Purpose – in this article, the authors propose a management model for Critical Infrastructure cybersecurity, further development of a model developed by Limba, Plėta, Agafonov, and Damkus (2017). Research methodology – methodology consists of researching the best practices in cybersecurity management for Critical Infrastructures and evaluating the best element to be included. The article offers an overview of the model, including structure and objectives, and further analysis that focuses on pre-existing CI management frameworks. Findings – main results show that, although previously published protocols and models contain valuable elements, there is still the need to implement a comprehensive model which can be applied to every type of CI. Research limitations – research might have been limited due to the lack of a unitary approach to cybersecurity management for CI, meaning the lack of possibility of reference to a similar model and approach. Practical implications – model which is presented in the article could offer a new approach to CI protection strategies and could be the beginning of a more structured approach towards their protection. Originality/Value – model was created by the authors with references to past published protocols and models, which are present in the quotation in the text as well as the bibliography.
Critical infrastructures are complex operating environments that often require special protection and security.A successful security strategy design should adhere to the principles of durability, integrity, and regularity.In the European Union, there is a strong interest in the security of critical infrastructures, especially those with interdependence.Given the fact that critical infrastructures play an essential role in a country's economy, it makes them even more vulnerable.The main aim of this article is to analyze the critical infrastructures' cyber security policy.The creation of a security strategy requires identification of the needs for equipment, mode of operation, and required security level.It has to establish rules for precise operation and handling of situations.The article tackles the issues of security strategy for critical infrastructures to protect sensitive areas and sectors.In addition, a cybersecurity policy as a countermeasure is discussed.
Cyber security is the most critical aspect nowadays of our technologically based lives.Government institutions, banking sectors, public and private services, nuclear power plants, power grid operators, water suppliers or waste water treatment companies use information technologies in their day-to-day operations.Everything that uses technologies are based on communication and information systems and that means that it depends on cyber security.The public and private sector each year spend millions of dollars on technologies, security software and hardware devices that will increase the cyber security inside their companies, but they are still vulnerable.The main problem of this situation is that cyber security is still usually treated as a technical aspect or technology which can be easily implemented inside the organization and this implementation will guarantee cyber security.This attitude must change, because cyber security nowadays is something more than just the technology.This article presents the taxonomy of the critical infrastructure attacks, analyzes attack vectors and attack methods used to damage critical infrastructure as well as the most common cyber security mistakes which organizations make in the cyber security field when trying to make themselves safer from vulnerabilities.The main aim of this article is to provide theoretical aspects of the cyber security management model which can be used to ensure security of critical infrastructure in an organization or company.The cyber security management model that is presented in this article is analyzed from management perspectives and is not concerned with technological aspects and products that are used to protect critical infrastructure from cyber security attacks and vulnerabilities.
Critical infrastructures are complex operating environments that often require special protection and security.A successful security strategy design should adhere to the principles of durability, integrity, and regularity.In the European Union, there is a strong interest in the security of critical infrastructures, especially those with interdependence.Given the fact that critical infrastructures play an essential role in a country's economy, it makes them even more vulnerable.The main aim of this article is to analyze the critical infrastructures' cyber security policy.The creation of a security strategy requires identification of the needs for equipment, mode of operation, and required security level.It has to establish rules for precise operation and handling of situations.The article tackles the issues of security strategy for critical infrastructures to protect sensitive areas and sectors.In addition, a cybersecurity policy as a countermeasure is discussed.
The purpose of the paper is to analyze the vulnerabilities of Critical Energy Infrastructures' systems in the event of cyber-attack. The global tendency of cyber-attacks puts Critical Energy Infrastructures on one of the first places for targets. Critical Infrastructure Protection (CIP) has become an increasingly relevant topic in the global industrial environment, as the consequences of cyber-attacks toward ICS can result in physical disruption and loss of human lives. The analysis presented in the paper will take into consideration three different case scenarios of cyber-attacks to Critical Energy Infrastructures, and will evaluate the outcomes and the tactics used by the organizations' response and recovery.
Acceleration of scientific and technical progress, speeding up of technological changes, IT process globalisation and integration of OT processes invoked new challenges in preparing cyber strategies.Issues with adapting strategy for a particular specificity, region and specific cyber-attacks are not applicable.Therefore, a natural need arises to adjust the process for future cyber-attacks.It should be noted that the vast majority of organisations still need to possess a strategy that has been developed in correlation with future cyber-attacks.A part of organisations, irrespective of the lack of methodology and necessary infrastructure at the initial stage, commenced applying strategic management methods as a more dynamic environment demanded adequate changes in the cyber security within the organisation itself.The organisation started to plan such changes because, at the initial stage of the strategic management theory development, the strategy was understood as a plan drawn up to achieve the set objectives, regardless of the future need.Implementing such strategic procedures is grounded on something other than scientific calculations and is often associated with excessive use of funds.Therefore, the main goal of this article is to determine how much the r-Interdiction Median Problem with Fortification (RIMF) module can be used as a model for deciding methods for protecting critical infrastructure systems.
Disertacijoje nagrinėjama kibernetinio saugumo valdymo problema kritinės energetikos infrastruktūroje.Tyrimų objektas -valstybių kritinės energetikos infrastuktūros kibernetinio saugumo valdymas.Darbo tikslas -sukurti valstybių kritinės energetikos infrastruktūros kibernetinio saugumo valdymo modelį
"Energy Infrastructure in the Eastern Bloc. Poland and the Construction of Transnational Electricity, Oil, and Gas Systems." Europe-Asia Studies, 71(3), pp. 520–521
The purpose of the paper is to compare various types of management models that regulate the response to cyber threats to Critical Infrastructures.The development of an effective management model that regulates the response to cyber-attack against Critical Infrastructure is an important issue in security management.Many frameworks attempt to regulate the response that has to be done to recover and eradicate possible threats, but still, there is not a universal appliable model for all Critical Infrastructures.The paper will offer a comparison of various frameworks in an attempt of evaluating the features that a hypothetical model for response to Cyber Incidents to Critical Infrastructures.The focus is on Critical Energy Infrastructure, as their damage directly means damage to other critical infrastructures, given their extreme interconnectivity.After the analysis of five frameworks of responses to Cyber Incidents, an evaluation will be provided, along with a recommendation.
This article discusses the Ukrainian legislation on cybersecurity.The necessity of developing an efficient cybersecurity system was raised by the hybrid war conducted by Russia over the last few years, in which many critical infrastructure objects have been destroyed with serious consequences not only for the end consumers but also for the security of the state.Consequently, Ukraine has begun issuing a number of laws aiming at strengthening its cyber defense capabilities by establishing an efficient national cybersecurity system.The analysis has clearly shown that although important steps have already been taken in this direction, much still remains to be done to protect the Ukrainian critical infrastructure.