Research on the relationships and dependences of critical infrastructure systems – the basis for improving critical infrastructure of the state and large urban agglomerations
 
 
More details
Hide details
1
Police Academy in Szczytno
 
 
Submission date: 2023-07-06
 
 
Acceptance date: 2023-10-15
 
 
Publication date: 2023-10-31
 
 
Corresponding author
Agata Tyburska   

WSPOL
 
 
JoMS 2023;52(3):337–352
 
KEYWORDS
TOPICS
ABSTRACT
Effective management of infrastructure development in large urban agglomerations requires diagnosing interdependencies occurring in the process of its development. This specific interdependence, links between various types of infrastructure, not only favours the development of agglomerations, but also generates threats with unprecedented consequences for public safety and order. Damage to one element of urban infrastructure may adversely affect another element, which in turn may result not only in threats to the safety of people living in the agglomeration, but also in threats to the state. Therefore, the issue of making the key infrastructure of an urban agglomeration more resilient should be considered in the context of system connections of state infrastructure elements, as well as the criticality of its individual elements, nodes and key points. The aim of this article is to present the importance of the diagnosis of connections and dependencies between elements of the city (state) infrastructure in the process of determining the essential service and, consequently, the proper immunization of critical infrastructure. The main research method used in the course of the research was the critical analysis of literature, materials and procedures. The publications of both Polish and foreign researchers on the links and dependencies of the state infrastructure and the determination of key services were analysed. The conducted analysis indicates the need to conduct research in Poland on diagnosing dependencies in the developing infrastructure. This need results from the dynamic nature of threats and the emergence of new technologies that support the development of modern agglomerations and make the state more sensitive to other, so far undiagnosed threats
 
REFERENCES (22)
1.
Arnold, Ch., Butts, J., Thirunarayan, K. (2014). Detecting Integrity Attacks on Industrial Control systems. w : J. Butts, S. Shenoi (red.), Critical Infrastructure Protection VIII, Springer. Dostęp 20.05.2023 r. z https://www.researchgate.net/p....
 
2.
Baina, A. (2009). Contrôle d’Accès pour les Grandes Infrastructures Critiques: Application au réseau d’énergie électrique, Institut National des Sciences Appliquées de Toulouse, 29 septembre, Toulouse. Dostęp 12.05.2023 r. z https://theses.hal.science/tel....
 
3.
Beneš, J. (1979). Teoria systemów, PWN.
 
4.
Cavallini, S., d’Alessandro, C., Volpe, M., Armenia, S., Corlini, C., Brein, E., Assogna, P. (2014). A system Dynamics Framework for Modeling Critical Infrastructure Resilience. w: J. Butts, S. Shenoi (red.), Critical Infrastructure Protection VIII, Springer. Dostęp 20.05.2023 r. z https://link.springer.com/chap....
 
5.
Grabowski, A., Głowacki, P., Poźniak, K., Kasprowicz, G., Zabołotny, W., Wawrzyniak, Z., Wojeński, A., Tyburska, A., Ajdukiewicz, Z., Struniawski, J., Iwański, J., Brawata, S., Szymajda, W., Markowski, P., Kotlik, M. , Mrozowski, P., Katewicz, E. (2020). MESH concept for mobile distribution point architecture of ICT infrastructure, Proc. SPIE 11581, Photonics Applications in Astronomy, Communications, Industry, and High Energy Physics Experiments 2020, 115810G (14 October 2020); doi: 10.1117/12.2580242 Event: Photonics Applications in Astronomy, Communications, Industry, and High Energy Physics Experiments 2020, Wilga, Poland. Dostęp 20.05.2023 z https://www.spiedigitallibrary....
 
6.
Hurst, W., Merabti, M., Fergus, P. (2014). A Survey of Critical Infrastructure Security. w: J. Butts, S. Shenoi (red.) Critical Infrastructure Protection VIII. Dostęp: 20.05.2023 r. z https://inria.hal.science/hal-....
 
7.
Palmer, Ch., Shenoi, S. (red.) (2009). Critical Infrastructure Protection III. Springer.
 
8.
Kacała-Szwarczyńska, A. (2019). Cyberatak w świetle międzynarodowego prawa humanitarnego konfliktów zbrojnych, Tom 2/41/. Journal of Modern Science. Dostęp 25.05.2023 r. z https://www.jomswsge.com/pdf-1....
 
9.
Kaczmarski, M. (2010). Bezpieczeństwo energetyczne Unii Europejskiej. Wydawnictwa Akademickie i Profesjonalne.
 
10.
Krotofil, M., Cardenas, A., Angrishi, K. (2014). Timing of Cyber-Physicial Attacks on Process Control Systems. w: J. Butts, S. Shenoi (red.), Critical Infrastructure Protection VIII, Springer. Dostęp 20.05.2023 z https://www.researchgate.net/p....
 
11.
Lee, E. (2009). Homeland Security and Private Sector Business. Corporations’ Role in Critical Inftastructure Protection. CRC Press.
 
12.
Lewis, T. G. (2006), Critical Infrastructure Protection in Homeland Security. Defending a networked nation. WILEY-INTERSCIENCE, A JOHN Wiley&Sons.
 
13.
Najgebauer, A. (red.) (2009). Modele zagrożeń aglomeracji miejskiej wraz z systemem zarządzania kryzysowego na przykładzie miasta stołecznego Warszawy. WAT.
 
14.
Nieuwenhuijs, A., Luiijf, E., Klaver, M. (2008). Modeling Dependencies in Critical Infrastructures. w: M. Papa, S. Shenoi (red.), Critical Infrastructure Protection II, Springer. Dostęp 06.07.2023 r. z https://link.springer.com/chap....
 
15.
Piekarczyk, A., Zieniewicz, K. (2010). Myślenie sieciowe w teorii i praktyce, PWE.
 
16.
Pham, H. (2006), System Software Realiability, Springer. Dostęp 05.06.2023 z https://link.springer.com/book....
 
17.
Radvanovsky, R., McDougall, A. (2009). Critical Infrastructure. Homeland Security and Emergency Preparedness. Second Edition, CRC Press, Taylor & Francis Group.
 
18.
Radziszewska-Szczepaniak, D. (2021). Redukcjonizm antropologiczny i jego konsekwencje, NURT SVDZ (2016). Dostęp: 01.09.2021 r. z https://bazhum.muzhp.pl/media/....
 
19.
Rozel, B. (2009). La sécurisation des infrastructures critiques: recherche d’une méthodologie d’identification des vulnérabilités et modélisation des interdépendances, Institut Polytechnique de Grenoble, Grenoble. Dostęp 12.05.2023 r. z https://theses.hal.science/tel....
 
20.
Setola, R., Theocharidan, M. (2016). Modeling Dependencies Between Critical Infrastructures. w: R. Setola, V. Rosato, E. Kynakides, E. Rome (red.), Managing the Compexity of Critical Infrastructures. A Modelling and Simulation Approach, Springer. Dostęp 25.06.2023r. z https://link.springer.com/book....
 
21.
Skurzyńska – Sikora, U. (2008). Poprawa efektywności organizacji przy wykorzystaniu modelu PEMM, 3. Organizacja i Zarządzanie, Dostęp: 01.09.2021 r. z https://mfiles.pl/pl/index.php....
 
22.
Sullivant, J. (2007). Strategies for Protecting National Critical Infrastructure Assets. A Focus on Problem-Solving. WILEY-INTERSCIENCE, A JOHN Wiley&Sons.
 
eISSN:2391-789X
ISSN:1734-2031