Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "critical Infrastructure" wg kryterium: Temat


Wyświetlanie 1-9 z 9
Tytuł:
Pełnomocnik do spraw ochrony infrastruktury krytycznej. Wybrane zagadnienia
Autorzy:
Brzozowski, Mariusz
Powiązania:
https://bibliotekanauki.pl/articles/20311665.pdf
Data publikacji:
2023-10-31
Wydawca:
Akademia Sztuki Wojennej
Tematy:
critical infrastructure (CI)
threat
protection of critical infrastructure items
plenipotentiary for critical infrastructure
crisis management
The National Programme
for Critical Infrastructure Protection
Opis:
Critical infrastructure determines the survival and well-being of all citizens. The main purpose of its protection is to maintain the continuity of providing key services for the state. The mission and responsibility of CI participants, coordination of activities are very important things. Understanding this is the basis for the effectiveness and sustainability of this system. CI operators are people with the best knowledge about the specifics and functioning of critical infrastructure items (facility/installation/device/service). They also have the conditions to eliminate threats and reduce their negative effects. In this article provides space for entities designated to protect CI, i.e. the person responsible for maintaining contacts and the plenipotentiary for critical infrastructure.
Źródło:
Cybersecurity and Law; 2023, 10, 2; 106-122
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Identyfikacja infrastruktury krytycznej i jej zagrożeń
Identification of critical infrastructure and its threats
Autorzy:
Milewski, J.
Powiązania:
https://bibliotekanauki.pl/articles/119867.pdf
Data publikacji:
2016
Wydawca:
Akademia Sztuki Wojennej
Tematy:
infrastruktura krytyczna
zagrożenia infrastruktury krytycznej
critical infrastructure
critical infrastructure threats
Opis:
Infrastruktura krytyczna, definiowana jako urządzenia, instytucje usługowe, a także inne dziedziny, które mają istotny wpływ na poczucie bezpieczeństwa obywateli i sprawne funkcjonowanie gospodarki państwa, nabrała nowego znaczenia na przestrzeni ostatnich lat. Doświadczenia ostatnich konfliktów zbrojnych i ataków terrorystycznych oraz analiza zdarzeń wywołanych przez siły natury wskazują jednoznacznie, że zakłócenie prawidłowego działania poszczególnych elementów infrastruktury krytycznej może mieć znaczący, negatywny wpływ na jej funkcjonowanie jako systemu. Szeroki zakres potencjalnych, ewoluujących zagrożeń wymusza szukanie nowych i skutecznych rozwiązań jej ochrony.
The significance of critical infrastructure, which is defined as devices, service institutions, as well as other areas that have a pertinent meaning on the sense of security of the citizens and the efficient functioning of the national economy, has gained new importance in recent years. The lessons learned from recent military conflicts and terrorist attacks, as well as analysis of events caused by natural disasters clearly demonstrate that disruption of the regular functioning of the individual elements of critical infrastructure might have a negative impact on its functioning as a single system. A wide spectrum of possible evaluating threats trigger development of new and effective solutions for protecting the critical infrastructure.
Źródło:
Zeszyty Naukowe AON; 2016, 4(105); 99-115
0867-2245
Pojawia się w:
Zeszyty Naukowe AON
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Security Threats to Port Critical Infrastructure
Autorzy:
Żywucka-Kozłowska, Elżbieta
Broniecka, Rossana
Powiązania:
https://bibliotekanauki.pl/articles/31342014.pdf
Data publikacji:
2024-05-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
critical infrastructure
threat
security
seaport
Opis:
Critical infrastructure is a key element of the functional security of any country. Sea ports (but also river ports) are part of the CI system of the country. The security of such sites is particularly important for the continuity of supply and transit of goods transported by vessels. Ports have always been protected from potential threats. Today, these threats have become more real, particularly as a result of the Russian Federation’s attack on Ukraine. Poland, which today has the status of a frontier state, is a target of espionage and sabotage activities. Security is a state of non-threat. This is the state to which we aspire in every area of modern life of every society, every country. Seaports, like other places, which are essential (special) for the unimpeded and secure delivery of goods. They’ve always been under special surveillance and special protection. Destruction of the port makes it impossible to transport by sea, which is obvious. Threats to port security come from different sources, but at a time of ongoing war in Ukraine, terrorist attacks come to the fore. It is also necessary to highlight the hybrid actions on the border with Belarus, which affect the state of security. Poland, as a front-line country, is particularly vulnerable to acts of terror, diversion and espionage, which is confirmed by the actions of the special services. Monitoring of seaports is part of the security strategy of the critical infrastructure of these places. The threat of CI ports is real, especially at the present time. This applies in particular to the LNG terminal in Świnoujście, which is regularly visited by ships (gas carriers) supplying raw materials of strategic importance. Violation of security rules (principles) may lead to a threat that cannot be ruled out, however, the most important and dangerous are those that come from the outside and are of an intentional nature.
Źródło:
Cybersecurity and Law; 2024, 12, 2; 273-281
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Critical infrastructure in the shaping of national security
Autorzy:
Żaboklicka, Ewa
Powiązania:
https://bibliotekanauki.pl/articles/576139.pdf
Data publikacji:
2020-03-17
Wydawca:
Akademia Sztuki Wojennej
Tematy:
critical infrastructure
crisis management
national security
Opis:
Critical infrastructure plays a key role in ensuring national security of a state, due to important functions thereof in military, economic, and public administration sectors. The destruction, damage, failure or other deprivation of critical infrastructure of its operational capabilities constitutes a direct threat to the structural and personal security of the state. The research methods and techniques implemented in the research process itself primarily hinge on critical analysis of acts of law and organisational and competence-related documents, subject-matter literature, synthesis and inference in order to reach the formulated objectives based on efficiency criteria. The main findings indicate that critical infrastructure is perceived as a set of systems which exerts a substantial impact on the security of the state and, obviously its residents. The results advocate for a reflection that critical infrastructure embraces a number of facilities which appear to be remarkably diverse. They are buildings, structures, installations, equipment and services which, integrally, form cohesive systems which allow proper functioning of a given state. It is the state whose role is just to supervise and coordinate whereas the operators of critical infrastructure are the ones who are to protect it. The overall findings of this paper present the notion that safeguarding critical infrastructure is a task of crucial importance to national security of a state and, therefore, it would be worth reconsidering the intensification of rules which apply to the infrastructure of the national security and its efficient functioning.
Źródło:
Security and Defence Quarterly; 2020, 28, 1; 70-81
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Critical infrastructure security in Poland and the surrounding area. Legislation analysis.
Autorzy:
Grzywna, Zbigniew
Powiązania:
https://bibliotekanauki.pl/articles/576405.pdf
Data publikacji:
2014-03-31
Wydawca:
Akademia Sztuki Wojennej
Tematy:
Management safety
critical situation
critical infrastructure
public
administration
Opis:
The Critical Management Act creates a legal basis for dealing with critical infrastructure. It contains the following definition: critical infrastructure includes systems and functional objects which are connected with each other, including: buildings, devices, systems, key services for a country and its citizens’ security and other systems and objects which deal with ensuring efficient functioning of public administration bodies as well as institutions and enterprises. At national level, the protection of critical infrastructure is coordinated by the Government Centre for Security. In accordance with the critical management act, which is in effect at present, the legislator defines that critical infrastructure is created by systems and consists of functional objects connected with each other: buildings, devices, systems, key services for a country’s security and its citizens’ security and other objects and services which deal with ensuring efficient functioning of public administration bodies as well as institutions and enterprises The article contains an enumeration of the systems which are included in critical infrastructure.
Źródło:
Security and Defence Quarterly; 2014, 2, 1; 155-172
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Vulnerability analysis in critical infrastructures: A methodology
Autorzy:
Ferreira, António
Powiązania:
https://bibliotekanauki.pl/articles/576131.pdf
Data publikacji:
2019-04-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
vulnerability
critical infrastructure
terrorist threat
assessment model
Macbeth
Opis:
Vulnerability assessment is a crucial aspect for the development of methodologies to define the levels of protection in critical infrastructures. Throughout this research, we discussed the concept of vulnerability and methodologies and processes for its assessment in critical infrastructures due to a terrorist threat. The research focused on the development of an analysis model, exploring a multi-criteria decision method, in order to limit the risks to the maximum extent possible. Through a qualitative research methodology, in which we applied an analysis model based on the Threat and Infrastructure dimensions and their respective factors, we verified that the vulnerability of a critical infrastructure consists in the probability of the success of an attack, conducted by a threat - properly identified, characterised, analysed and categorised - against an infrastructure with certain characteristics, which value is defined by the user and aggressor’s point of view. The construction of an algorithmic model for vulnerability assessment, complemented by tools to support the calculations and records, allows, through a rational, scientific and algebraic process, a qualitative analysis of factors to be transformed into measurable and quantifiable values, whose algebraic operation integrates them into a final result that expresses, as a percentage, the degree of vulnerability of a critical infrastructure facing a terrorist threat.
Źródło:
Security and Defence Quarterly; 2019, 24, 2; 65-86
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyber Security of Electrical Grids – A Contribution to Research
Autorzy:
Włodyka, Ewa Maria
Kaczmarek, Krzysztof
Powiązania:
https://bibliotekanauki.pl/articles/31342016.pdf
Data publikacji:
2024-05-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
electrical grids
public administration
cyber security
critical infrastructure
Opis:
The state’s critical infrastructure involves those elements that function independently yet are interconnected. It is also affected by ICT networks that exist in other states. These interdependencies make critical infrastructure particularly vulnerable to cyber attacks. At the same time, it is electrical grids that constitute the most crucial element of critical infrastructure. The research hypothesis assumes an urgent need to comprehensively address the cyber security policy of electrical grids in a broader perspective, not only the technical one but also taking into account public policies and the human factor. Quantitative and qualitative methods, literature survey and the desk research method were employed in order to verify this hypothesis. The analyses carried out by the Authors indicated unequivocally that electrical grids constitute an element of the critical infrastructure that is the most vulnerable to cyber threats.
Źródło:
Cybersecurity and Law; 2024, 12, 2; 260-272
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Unmanned aerial vehicles in the protection of the elements of a country’s critical infrastructure – selected directions of development
Autorzy:
Bielawski, Radosław
Rządkowski, Witold
Perz, Rafał
Powiązania:
https://bibliotekanauki.pl/articles/576505.pdf
Data publikacji:
2018-12-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
security
critical infrastructure
unmanned aerial system/vehicle (UAS/UAV)
programme “Świerszcz” [English: “Cricket”]
Opis:
This paper explores the directions for the application of unmanned aerial vehicles in the provision of security to vital elements of a country’s critical infrastructure. The analysis focuses on two paths of development: the first one refers to the transportation system, the latter is related to the gas supply network – the basic components of a country’s critical infrastructure. The first section of this paper will examine the current state of knowledge in the field, and is designed as a reference of terminology pertaining to unmanned aerial vehicles (definitions and classification). The section shall furthermore provide a basis for and a contribution to the developed conceptual-semantic framework for UAV research. The first direction of development is described in terms of the characteristics and assumptions of the system; this includes an overview of the specific requirements of the unmanned platform itself, as well as the elements of the system, such as a local monitoring centre and other components. Furthermore, this section provides the overview of the designated mobile application, whose development is expected to improve the efficiency of system operation, which is a conceptual novelty considering similar developments. The second direction concerns the development of an unmanned system of production, storage, and use of chemical and radioactive substances, including pipelines for hazardous substances. The programme that fits perfectly in the framework of the second considered branch of development is “Cricket” [Polish: “Świerszcz”] – a programme implemented in the periodic inspection of gas supply infrastructure. The description of the programme in question included specifying the technical and operational requirements for the fight devices as well as for the equipment.
Źródło:
Security and Defence Quarterly; 2018, 22, 5; 3-19
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Selected models of information warfare in cyberspace
Autorzy:
Bielawski, Radosław
Radomska, Aleksandra
Powiązania:
https://bibliotekanauki.pl/articles/576343.pdf
Data publikacji:
2017-03-21
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyberspace
information models
national security
military system
critical
infrastructure
Opis:
One form of activity in cyberspace is the information battle. One of the proposed definitions will define it as a negative co–operation in the sphere of information acquisition, information distortion and information defense, where each side of the action is subordinated to the antagonistic side of the other. It leads to the achievement of political objectives and is aimed at overthrowing the systems of the state responsible for the state of its security. It is important that this condition is at a high, or at least acceptable, level. To ensure this level, it is important to define cybersecurity fighting models that are adequate for the threats and to determine their impact on the level of national security risk in cyberspace. Literature on the subject contains many models of cyberwarfare information that have been shaped in recent years. However, there is no assessment of the adequacy of these models for the risks and risks associated with national security threats. It should be noted that information security itself, as part of national security, is variable. New threats are emerging and, at a very high rate and with high activity in cyberspace, they are capable of destabilising the security of key state administration bodies, military facilities and other important state– run infrastructures. It should be emphasised that existing cyberspace fighting information models are not universal and cannot be used for any type of threat to national security. They need to find, organise and evaluate those that would be the most appropriate not only for national security threats but also for geopolitical determinants. Assumptions for the research and its results are a noticeable increase in the number of cyberattacks, some of which are important from the point of view of national security – the military system and critical infrastructure elements of the state. The following subject of the research was adopted in the article – models of information fight, related to threats to national security coming from / to cyberspace. The purpose of scientific research is to define models of information combat and to determine the suitability and evaluation of these models for the purpose of evaluating the risks of national security threats. Identifying the subject and objectives of the research led to a general research question: What appropriate models of information fight in cyberspace can be defined and used for the risks of national security threats? The research method applied theoretical methods (analysis, synthesis, generalisation, abstraction, inference, analogy and comparison) as well as the empirical method of dialogue and the method of participant observation.
Źródło:
Security and Defence Quarterly; 2017, 14, 1; 35-50
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-9 z 9

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies