Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

PL EN


2020 | 28 | 1 | 70-81

Article title

Critical infrastructure in the shaping of national security

Authors

Content

Title variants

Languages of publication

EN

Abstracts

EN
Critical infrastructure plays a key role in ensuring the national security of a state, due to important functions thereof in military, economic, and public administration sectors. The destruction, damage, failure or other deprivation of critical infrastructure of its operational capabilities constitutes a direct threat to the structural and personal security of the state. The research methods and techniques implemented in the research process itself primarily hinge on critical analysis of acts of law and organisational and competence-related documents, subject-matter literature, synthesis and inference in order to reach the formulated objectives based on efficiency criteria. The main findings indicate that critical infrastructure is perceived as a set of systems which exerts a substantial impact on the security of the state and, obviously, its inhabitants. The results advocate for a reflection that critical infrastructure embraces a number of facilities which appear to be remarkably diverse. They are buildings, structures, installations, equipment and services which, integrally, form cohesive systems which allow the proper functioning of a given state. It is the state whose role is just to supervise and coordinate, whereas the operators of critical infrastructure are the ones who are to protect it. The overall findings of this paper present the notion that safeguarding critical infrastructure is a task of crucial importance to the national security of a state and, therefore, it would be worth reconsidering the intensification of rules which apply to the infrastructure of national security and its efficient functioning.

Year

Volume

28

Issue

1

Pages

70-81

Physical description

Dates

published
2020-03-26
received
2020-02-17
accepted
2020-02-29

Contributors

  • Wydział Bezpieczeństwa, Logistyki i Zarządzania, Wojskowa Akademia Techniczna, Poland

References

  • Bielawski, R., Rządkowski, R. and Perz, R. (2018) ‘Unmanned Aerial Vehicles in the protection of the elements of a country’s critical infrastructure – selected directions of development’, Security and Defence Quarterly, 22(5), pp. 3–19. doi:10.5604/01.3001.0012.6422.
  • Dessers, E. (2014) Spatial Data Infrastructures at Work: Analysing the Spatial Enablement of Public Sector Processes. Leuven: Leuven University Press. doi: 10.2307/j.ctt9qf068.
  • Domalewska, D. (2019) ‘The role of social media in emergency management during the 2019 flood in Poland’, Security and Defence Quarterly, 27(5), pp. 32-43. doi: 10.35467/sdq/110722.
  • Fay, J. and Patterson, D. (2017) Contemporary Security Management. Oxford: Butterworth-Heinemann. doi:10.1016/C2015-0-04732-3.
  • Knapp, E. and Langill, J.T. (2011) Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems. Rockland: Syngress. doi: 10.1016/C2010-0-66555-2.
  • Landucci, G., Khakzad, N., and Reniers, G. (2020) Physical Security in the Process Industry: Theory with Applications. Burlington: Elsevier. doi: 10.1016/C2017-0-00539-6.
  • Li, W., Kodeswaran P., Jagtap, P., Joshi, A. and Finin, T. (2012) ‘Managing and Securing Critical Infrastructure – A Semantic Policy- and Trust-Driven Approach’, in Das, S.K., Kant, K. and Zhang, N. (eds.) Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges. San Francisco: Morgan Kaufmann, pp. 551-573. doi: 10.1016/C2011-0-04434-4.
  • Narodowy Program Ochrony Infrastruktury Krytycznej (NPOIK) (2015) Warsaw: Rządowe Centrum Bezpieczeństwa.
  • Pesch-Cronin, K.A. and Marion, N.E. (2016) Critical Infrastructure Protection, Risk Management, and Resilience: A Policy Perspective. Boca Raton: CRC Press. doi: 10.1201/9781315310657.
  • Polinpapilinho, F.K. and Hester, P.T. (2012) ‘Systemic determination of infrastructure criticality’, in Thissen, W.A.H., and Herder, P.M. (eds.) Critical Infrastructures State of the Art in Research and Application (International Series in Operations Research & Management Science Book 65). Dordrecht: Springer. doi: 10.1007/978-1-4615-0495-5.
  • Purpura, P. (2013) Security and Loss Prevention. Burlington: Butterworth-Heinemann. doi: 10.1016/C2010-0-69612-X.
  • Pyznar, M. (2010) ‘Narodowy Program Ochrony Infrastruktury Krytycznej w systemie ochrony tej infrastruktury – wizja Rządowego Centrum Bezpieczeństwa’, in Tyburska, A. (ed.) Ochrona infrastruktury krytycznej. Szczytno: Wydawnictwo Wyższej Szkoły Policji.
  • Rogers, R., Miles, G., Fuller, E. and Dykstra, T. (2004) Security Assessment: Case Studies for Implementing the NSA IAM. Rockland: Syngress Publishing.
  • Radziejewski, R. (2014) Ochrona Infrastruktury Krytycznej. Teoria a praktyka. Warsaw: Wydawnictwo Naukowe PWN.
  • Stanley, J.R., Stanley, J.K. and Hansen, R. (2017) How Great Cities Happen: Integrating People, Land Use and Transport. Cheltenham UK & Northampton USA: Edward Elgar Pub. doi: 10.4337/9781784718398.
  • Szczurek, T. (2019) Wyzwania dla bezpieczeństwa – niepewna przyszłość – między zagrożeniami a szansami. Warsaw: Military University of Technology.
  • The law of 22 August 1997 on the protection of people and of property (Journal of Laws of the Republic of Poland Dz.U. 2016 Item 1432, as amended).
  • Wiles, J. (2008) Techno Security’s Guide to Securing SCADA: A Comprehensive Handbook On Protecting The Critical Infrastructure. Rockland: Syngress. doi: 10.1016/B978-1-59749-282-9.X0001-2.

Document Type

Publication order reference

Identifiers

YADDA identifier

bwmeta1.element.doi-10_35467_sdq_118585
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.