Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "critical Infrastructure" wg kryterium: Temat


Wyświetlanie 1-5 z 5
Tytuł:
Critical infrastructure in the shaping of national security
Autorzy:
Żaboklicka, Ewa
Powiązania:
https://bibliotekanauki.pl/articles/576139.pdf
Data publikacji:
2020-03-17
Wydawca:
Akademia Sztuki Wojennej
Tematy:
critical infrastructure
crisis management
national security
Opis:
Critical infrastructure plays a key role in ensuring national security of a state, due to important functions thereof in military, economic, and public administration sectors. The destruction, damage, failure or other deprivation of critical infrastructure of its operational capabilities constitutes a direct threat to the structural and personal security of the state. The research methods and techniques implemented in the research process itself primarily hinge on critical analysis of acts of law and organisational and competence-related documents, subject-matter literature, synthesis and inference in order to reach the formulated objectives based on efficiency criteria. The main findings indicate that critical infrastructure is perceived as a set of systems which exerts a substantial impact on the security of the state and, obviously its residents. The results advocate for a reflection that critical infrastructure embraces a number of facilities which appear to be remarkably diverse. They are buildings, structures, installations, equipment and services which, integrally, form cohesive systems which allow proper functioning of a given state. It is the state whose role is just to supervise and coordinate whereas the operators of critical infrastructure are the ones who are to protect it. The overall findings of this paper present the notion that safeguarding critical infrastructure is a task of crucial importance to national security of a state and, therefore, it would be worth reconsidering the intensification of rules which apply to the infrastructure of the national security and its efficient functioning.
Źródło:
Security and Defence Quarterly; 2020, 28, 1; 70-81
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Critical infrastructure security in Poland and the surrounding area. Legislation analysis.
Autorzy:
Grzywna, Zbigniew
Powiązania:
https://bibliotekanauki.pl/articles/576405.pdf
Data publikacji:
2014-03-31
Wydawca:
Akademia Sztuki Wojennej
Tematy:
Management safety
critical situation
critical infrastructure
public
administration
Opis:
The Critical Management Act creates a legal basis for dealing with critical infrastructure. It contains the following definition: critical infrastructure includes systems and functional objects which are connected with each other, including: buildings, devices, systems, key services for a country and its citizens’ security and other systems and objects which deal with ensuring efficient functioning of public administration bodies as well as institutions and enterprises. At national level, the protection of critical infrastructure is coordinated by the Government Centre for Security. In accordance with the critical management act, which is in effect at present, the legislator defines that critical infrastructure is created by systems and consists of functional objects connected with each other: buildings, devices, systems, key services for a country’s security and its citizens’ security and other objects and services which deal with ensuring efficient functioning of public administration bodies as well as institutions and enterprises The article contains an enumeration of the systems which are included in critical infrastructure.
Źródło:
Security and Defence Quarterly; 2014, 2, 1; 155-172
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Vulnerability analysis in critical infrastructures: A methodology
Autorzy:
Ferreira, António
Powiązania:
https://bibliotekanauki.pl/articles/576131.pdf
Data publikacji:
2019-04-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
vulnerability
critical infrastructure
terrorist threat
assessment model
Macbeth
Opis:
Vulnerability assessment is a crucial aspect for the development of methodologies to define the levels of protection in critical infrastructures. Throughout this research, we discussed the concept of vulnerability and methodologies and processes for its assessment in critical infrastructures due to a terrorist threat. The research focused on the development of an analysis model, exploring a multi-criteria decision method, in order to limit the risks to the maximum extent possible. Through a qualitative research methodology, in which we applied an analysis model based on the Threat and Infrastructure dimensions and their respective factors, we verified that the vulnerability of a critical infrastructure consists in the probability of the success of an attack, conducted by a threat - properly identified, characterised, analysed and categorised - against an infrastructure with certain characteristics, which value is defined by the user and aggressor’s point of view. The construction of an algorithmic model for vulnerability assessment, complemented by tools to support the calculations and records, allows, through a rational, scientific and algebraic process, a qualitative analysis of factors to be transformed into measurable and quantifiable values, whose algebraic operation integrates them into a final result that expresses, as a percentage, the degree of vulnerability of a critical infrastructure facing a terrorist threat.
Źródło:
Security and Defence Quarterly; 2019, 24, 2; 65-86
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Unmanned aerial vehicles in the protection of the elements of a country’s critical infrastructure – selected directions of development
Autorzy:
Bielawski, Radosław
Rządkowski, Witold
Perz, Rafał
Powiązania:
https://bibliotekanauki.pl/articles/576505.pdf
Data publikacji:
2018-12-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
security
critical infrastructure
unmanned aerial system/vehicle (UAS/UAV)
programme “Świerszcz” [English: “Cricket”]
Opis:
This paper explores the directions for the application of unmanned aerial vehicles in the provision of security to vital elements of a country’s critical infrastructure. The analysis focuses on two paths of development: the first one refers to the transportation system, the latter is related to the gas supply network – the basic components of a country’s critical infrastructure. The first section of this paper will examine the current state of knowledge in the field, and is designed as a reference of terminology pertaining to unmanned aerial vehicles (definitions and classification). The section shall furthermore provide a basis for and a contribution to the developed conceptual-semantic framework for UAV research. The first direction of development is described in terms of the characteristics and assumptions of the system; this includes an overview of the specific requirements of the unmanned platform itself, as well as the elements of the system, such as a local monitoring centre and other components. Furthermore, this section provides the overview of the designated mobile application, whose development is expected to improve the efficiency of system operation, which is a conceptual novelty considering similar developments. The second direction concerns the development of an unmanned system of production, storage, and use of chemical and radioactive substances, including pipelines for hazardous substances. The programme that fits perfectly in the framework of the second considered branch of development is “Cricket” [Polish: “Świerszcz”] – a programme implemented in the periodic inspection of gas supply infrastructure. The description of the programme in question included specifying the technical and operational requirements for the fight devices as well as for the equipment.
Źródło:
Security and Defence Quarterly; 2018, 22, 5; 3-19
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Selected models of information warfare in cyberspace
Autorzy:
Bielawski, Radosław
Radomska, Aleksandra
Powiązania:
https://bibliotekanauki.pl/articles/576343.pdf
Data publikacji:
2017-03-21
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyberspace
information models
national security
military system
critical
infrastructure
Opis:
One form of activity in cyberspace is the information battle. One of the proposed definitions will define it as a negative co–operation in the sphere of information acquisition, information distortion and information defense, where each side of the action is subordinated to the antagonistic side of the other. It leads to the achievement of political objectives and is aimed at overthrowing the systems of the state responsible for the state of its security. It is important that this condition is at a high, or at least acceptable, level. To ensure this level, it is important to define cybersecurity fighting models that are adequate for the threats and to determine their impact on the level of national security risk in cyberspace. Literature on the subject contains many models of cyberwarfare information that have been shaped in recent years. However, there is no assessment of the adequacy of these models for the risks and risks associated with national security threats. It should be noted that information security itself, as part of national security, is variable. New threats are emerging and, at a very high rate and with high activity in cyberspace, they are capable of destabilising the security of key state administration bodies, military facilities and other important state– run infrastructures. It should be emphasised that existing cyberspace fighting information models are not universal and cannot be used for any type of threat to national security. They need to find, organise and evaluate those that would be the most appropriate not only for national security threats but also for geopolitical determinants. Assumptions for the research and its results are a noticeable increase in the number of cyberattacks, some of which are important from the point of view of national security – the military system and critical infrastructure elements of the state. The following subject of the research was adopted in the article – models of information fight, related to threats to national security coming from / to cyberspace. The purpose of scientific research is to define models of information combat and to determine the suitability and evaluation of these models for the purpose of evaluating the risks of national security threats. Identifying the subject and objectives of the research led to a general research question: What appropriate models of information fight in cyberspace can be defined and used for the risks of national security threats? The research method applied theoretical methods (analysis, synthesis, generalisation, abstraction, inference, analogy and comparison) as well as the empirical method of dialogue and the method of participant observation.
Źródło:
Security and Defence Quarterly; 2017, 14, 1; 35-50
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-5 z 5

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies