Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Refine search results

Journals help
Years help
Authors help

Results found: 44

first rewind previous Page / 3 next fast forward last

Search results

Search:
in the keywords:  critical infrastructure
help Sort By:

help Limit search:
first rewind previous Page / 3 next fast forward last
EN
The analysis of international experience of creation and protection of critical infrastructure is given. The definition of the term “critical infrastructure” is given too. The areas of critical infrastructure protection mechanisms in Ukraine are shown.
EN
Critical infrastructure plays a key role in the functioning of the state and the lives of its citizens. Due to natural disasters or those being a consequence of human activities, critical infrastructure can be destroyed or damaged, and its functioning can be disrupted, which can pose a threat to the lives and property of the citizens. Simultaneously, such events negatively affect the economic development of the state. That is why protection of critical infrastructure is one of the state’s priorities. In the years 2015 and 2016, NIK examined the regularity of the protection of critical infrastructure items. The audit was also a response to numerous media reports on failures or incidents that could pose a threat to critical infrastructure items in the country. The audit comprised selected critical infrastructure administrators, the Government Security Centre, regional governors and local self-government units.
EN
The article concentrates on the issue of legal mechanisms to control some areas with a huge impact on national security. In other words we could call this ‘protection’ or ‘limitation’ of free movement of goods or services. Some type of this control is the only opportunity to maintain influence in a crisis or in critical situations in respect of citizens and their daily life. It covers specific people and capital in different types of economic activities but mainly such services and supplies as energy, fuel, communication, telecommunication networks, food and water supply, transportation or production, storage and use of chemical and radioactive substances. Even in countries which are entirely open to foreign investors, ceding control over strategic areas or companies, or firms that are the most competitive in the world, is not welcome. This is because they could block or restrict the autonomy to make strategic political or economic decisions. The analysis concentrates on legal aspects of this limitation and is based on three Acts: the Act of 2010, 18th of March on special powers of the Ministry of State Treasury and their execution in certain capital companies or capital groups operating in the sectors of electricity, oil and gas, the Act of 2010, 29th of October on strategic reserves and the Act of 2015, 24th of July on the control of certain investments. Of course these regulations, even with acknowledging their significance, cannot provide a total guarantee of security. The other issue is that these solutions for protection, prediction of threats and their elimination, and finally, a demand to maintain backup systems, are so general that they can be interpreted differently.
EN
Together with the development of new information technologies it is necessary to take actions the aim of which is to provide protection of ICT (information and communications technology) systems. Cyber security is mainly ensured by suitable systems with the installed software for counteracting cyber attacks, as well as by cyberspace-related legal regulations.In order to check the condition of cyber security, an analysis of ICT protection has been made in selected countries. The assessment of cyber security has been based on the analysis of work principles of military services, which, because of the type of the information possessed, are very rarely eager to show their potential in the area of information protection. The safety of stored and processed military data is currently an essential element because of the constant growth of reported cases of attacks on these data. Activities aiming at cyber space protection are undertaken also in Poland, and this is reflected in plans and programmes being created, as well as in the policy of protection of ICT critical infrastructure resources. In Poland the Ministry of National Defence is also engaged in the process of protection against computer incidents. It means that computer systems able to respond to computer incidents and protect the ICT critical infrastructure are built. Providing cyber security also requires analysing the legal aspects which regulate the issues of taking retaliatory actions against the ICT network of the opponent. The description of the legal aspect has been made on the basis of the analysis of the act in states of emergency, as well as a state of natural disaster, which regulate the concept of an external threat and of cyberspace. The analysis of cyber security will make it possible to indicate factors which are necessary to fight the opponent by means of the Internet. Moreover, the results of the present condition of cyberspace security will be compared to the expected one, which will allow formulation of conclusions to be applied for the effective detection and elimination of computer incidents.
EN
One effect of rapid technological progress in the field of processing and storage of information is crime committed withthe use of modern information and communication technologies. Some time ago a completely new area known as cyberspaceappeared within the rapidly evolving sphere of computing. Mankind with its knowledge or ignorance, together with motivation,is the primary source of threats in the era of the information society. Nowadays, in order to commit an offence one does notneed to leave one’s place of residence, it is enough to have a computer, a particular idea and access to the Internet. Knowledgeof masking and hiding on the Web greatly increases the chances of success and confounds the instruments of law enforcementand justice. Law and order, when disrupted by various types of crime, generate in society a sense of fear, injustice and lack of statecontrol. The article discusses the real threat of cyber‑terrorismand ways to use modern tools against state security, and in particularin relation to the safety of railway infrastructure. The authors are of the opinion that the primary element of staying safein cyberspace is the education of institutions responsible for the operation of the Web and ICT systems. Equally important maybe the adoption of permanent rules of law enforcement cooperation with private sector entities, such as internet service providers(ISPs) and administrators of sites, domains and websites relevant to the management of accounts, resources, and permissions.The article also notes that police actions may not be sufficient to effectively combat computer crime related to the threat to criticalinfrastructure systems if the entire society is not also involved in this fight.
EN
The authors are interested in some aspects of a development project entitled “The methodology of risk assessment for the purposes of crisis management system RP (ID 193751)”. The project funded by the National Research and Development Centre under the Competition 3/2012 (security and defense). As part of the project the following items were reviewed and analyzed: materials related to the Government Security Centre, already completed and available products of the project ID 193751, and literature relating to, among other things, crisis management, critical infrastructure, business continuity, security, and threats. The basic emphasis of the article is focused on the resource-critical infrastructure interpretation of the state, whereby the state is perceived as a complex administrative structure in which, on the basis of external and internal interactions of resources, the risk of threats measurement is done.
EN
This paper explores the directions for the application of unmanned aerial vehicles in the provision of security to vital elements of a country’s critical infrastructure. The analysis focuses on two paths of development: the first one refers to the transportation system, the latter is related to the gas supply network – the basic components of a country’s critical infrastructure. The first section of this paper will examine the current state of knowledge in the field, and is designed as a reference of terminology pertaining to unmanned aerial vehicles (definitions and classification). The section shall furthermore provide a basis for and a contribution to the developed conceptual-semantic framework for UAV research. The first direction of development is described in terms of the characteristics and assumptions of the system; this includes an overview of the specific requirements of the unmanned platform itself, as well as the elements of the system, such as a local monitoring centre and other components. Furthermore, this section provides the overview of the designated mobile application, whose development is expected to improve the efficiency of system operation, which is a conceptual novelty considering similar developments. The second direction concerns the development of an unmanned system of production, storage, and use of chemical and radioactive substances, including pipelines for hazardous substances. The programme that fits perfectly in the framework of the second considered branch of development is “Cricket” [Polish: “Świerszcz”] – a programme implemented in the periodic inspection of gas supply infrastructure. The description of the programme in question included specifying the technical and operational requirements for the fight devices as well as for the equipment.
EN
Critical infrastructure plays a key role in ensuring the national security of a state, due to important functions thereof in military, economic, and public administration sectors. The destruction, damage, failure or other deprivation of critical infrastructure of its operational capabilities constitutes a direct threat to the structural and personal security of the state. The research methods and techniques implemented in the research process itself primarily hinge on critical analysis of acts of law and organisational and competence-related documents, subject-matter literature, synthesis and inference in order to reach the formulated objectives based on efficiency criteria. The main findings indicate that critical infrastructure is perceived as a set of systems which exerts a substantial impact on the security of the state and, obviously, its inhabitants. The results advocate for a reflection that critical infrastructure embraces a number of facilities which appear to be remarkably diverse. They are buildings, structures, installations, equipment and services which, integrally, form cohesive systems which allow the proper functioning of a given state. It is the state whose role is just to supervise and coordinate, whereas the operators of critical infrastructure are the ones who are to protect it. The overall findings of this paper present the notion that safeguarding critical infrastructure is a task of crucial importance to the national security of a state and, therefore, it would be worth reconsidering the intensification of rules which apply to the infrastructure of national security and its efficient functioning.
EN
The purpose of this research is to indicate the legal aspects of protection and control of the state`s strategic resources accumulated in commercial companies which are significant for public order and national security. The normative acts of the European Union, implemented to Polish law, defined it as Critical Infrastructure. These include such sectors as information and communications technologies, ener-gy and transport systems, generating and transmission systems in power plants, systems of production, processing, storage and transportation of energy resources, including oil and gas.
EN
Critical Infrastructure (CI) plays a significant role in maintaining public order and national security. The state may use many different methods to protect and control CI allocated to commercial companies. This article describes the three most important ones: legislation, ownership and government institutions and agencies. The data presented in this paper is the result of research done on the most developed countries in the EU (United Kingdom, France, Germany and Italy) and their strategic enterprises in the ICT sector, one of the most important sectors in any national security system.
EN
The article focuses on two research laboratories at the University of Žilina in University Science Park under the names “Modelling and simulation of crisis phenomena in the transportation to increase the efficiency of decision-making process” and “Research systems for protection of critical infrastructure objects in the transportation”. Respective parts identify the main goals of the research, research focus and the uniqueness of respective laboratories as well as practical application within University Science Park of the University of Žilina, the Slovak Republic, the EU and the world.
EN
The article focuses on two research laboratories at the University of Žilina in University Science Park under the names “Modelling and simulation of crisis phenomena in the transportation to increase the efficiency of decision-making process” and “Research systems for protection of critical infrastructure objects in the transportation”. Respective parts identify the main goals of the research, research focus and the uniqueness of respective laboratories as well as practical application within University Science Park of the University of Žilina, the Slovak Republic, the EU and the world.
EN
The requirements of the European Union on the security and safety and the critical infrastructure protection. The conception of the critical infrastructure protection in the conditions of the Slovak Republic. The system of the university preparation of the experts in Slovakia and its particularities in the conditions of the crisis management. Requirements on the crisis managers operating in the area of protecting the elements of the crisis infrastructure. The conception of the curricula, the structure of the general and professional, compulsory and optional subjects and particularities in the accreditation process.
EN
An extraordinary attention is dedicated to the evaluation of fatigue damage and technical life of different technical systems all over the world because breakdowns caused by a fatigue failure have often a nature of catastrophe. Material fatigue of parts of technical means in critical infrastructure (particularly oversized systems and technological devices) belongs to the most frequent causes of boundary states rise and relating operation breakdowns. Paper contains general formulation of reliability and safety of technical systems judging, brief characteristic of basic areas to be taken in account as input into calculated prediction of technical systems fatigue damage and analysis of risk items by its practical application on a transport means in real working conditions.
PL
W zamieszczonym artykule dokonano krótkiej charakterystyki problematyki zagrożeń i niebezpieczeństw spowodowanych rozwojem Internetu. Przedstawiono podejmowane próby ataków informatycznych, prowadzonej wojny internetowej skierowanej na różne dziedziny finansowo-ekonomiczne, administracyjne, militarne o zasięgu globalnym. Dokonano przeglądu różnych form i metod ataku na infrastrukturę informatyczną, w tym infrastrukturę krytyczną. Przedstawiono rozwój zagrożeń ze strony broni cyfrowej, cyberterroryzmu, cyberprzestępczości, cyberwojny, podano przykłady ataków hakerskich występujących w skali globalnej. Omówiono przykładowy model zabezpieczenia systemu informatycznego komputera, korzystania z Internetu
EN
In the reproduced article presents a brief characterization of hazards and dangers caused by the growth of the Internet. Are shown attempts to attack information, conducted online war aimed at different areas of financial and economic, administrative, global military. There have been reviews of various forms and methods of attack on infrastructure, including critical infrastructure. Provides an overview of the risks posed by digital weapons, cyberterrorism, cybercrime, cyberwar, are examples of hacking attacks occurring on a global scale. Discussed an example of a computer system security model computer, using the Internet.
EN
The article deals with protective measures against cyberattacks of information systems of the critical infrastructures and highlights some features of the cyberattacks against the information resources of national authorities. The main objective of the article is to define the characteristics of cyberattacks and the elements of a plan to counter cyberattacks of the critical information facilities. It has been found that a professionally organized cyberattack consists of several phases related to targeting, intelligence, access to the system, direct execution of the attack, and destruction of evidence of unauthorized interference. The results show that to protect the critical infrastructure facilities from cyberattacks, developed and implemented national cybersecurity standards must be developed in Ukraine, in particular for automated control systems of critical infrastructure facilities.
EN
Target processes of institutions management (from the enterprise, through the administration, to the alliances) are dependent on the provision and reliability of information and knowledge. Total digitization and “cybernation” of most of the processes require durability and protection against attacks and incidents of a new type. To anticipate timely the new risks is more difficult than to react flexibly to new socially pathological and criminal attacks. Reactive approach can’t avoid the initial losses, but this approach is pragmatic. The paper deals with some cyber threats and trends of attacks in an environment of the security management of the organization.
EN
The Critical Management Act creates a legal basis for dealing with critical infrastructure. It contains the following definition: critical infrastructure includes systems and functional objects which are connected with each other, including: buildings, devices, systems, key services for a country and its citizens’ security and other systems and objects which deal with ensuring efficient functioning of public administration bodies as well as institutions and enterprises. At national level, the protection of critical infrastructure is coordinated by the Government Centre for Security. In accordance with the critical management act, which is in effect at present, the legislator defines that critical infrastructure is created by systems and consists of functional objects connected with each other: buildings, devices, systems, key services for a country’s security and its citizens’ security and other objects and services which deal with ensuring efficient functioning of public administration bodies as well as institutions and enterprises The article contains an enumeration of the systems which are included in critical infrastructure.
EN
Vulnerability assessment is a crucial aspect for the development of methodologies to define the levels of protection in critical infrastructures. Throughout this research, we discussed the concept of vulnerability and methodologies and processes for its assessment in critical infrastructures due to a terrorist threat. The research focused on the development of an analysis model, exploring a multi-criteria decision method, in order to limit the risks to the maximum extent possible. Through a qualitative research methodology, in which we applied an analysis model based on the Threat and Infrastructure dimensions and their respective factors, we verified that the vulnerability of a critical infrastructure consists in the probability of the success of an attack, conducted by a threat - properly identifi ed, characterised, analysed and categorised - against an infrastructure with certain characteristics, which value is defi ned by the user and aggressor’s point of view. The construction of an algorithmic model for vulnerability assessment, complemented by tools to support the calculations and records, allows, through a rational, scientific and algebraic process, a qualitative analysis of factors to be transformed into measurable and quantifi able values, whose algebraic operation integrates them into a final result that expresses, as a percentage, the degree of vulnerability of a critical infrastructure facing a terrorist threat.
EN
Nowadays hacker attacks on computers or smartphones of everyday users have become commonplace. Unfortunately, increasing number of sophisticated attacks are being targeted against critical infrastructure or banking systems. The threat from hackers is very serious. As a result, institutions exposed to the attacks are obliged to take action to repulse them, because the consequences of intrusions into internal systems can be far-reaching. Numerous cases of effective hacker activities are not rare, as shown by cases from recent years.
first rewind previous Page / 3 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.