical information infrastructure. An example of such an organization in this article is a military-industrial enterprise, which has its own main features when carrying out the categorization procedure. The relevance of the topic of categorizing critical information infrastructure is explained by the importance of the defense industry in ensuring the national security of the Russian Federation.
APA, Harvard, Vancouver, ISO, and other styles
49

Nikolaou, Nikolaos, Andreas Papadakis, Konstantinos Psychogyios, and Theodore Zahariadis. "Vulnerability Identification and Assessment for Critical Infrastructures in the Energy Sector." Electronics 12, no. 14 (2023): 3185. http://dx.doi.org/10.3390/electronics12143185.

Full text
Abstract:
Vulnerability identification and assessment is a key process in risk management. While enumerations of vulnerabilities are available, it is challenging to identify vulnerability sets focused on the profiles and roles of specific organizations. To this end, we have employed systematized knowledge and relevant standards (including National Electric Sector Cybersecurity Organization Resource (NESCOR), ISO/IEC 27005:2018 and National Vulnerability Database (NVD)) to identify a set of 250 vulnerabilities for operators of energy-related critical infrastructures. We have elaborated a “double-mapping” scheme to associate (arbitrarily) categorized assets, with the pool of identified Physical, Cyber and Human/Organizational vulnerabilities. We have designed and implemented an extensible vulnerability identification and assessment framework, allowing historized assessments, based on the CVSS (Common Vulnerability Scoring System) scoring mechanism. This framework has been extended to allow modelling of the vulnerabilities and assessments using the Structured Threat Information eXpression (STIX) JSON format, as Cyber Threat Intelligence (CTI) information, to facilitate information sharing between Electrical Power and Energy Systems (EPES) and to promote collaboration and interoperability scenarios. Vulnerability assessments from the initial analysis of the project in the context of Research and Technology Development (RTD) projects have been statistically processed, offering insights in terms of the assessment’s importance and distribution. The assessments have also been transformed into a dynamic dataset processed to identify and quantify correlation and start the discussion on the interpretation of the way assessments are performed.
APA, Harvard, Vancouver, ISO, and other styles
50

Bhemavarapu, Sai Varun Reddy, and Agathamudi Vikram Naidu. "INVESTIGATING A NATION-SPONSORED CYBER ATTACK ON CRITICAL INFRASTRUCTURE: CASE STUDY AND ANALYSIS STUXNET WORM." International Journal of Engineering Applied Sciences and Technology 9, no. 09 (2025): 78–83. https://doi.org/10.33564/ijeast.2025.v09i09.013.

Full text
Abstract:
Stuxnet represents a paradigm shift in the landscape of cyber warfare, marking its entry as a groundbreaking cyber weapon with profound implications that extend far beyond its immediate targets. Initially discovered in 2010, this sophisticated piece of malware was uniquely designed to cause physical damage to Iran's nuclear enrichment facility, a feat that had never been achieved by any previous cyber attack. Its discovery unveiled a new frontier in digital warfare, where malicious code could cross the threshold from the digital realm into causing tangible, real-world destruction. This capability highlighted a critical vulnerability in national and international security infrastructures, challenging previously held notions about the nature, scope, and potential impact of cyber threats. As the first known cyber weapon to specifically target industrial control systems, Stuxnet opened a Pandora's box in cybersecurity, setting a precedent for how state actors could leverage digital tools to achieve strategic geopolitical objectives, thereby redefining the contours of modern warfare. The implications of Stuxnet extend beyond its technical sophistication, resonating through the corridors of global geopolitics and international law. It served as a wake-up call, demonstrating the potential of cyber operations to disrupt critical national infrastructures and influence global power dynamics without a single soldier setting foot on enemy soil. The attack not only exposed the vulnerabilities of critical infrastructures to cyber intrusions but also raised complex ethical and legal questions about the use of digital weapons in statecraft. This incident spurred a global debate on the need for new international norms and regulations governing state conduct in cyberspace, highlighting a pressing need for a collective global response to secure critical infrastructure against emerging cyber threats. Stuxnet's legacy, therefore, lies anot just in its technical ingenuity but also in its role as a catalyst for a reevaluation of global cybersecurity strategies and the ethical boundaries of digital warfare.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!