Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Cyber" wg kryterium: Temat


Wyświetlanie 1-7 z 7
Tytuł:
Legal implications of critical infrastructure protection; the experience of the Cyprus Cybercrime Center
Autorzy:
Tsadiras, A.
Bachtsetzis, Ch. S.
Georgiou, M.
Boustras, G.
Mylona, V.
Powiązania:
https://bibliotekanauki.pl/articles/2069222.pdf
Data publikacji:
2016
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
cybercrime law
legal framework
Cyprus cybercrime
legal implications
cyber security
cyber sexual abuse
Opis:
Cyber related crime is an important aspect of Critical Infrastructure. The recent accession of Cyprus to the EU, its small size and its remoteness are important factors that have influenced its ability to characterize its CI’s as well as create (rather harmonize) its legal background. The paper discusses Directive 2011/-93/EU on combating the sexual abuse and sexual exploitation of children and child pornography and its transposition into the Cyprus legal order. The Directive was incorporated in the Cypriot law with the Prevention and Combating of Sexual Abuse, Sexual Exploitation of Children and Child Pornography Law 91(I)/2014, as amended by Law 105(I)/2014 on Legal Aid, aiming at preventing, suppressing and combating crimes of sexual abuse and sexual exploitation of children, child pornography and solicitation of children for sexual purposes.
Źródło:
Journal of Polish Safety and Reliability Association; 2016, 7, 1; 217--224
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Safeguarding critical infrastructures from cyber attacks : A case study for offshore natural gas Assets
Autorzy:
Hadjistassou, C.
Bratskas, R.
Koutras, N.
Kyriakides, A.
Charalambous, E.
Hadjiantonis, A. M.
Powiązania:
https://bibliotekanauki.pl/articles/2069216.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
critical infrastructure
cyber attacks
energy
natural gas
gas hydrates
Opis:
The majority of operations, as well as the physical and chemical processes, which take place on offshore Natural Gas installations are controlled by computer systems. These computer systems are vulnerable to cyber-attacks. If successful, such attacks can have disastrous and far-reaching consequences, including human casualties, large-scale pollution, and immense financial cost. In this paper we identify one possible way that an attacker can inflict material damage, by altering the parameters of the gas hydrate inhibition system. The formation of gas hydrates can completely halt operations for a prolonged period of time, could damage equipment, and directly endanger human lives. To raise the level of protection we propose the implementation of two lines of defense the second based on machine learning algorithms. Appreciating the sophistication of attacks, the inherent risks and complexity of multi-billion offshore energy assets we highlight the need for further research intended to address safety loopholes.
Źródło:
Journal of Polish Safety and Reliability Association; 2015, 6, 1; 115--124
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Procedure based functional safety and information security management of industrial automation and control systems on example of the oil port installations
Autorzy:
Śliwiński, M.
Piesik, E.
Powiązania:
https://bibliotekanauki.pl/articles/2068879.pdf
Data publikacji:
2017
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
functional safety
security
cyber HAZOP
industrial control systems
oil port installations
Opis:
The approach addresses selected technical and organization aspects of risk mitigation in the oil port installations with regard to functional safety and security requirements specified in standards IEC 61508, IEC 61511 and IEC 62443. The procedure for functional safety management includes the hazard identification, risk analysis and assessment, specification of overall safety requirements and definition of safety functions. Based on the risk evaluation results the safety integrity level (SIL) and security assurance level (SAL) will be determined for consecutive safety functions. The proposed approach will be composed of the following items: process and procedure based safety and security management, example of procedure based safety management including insurance, integrated safety and security assessment of industrial control system (ICS) of the oil port pipelines, tanks and critical infrastructure.
Źródło:
Journal of Polish Safety and Reliability Association; 2017, 8, 1; 129--138
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Integrated safety and security analysis of hazardous plants and systems of critical infrastructure
Autorzy:
Kosmowski, K. T.
Śliwiński, M.
Piesik, E.
Powiązania:
https://bibliotekanauki.pl/articles/2069111.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
hazardous plants
critical infrastructure
safety and security
protection systems
cyber security
Opis:
This article addresses an integrated safety and security analysis approach of hazardous industrial plants and systems of critical infrastructure. Nowadays due to new hazards that emerge there are opinions among experts that these issues require an integrated approach in life cycle, from the design concept, through the design and operation of the plant, to its decommissioning. It is proposed to start from an interesting methodology known as the security vulnerability analysis (SVA) developed for hazardous plants of chemical industry. It is based on rings of protection concept to secure widely understood assets. This concept seems to be compatible with layer of protection analysis (LOPA), which is consistent with functional safety concept of the control and protection systems including cyber security aspects. It is outlined how to use these approaches in an integrated way for safety and security analysis of hazardous industrial plants and systems of critical infrastructure.
Źródło:
Journal of Polish Safety and Reliability Association; 2015, 6, 2; 31--46
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Increasing Protection and Resilience of Critical Infrastructures – Current challenges and approaches
Autorzy:
Kozik, R.
Choraś, M.
Hołubowicz, W.
Renk, R.
Powiązania:
https://bibliotekanauki.pl/articles/2069257.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
critical infrastructure protection
simulation
security
cyber security
next generation infrastructures
NGI
Opis:
In this paper we present current key challenges with respect to Critical Infrastructure Protection and to their resiliency. As our world becomes more and more interconnected via open networks with the cyberspace, many new challenges arise. Therefore, we frame the problem within three distinctive domains: real world natural events, human (organisational and legal), and cyber one. Within our analysis we present how current technologies, tools and methodologies can be used to address certain problems within those domains. Moreover, we stress the fact that there is a limited number of initiatives that aim at proposing the holistic (all hazard) approach addressing all the domains at once.
Źródło:
Journal of Polish Safety and Reliability Association; 2015, 6, 3; 79--84
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Integrated approach for functional safety and cyber security management in maritime critical infrastructures
Autorzy:
Śliwiwński, Marcin
Piesik, Emilian
Powiązania:
https://bibliotekanauki.pl/articles/2068695.pdf
Data publikacji:
2019
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
maritime infrastructure
functional safety
cyber security
SIL
SAL
EAL
industrial control systems
Opis:
The work is devoted important issues of the management in maritime critical infrastructure of functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to cyber security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with regard of the evaluation assurance levels (EAL) (ISO/IEC 15408), the security assurance levels (SAL) (IEC 62443), and the number of protection rings described in the Secure Safety (SeSa-SINTEF) methodology. The proposed approach will be composed of the following items: process and procedure based safety and cyber security management, integrated safety and security assessment of industrial control system (ICS) of the maritime critical infrastructure. Proposed methodology is illustrated on case study that based on the part of installation critical maritime infrastructure.
Źródło:
Journal of Polish Safety and Reliability Association; 2019, 10, 1; 137--148
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Functional safety and cyber security analysis for life cycle management of industrial control systems in hazardous plants and oil port critical infrastructure including insurance
Autorzy:
Kosmowski, Kazimierz, T.
Gołębiewski, Dariusz
Powiązania:
https://bibliotekanauki.pl/articles/2068692.pdf
Data publikacji:
2019
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
functional safety
cyber security
hazardous plants
oil port infrastructure
industrial automation
control systems
hazards
threats
vulnerabilities
risk analysis
key performance indicators
integrated safety
security management
business continuity management
insurance
Opis:
This report addresses selected methodological aspects of proactive reliability, functional safety and cyber security management in life cycle of industrial automation and control systems (IACS) in hazardous plants and oil port critical installations based on the analysis of relevant hazards / threats and evaluation of related risks. In addition the insurance company point of view has been also considered, because nowadays the insurer, interested in decreasing risks to be insured, offers the expertise how to limit effectively risks in life cycle from the design conceptual stage of hazardous plant, through its reliable and safe operation, until decommissioning. Therefore, the risk evaluation model for insurance related decision making for the period considered, e.g. one year, should be plant specific with some predictive properties due to changing environment and business conditions, and usually considerable uncertainty involved. The objective is to evaluate and mitigate risks, and control them proactively, through undertaking appropriate activities within a process based management system according to elaborated policy and strategy that includes organisational and technical aspects, including preventive maintenance activities of sensitive equipment and updating in time the training programmes. Careful evaluating and controlling risks is also crucial for the insurance company. Basic activities of the risk engineers and underwriters in the insurance process are outlined in the context of identified hazards/threats and defined factors that significantly influence risks to be considered in evaluating the insurance premium in the context of terms and conditions specified.
Źródło:
Journal of Polish Safety and Reliability Association; 2019, 10, 1; 99--126
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-7 z 7

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies