The Use of Crisis Workplace Technology to Protect Communication Processes of Critical Infrastructure
Authors: Jiri Barta, Jiri F. Urbanek
Abstract:
This paper deals with a protection of the national and European infrastructure. It is issue nowadays. The paper deals with the perspectives and possibilities of "smart solutions" to critical infrastructure protection. The research project deals with computers aided technologies are used from the perspective of new, better protection of selected infrastructure objects. Protection is focused on communication and information channels. These communication and information channels are very important for the functioning of the system of protection of critical infrastructure elements.
Keywords: Interoperability, Communication systems, Controlling Process, Critical Infrastructure, Crisis Workplaces. Continuity.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1096665
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1735References:
[1] Barta, J., Sadovska, V., Srnik, A., Urbanek, J. F. Protection of Information and Communication Systems. Environmental Software Systems. Fostering Information Sharing., 2013, vol. 2013, no. 413, p. 302-310. ISSN 1868-4238.
[2] Bozek, F., Jesonkova, L., Dvorak, J., Bozek, A. General Procedure of Risk Management. Ekonomika a management, no. 3, 2012. p. 15-24. ISSN 1802-3975.
[3] Czech Republic, Act No. 239/2000 Coll., on the Integrated Rescue System and on amendment of certain codes, in latter wording", In Czech Republic Statute Book, 2000.
[4] Ludik, T., Navratil, J., Langerova, A., Process Oriented Architecture for Emergency Scenarios in the Czech Republic", In International Conference on Business Process Management. Venice: World Academy of Science, Engineering and Technology, 2011.
[5] Ludik, T., Racek, J. Process Methodology for Emergency Management. IFIP Advances in Information and Communication Technology, Heidelberg: Springer, 2011, 359, od s. 302-309, 8 s. ISSN 1868-4238. 2011. od s. 302-309, 8 s.
[6] Mitnick, K. D., Simon W. L. The art of deception: controlling the human element of security. Indianapolis, Ind.: Wiley, xvi, 2002. 352 pp. ISBN 07-645-4280-X
[7] Prochazkova, D. et al. Bezpecnost a krizoverizeni. 1. vyd. Praha: Police history, 2006. 255 s. ISBN 80-86477-35-5.
[8] Rehak D, Grasseova M. The ways of assessing the security of organization information systems through SWOT analysis, pp. 162-184. DOI: 10.4018/978-1-61350-311-9.ch007. In ALSHAWI, Mustafa, ARIF, Mohammed (eds.). Cases on E-Readiness and Information Systems Management in Organizations: Tools for Maximizing Strategic Alignment. 1st edition. Hershey, PA, USA: IGI Global, 2011. 318 p. ISBN 978-1-61350-311-9. DOI: 10.4018/978-1-61350-311-9
[9] Urbanek J. F., Barta, J.,Heretik, J., Navratil, J., Prucha, J. Cybernetic Camouflage on Human Recipient - Visual Illusion INTERFACE. In: The 9th WSEAS International Conference on Circuits, Systems, Electronic, Control & Signal Processing (CSECS´10). Řecko: WSEAS, 2010, p. 22-33. ISBN 978-960-474-262-2.
[10] Urbánek, J. F. et al. Scénářeadaptivníkamufláže, Brno: Tribun EU, 2012.130 pp. ISBN: 978-80-263-0211-7.
[11] Urbanek J. F. et al.Crisis Scenarios. Brno: University of Defence, 2013, 240 p. ISBN 978-80-7231-934-3.