CHARACTERISATION OF METHODS OF PROTECTING THE STATE’S CRITICAL INFRASTRUCTURE FROM TERRORIST ACTIVITIES
DOI:
https://doi.org/10.33042/2522-1809-2024-1-182-202-209Keywords:
critical information infrastructure, protection, terror, security, terrorist emergencyAbstract
The study describes methods for protecting the critical infrastructure of a state. The article aims to determine the combination of protecting methods of the state’s critical infrastructure from terrorist activities, namely security, physical protection, protection of critical infrastructure, protection of critical information infrastructure, and prevention of emergencies of a terrorist nature at objects of critical infrastructure.
It is necessary to fulfil the following objectives to achieve the aim: to consider the difference and interrelation of the concepts of critical infrastructure and information critical infrastructure; to characterise the general properties of various terms, in particular: security, physical protection, protection of critical infrastructure, protection of information critical infrastructure, prevention of terrorist emergencies at objects of critical infrastructure; to analyse from the scientific point of view the classical definitions of forms and methods of critical infrastructure protection; to propose a generalised structure of information and technical methods of critical infrastructure protection; to determine the possibility of using information and technical methods in various fields of knowledge to protect the state’s critical infrastructure from terrorist influence.
In summary, the structure of information and technical methods for critical infrastructure protection consists of three components: a mathematical model that describes the process occurring at critical infrastructure, a control algorithm that implements the mathematical model, and procedures that indicate the order of actions for applying the method.
The problem of protecting critical infrastructure from terrorist activities requires technical, legal, military, psychological, medical, chemical, biological, and other sciences to address it. Each type of science will use its specific methods to solve practical problems of preventing terrorist emergencies at critical infrastructure. For technical sciences, there will be information-technical, engineering-technical, operational-technical, organisational-technical, biotechnical, and other methods to prevent emergencies of a terroristic nature that need development shortly.
References
Zelenskyi, V. (2023, January 19). The key task of our state and our partners is to intensify Russia’s feeling that it will not achieve anything in Ukraine – address by President Volodymyr Zelenskyy. President of Ukraine. Official website. https://www.president.gov.ua/en/news/klyuchove-zavdannya-nashoyi-derzhavi-ta-nashih-partneriv-pos-80501
Diviziniuk, M. M., Yeremenko, S. A., Lievtierov, O. A., Pruskyi, A. V., Strilets, V. V., Strilets, V. M., & Shevchenko, R. I. (2022). Theoretical Foundations of the “Civil Defence” Paradigm: monograph. TOV “AZYMUT-PRINT” [in Ukrainian]
Hofreiter, L. (2014). Critical infrastructure – content, structure and problems of its protection. Securitologia, (1(19), 141–152. https://civitas.edu.pl/wp-content/uploads/2015/03/Securitologia1_19_2014_141-152.pdf
Hofreiter, L., Boc, K., Jangl, Š., Loveček, T., Mach, V., Seidl, M., Selinger, P., & Veľas, A. (2013). Protection of critical transport infrastructure objects. EDIS [in Slovak]
Poroshenko, P. (2017, January 16). On the Decision of the National Security and Defence Council of Ukraine of 29 December 2016 “On Improving Measures to Ensure the Protection of Critical Infrastructure Objects”: Decree of the President of Ukraine of 16 January 2017 No. 8/2017. President of Ukraine. Official website. https://www.president.gov.ua/documents/82017-21058 [in Ukrainian]
Verkhovna Rada of Ukraine. (2024, January 1). On Critical Infrastructure: Law of Ukraine of 16 November 2021 No. 1882-IX. https://zakon.rada.gov.ua/laws/show/1882-20#Text [in Ukrainian]
Azarenko, O. V., Honcharenko, Yu. Yu., Diviziniuk, M. M., & Ozhyhanova, M. I. (2018). Protecting the state’s critical infrastructure from terrorist influence. SI “IEG NAS of Ukraine”.
Verkhovna Rada of Ukraine. (2024, January 1). On Extremely Dangerous Objects: Law of Ukraine of 18 January 2001 No. 2245-III. https://zakon.rada.gov.ua/laws/show/2245-14#Text [in Ukrainian]
Critical Infrastructure Objects. (2023, January 26). In Wikipedia. https://uk.wikipedia.org/w/index.php?title=Об'єкти_критичної_інфраструктури&oldid=38146098 [in Ukrainian]
Leonenko, H., & Yudin, O. (2013). Problems of ensuring information security of Ukraine critical information infrastructure systems. Collection “Information Technology and Security”, 2(1), 44–48. https://doi.org/10.20535/2411-1031.2013.2.1.58384
Safety. (2024, January 19). In Wikipedia. https://uk.wikipedia.org/w/index.php?title=Безпека&oldid=41465005 [in Ukrainian]
Franchuk, V. I., Pryhunov, V. Ya., & Melnyk, S. I. (2021). Safety of Critical Infrastructure Facilities in Ukraine: Organizational and Regulatory Problems and Approaches. Social and Legal Studios, 3(13), 142–148. https://doi.org/10.32518/2617-4162-2021-3-142-148 [in Ukrainian]
Verkhovna Rada of Ukraine. (2022, October 16). On the Physical Protection of Nuclear Facilities, Nuclear Materials, Radioactive Waste, and Other Sources of Ionising Radiation: Law of Ukraine of 19 October 2000 No. 2064-III. https://zakon.rada.gov.ua/laws/show/2064-14#Text [in Ukrainian]
Protection. (2023, December 6). In Wikipedia. https://uk.wikipedia.org/w/index.php?title=Захист&oldid=41085300 [in Ukrainian]
Cabinet of Ministers of Ukraine. (2019, May 27). On Critical Infrastructure and its Protection: Draft Law of Ukraine of 27 May 2019 No. 10328. Verkhovna Rada of Ukraine. http://w1.c1.rada.gov.ua/pls/zweb2/webproc4_1?pf3511=65996 [in Ukrainian]
Bonk, A. (2019, November 10). Protecting critical infrastructure: the US experience. IGS Ukraine. https://ig-security.tech/zahist-kritichnoi-infrastrukturi-dosvid-ssha.html [in Ukrainian]
Cabinet of Ministers of Ukraine. (2022, September 7). On Approval of the General Requirements for Cyber Defence of Critical Infrastructure Objects: Resolution of the Cabinet of Ministers of Ukraine of 19 June 2019 No. 518. Verkhovna Rada of Ukraine. https://zakon.rada.gov.ua/laws/show/518-2019-%D0%BF#Text [in Ukrainian]
Ibrahimbegovic, A., Boulkertous, A., Davenne, L., Muhasilovic, M., Duhovnik, J., & Pokrklic, A. (2009). Fire Induced Damage in Structures and Infrastructure: Analysis, Testing and Modeling. In A. Ibrahimbegovic, & M. Zlatar (Eds.), Damage Assessment and Reconstruction after War or Natural Disaster (pp. 309–329). Springer Science + Business Media B. V. http://doi.org/10.1007/978-90-481-2386-5_12
Methodology. (2023, October 5). In Wikipedia. https://uk.wikipedia.org/w/index.php?title=Методологія&oldid=40569721 [in Ukrainian]
Method. (2023, December 29). In Wikipedia. https://uk.wikipedia.org/w/index.php?title=Метод&oldid=41315693 [in Ukrainian]
Papalou, A., & Baros, D. K. (2019). Assessing Structural Damage after a Severe Wildfire: A Case Study. Buildings, 9(7), 171. http://doi.org/10.3390/buildings9070171
Jakubowski, K., Paś, J., Duer, S., & Bugaj, J. (2021). Operational Analysis of Fire Alarm Systems with a Focused, Dispersed and Mixed Structure in Critical Infrastructure Buildings. Energies, 14(23), 7893. http://doi.org/10.3390/en14237893
Aliş, B., Yazici, C., & Özkal, F. M. (2022). Investigation of Fire Effects on Reinforced Concrete Members via Finite Element Analysis. ACS Omega, 7(30), 26881–26893. http://doi.org/10.1021/acsomega.2c03414
Mathematical model. (2024, April 6). In Wikipedia. https://uk.wikipedia.org/w/index.php?title=Математична_модель&oldid=42270203 [in Ukrainian]
Downloads
Published
How to Cite
Issue
Section
License
The authors who publish in this collection agree with the following terms:
• The authors reserve the right to authorship of their work and give the magazine the right to first publish this work under the terms of license CC BY-NC-ND 4.0 (with the Designation of Authorship - Non-Commercial - Without Derivatives 4.0 International), which allows others to freely distribute the published work with a mandatory reference to the authors of the original work and the first publication of the work in this magazine.
• Authors have the right to make independent extra-exclusive work agreements in the form in which they were published by this magazine (for example, posting work in an electronic repository of an institution or publishing as part of a monograph), provided that the link to the first publication of the work in this journal is maintained. .
• Journal policy allows and encourages the publication of manuscripts on the Internet (for example, in institutions' repositories or on personal websites), both before the publication of this manuscript and during its editorial work, as it contributes to the emergence of productive scientific discussion and positively affects the efficiency and dynamics of the citation of the published work (see The Effect of Open Access).