PROBLEMS OF PROTECTING CRITICALLY IMPORTANT INFRASTRUCTURE OBJECTS
DOI:
https://doi.org/10.17721/10.17721/ISTS.2020.1.31-39Keywords:
national strategy, cybersecurity, cyberterrorism, cyber threat, critical infrastructure facilityAbstract
The paper deals with topical issues related to the protection of critical infrastructure, which depend on the survival of the human community. It is shown that rapid progress in the field of information technology, on the one hand, allows the modern economies of many countries to become inextricably interconnected; interfering with the work of critical infrastructure. The analysis of what are the true causes of such close attention to such objects by cyber terrorists. Top 10 major threats to industrial control systems are presented. The following steps determine the criticality of the infrastructure objects. The following is a list of 11 critical sectors and 37 relevant sub-sectors identified by the European Union. The answer is given to the question with which target countries should develop national strategies for the protection of critical infrastructure objects. A strategy for quantifying the level of security of critical infrastructure against the risk of third-party cybernetic exposure is proposed. The necessity to unite different elements of protection of critical infrastructure objects by states is substantiated. It is important that cybersecurity policies should be central to the protection of critical infrastructure. It is noted that not all national cybersecurity strategies provide the same place and relevance for critical infrastructure. It is noted that when developing a national strategy for the protection of critical infrastructure, it is important to compile a comprehensive list of all relevant national policies. It is concluded that today it is an important tool for the protection of critical infrastructure.Downloads
References
GGE 2015, Report of the Group of Governmental Experts on Information and Telecommunication Events in the Context of International Security, General Assembly, [Online].: https://ccdcoe.org/sites/default/files/documents/U N-150722- GGEReport2015.pdf.
OSCE 2013, Good Practices Guide on NonNuclear Critical Energy Infrastructure Protection (NNCEIP) from Terrorist Attacks Focusing on Threats Emanating from Cyberspace, , 2013, [Online], : www.osce.org/atu/103500?download=true.
Ackerman 2007, Assessing Terrorist Motivation for Attacking Critical Infrastructures, Nonproliferation Research Center, Monterey Institute for International Studies, [Online]. https://e-reports-ext.llnl.gov/pdf/341566.pdf.
Clemente, 2013, Cybersecurity and Global Independence: What is Critical? Chatham House, February 2013, [Online]. www.chathamhouse.org/sites/files/chathamhouse/ pulic/Research/International%20Security/0213pr cvber.pdf.
Council Directive 2008/114 / EC, Life Safety, General Secretariat for Defense and National Security). Article 2.
European Commission 2005, Green Paper on the European Program for the Protection of Critical Infrastructure, COM (2005) 576 total.
RECIPE 2011, Good Practice Guide for PKI Policies and for Politicians in Europe, [Online]. https://Users/SM/Downloads/RECIPE_manual% 20(l).pdf.
Бурячок В.Л., Толюпа С.В., Толубко В.Б., Хорошко В.О. «Інфо-рмаційна та кібербезпека: соціотехнічний аспект» // Навчальний посібник. – К.: Наш формат, 2015. – 288с.
Serhii Toliupa, Hanna Shvedova and Ivan Parkhomenko. Security and Regulatory Aspects of the Critical Infrastructure Objects Functioning and Cyberpower Level Assesment. 3rd IEEE International Conference On Advanced Information and Communication Technologies (AICT) – 2019. Lviv, Ukraine. Scopus/.
Бурячок В.Л. Основи формування державної системи кібернетичної безпеки: Монографія. – К.: НАУ, 2013. – 432 с.
European Commission 2013 bis. Working Paper on a New Approach to the European Critical Infrastructure Protection Program - Building a Safer European Critical Infrastructure, SWD (2013) 318 total/ [Online]. https://ec.europa.eu/energy/sites/ener/files/docum ents/20130828_epcip_commission_staff_working _document.pdf.
The GFCE-MERIDIAN Good Practice Guide on Critical Information Infrastructure Protection for governmental policy-makers, [Online]. https://www.meridianprocess.org/siteassets/merid ian/gfce-meridian-gpg-to-ciip.pdf.
National Cybersecurity Strategies Repository, [Online]. https://www.itu.int/en/ITUD/Cybersecurity/Pages/National-Strategiesrepository.aspx.
