Matches in SemOpenAlex for { <https://semopenalex.org/work/W3119634295> ?p ?o ?g. }
Showing items 1 to 95 of
95
with 100 items per page.
- W3119634295 abstract "States, organizations and individuals are becoming targets of both individual and state-sponsored cyber-attacks, by those who recognize the impact of disrupting security systems and effect to people and governments. The energy sector is seen as one of the main targets of cyber-attacks against critical infrastructure, but transport, public sector services, telecommunications and critical (manufacturing) industries are also very vulnerable. One of most used example of cyber-attack is the Ukraine power grid attack in 2015 that left 230,000 people without power for up to 6 hours. Another most high profile example of a cyber-attack against critical infrastructure is the Stuxnet computer virus (first used on Iranian nuclear facility) which could be adapted to attack the SCADA systems (industrial control systems) used by many critical infrastructures in Europe.Wide range of critical infrastructure sectors are reliant on industrial control systems for monitoring processes and controlling physical devices (sensors, pumps, etc.) and for that reason, physical connected devices that support industrial processes are becoming more vulnerable. Not all critical infrastructure operators in all sectors are adequately prepared to manage protection (and raise resilience) effectively across both cyber and physical environments. Additionally there are few challenges in implementation of protection measures, such as lack of collaboration between private and public sector and low levels of awareness on existence of national key legislation.From supranational aspect, in relation to this papers topic, the European Union has took first step in defense to cyber threats in 2016 with „Directive on security of network and information systems“ (NIS Directive) by prescribing member states to adopt more rigid cyber-security standards. The aim of directive is to improve the deterrent and increase the EU’s defenses and reactions to cyber attacks by expanding the cyber security capacity, increasing collaboration at an EU level and introducing measures to prevent risk and handle cyber incidents. There are lot of other „supporting tools“ for Member States countries, such as European Union Agency for Network and Information Security – ENISA (which organize regular cyber security exercises at an EU level, including a large and comprehensive exercise every two years, raising preparedness of EU states); Network of National Coordination Centers and the European Cybersecurity Industrial, Technology and Research Competence Centre; and Coordinated response to major cyber security incidents and crises (Blueprint) with aim to ensure a rapid and coordinated response to large-scale cyber attacks by setting out suitable processes within the EU.Yet, not all Member States share the same capacities for achieving the highest level of cyber-security. They need to continuously work on enhancing the capability of defense against cyber threats as increased risk to state institutions information and communication systems but also the critical infrastructure objects. In Southeast Europe there are few additional challenges – some countries even don't have designated critical infrastructures (lower level of protection; lack of „clear vision“ of criticality) and critical infrastructures are only perceived through physical prism; non-EU countries are not obligated to follow requirements of European Union and its legislation, and there are interdependencies and transboundary cross-sector effects that needs to be taken in consideration. Critical infrastructure Protection (CIP) is the primary area of action, and for some of SEE countries (like the Republic of Croatia) the implementation of cyber security provisions just complements comprehensive activities which are focused on physical protection.This paper will analyze few segments of how SEE countries cope with new security challenges and on which level are they prepared for cyber-attacks and threats: 1. Which security mechanisms they use; 2. The existing legislation (Acts, Strategies, Plan of Action, etc.) related to cyber threats in correlation with strategic critical infrastructure protection documents. Analysis will have two perspectives: from EU member states and from non-EU member states point of view. Additionally, for EU member states it will be analyzed if there were any cyber security legislation before NIS directive that meets same aims. The aim of research is to have an overall picture of efforts in region regarding cyber-security as possibility for improvement thorough cooperation, organizational measures, etc. providing also some recommendations to reduce the gap in the level of cyber-security development with other regions of EU." @default.
- W3119634295 created "2021-01-18" @default.
- W3119634295 creator A5090139275 @default.
- W3119634295 date "2020-11-17" @default.
- W3119634295 modified "2023-09-30" @default.
- W3119634295 title "Beyond Physical Threats: Cyber-attacks on Critical Infrastructure as a Challenge of Changing Security Environment – Overview of Cyber-security legislation and implementation in SEE Countries" @default.
- W3119634295 doi "https://doi.org/10.51381/adrs.v3i1.45" @default.
- W3119634295 hasPublicationYear "2020" @default.
- W3119634295 type Work @default.
- W3119634295 sameAs 3119634295 @default.
- W3119634295 citedByCount "1" @default.
- W3119634295 countsByYear W31196342952023 @default.
- W3119634295 crossrefType "journal-article" @default.
- W3119634295 hasAuthorship W3119634295A5090139275 @default.
- W3119634295 hasBestOaLocation W31196342951 @default.
- W3119634295 hasConcept C111919701 @default.
- W3119634295 hasConcept C113863187 @default.
- W3119634295 hasConcept C117110713 @default.
- W3119634295 hasConcept C119599485 @default.
- W3119634295 hasConcept C121332964 @default.
- W3119634295 hasConcept C121426985 @default.
- W3119634295 hasConcept C127413603 @default.
- W3119634295 hasConcept C144133560 @default.
- W3119634295 hasConcept C154945302 @default.
- W3119634295 hasConcept C155202549 @default.
- W3119634295 hasConcept C172862783 @default.
- W3119634295 hasConcept C17744445 @default.
- W3119634295 hasConcept C179768478 @default.
- W3119634295 hasConcept C199360897 @default.
- W3119634295 hasConcept C199539241 @default.
- W3119634295 hasConcept C201307755 @default.
- W3119634295 hasConcept C2775924081 @default.
- W3119634295 hasConcept C2777351106 @default.
- W3119634295 hasConcept C2779033394 @default.
- W3119634295 hasConcept C2779547435 @default.
- W3119634295 hasConcept C2779585090 @default.
- W3119634295 hasConcept C2910001868 @default.
- W3119634295 hasConcept C29852176 @default.
- W3119634295 hasConcept C29983905 @default.
- W3119634295 hasConcept C38652104 @default.
- W3119634295 hasConcept C40071531 @default.
- W3119634295 hasConcept C41008148 @default.
- W3119634295 hasConcept C527648132 @default.
- W3119634295 hasConcept C95713431 @default.
- W3119634295 hasConcept C97355855 @default.
- W3119634295 hasConceptScore W3119634295C111919701 @default.
- W3119634295 hasConceptScore W3119634295C113863187 @default.
- W3119634295 hasConceptScore W3119634295C117110713 @default.
- W3119634295 hasConceptScore W3119634295C119599485 @default.
- W3119634295 hasConceptScore W3119634295C121332964 @default.
- W3119634295 hasConceptScore W3119634295C121426985 @default.
- W3119634295 hasConceptScore W3119634295C127413603 @default.
- W3119634295 hasConceptScore W3119634295C144133560 @default.
- W3119634295 hasConceptScore W3119634295C154945302 @default.
- W3119634295 hasConceptScore W3119634295C155202549 @default.
- W3119634295 hasConceptScore W3119634295C172862783 @default.
- W3119634295 hasConceptScore W3119634295C17744445 @default.
- W3119634295 hasConceptScore W3119634295C179768478 @default.
- W3119634295 hasConceptScore W3119634295C199360897 @default.
- W3119634295 hasConceptScore W3119634295C199539241 @default.
- W3119634295 hasConceptScore W3119634295C201307755 @default.
- W3119634295 hasConceptScore W3119634295C2775924081 @default.
- W3119634295 hasConceptScore W3119634295C2777351106 @default.
- W3119634295 hasConceptScore W3119634295C2779033394 @default.
- W3119634295 hasConceptScore W3119634295C2779547435 @default.
- W3119634295 hasConceptScore W3119634295C2779585090 @default.
- W3119634295 hasConceptScore W3119634295C2910001868 @default.
- W3119634295 hasConceptScore W3119634295C29852176 @default.
- W3119634295 hasConceptScore W3119634295C29983905 @default.
- W3119634295 hasConceptScore W3119634295C38652104 @default.
- W3119634295 hasConceptScore W3119634295C40071531 @default.
- W3119634295 hasConceptScore W3119634295C41008148 @default.
- W3119634295 hasConceptScore W3119634295C527648132 @default.
- W3119634295 hasConceptScore W3119634295C95713431 @default.
- W3119634295 hasConceptScore W3119634295C97355855 @default.
- W3119634295 hasIssue "1" @default.
- W3119634295 hasLocation W31196342951 @default.
- W3119634295 hasLocation W31196342952 @default.
- W3119634295 hasOpenAccess W3119634295 @default.
- W3119634295 hasPrimaryLocation W31196342951 @default.
- W3119634295 hasRelatedWork W1994763079 @default.
- W3119634295 hasRelatedWork W2012446724 @default.
- W3119634295 hasRelatedWork W2234171383 @default.
- W3119634295 hasRelatedWork W2336312021 @default.
- W3119634295 hasRelatedWork W2765675638 @default.
- W3119634295 hasRelatedWork W2792281434 @default.
- W3119634295 hasRelatedWork W2893477953 @default.
- W3119634295 hasRelatedWork W3042199248 @default.
- W3119634295 hasRelatedWork W3119634295 @default.
- W3119634295 hasRelatedWork W4308935387 @default.
- W3119634295 hasVolume "3" @default.
- W3119634295 isParatext "false" @default.
- W3119634295 isRetracted "false" @default.
- W3119634295 magId "3119634295" @default.
- W3119634295 workType "article" @default.