Filters
total: 373
Search results for: critical infrastructure
-
Multisensor System for the Protection of Critical Infrastructure of Seaport
PublicationThere are many separated infrastructural objects within a harbor area that may be considered “critical”, such as gas and oil terminals or anchored naval vessels. Those objects require special protection, including security systems capable of monitoring both surface and underwater areas, because an intrusion into the protected area may be attempted using small surface vehicles (boats, kayaks, rafts, floating devices with weapons...
-
Integrated monitoring, control and security of Critical Infrastructure Systems
PublicationModern societies have reached a point where everyday life relies heavily on desired operation of critical infrastructures, in spite of accidental failures and/or deliberate attacks. The issue of desired performance operation of CIS at high security level receives considerable attention worldwide. The pioneering generic methodologies and methods are presented in the paper project for designing systems capable of achieving these...
-
Algorithms and Tools for Intelligent Control of Critical Infrastructure Systems
PublicationCritical Infrastructure Systems (CIS) are spatially distributed and of a network structure. The dynamics are nonlinear, uncertain and with several time scales. There is a variety of different objectives to be reliably met under a wide range of operational conditions. The operational conditions are influenced by the disturbance inputs, operating ranges of the CIS, faults in the sensors and actuators and abnormalities occurring in...
-
Research Platform for Monitoring, Control and Security of Critical Infrastructure Systems
PublicationSustainable operation of Critical Infrastructure Systems (CISs) is of a major concern to modern societies. Monitoring, control and security of such systems plays a key role in guaranteeing continuous, reliable and above all secure access to the resources provided by these systems. Development of adequate software and hardware structures, as well as algorithms to perform such functions cannot be done apart from the operational conditions...
-
Dedicated Geographical Information System in the context of Critical Infrastructure Protection
PublicationNowe zaawansowane narzędzia Technologii Informacyjnych i Komunikacyjnych mogą stanowić bardzo użyteczną pomoc podczas przewidywania różnego rodzaju zagrożeń jak również minimalizacji związanego z nimi ryzyka. Artykuł prezentuje Sieciowy System Informacji Przestrzennej dla Szacowania i Wizualizacji Infrastruktur Krytycznych i ich Zagrożeń, stworzony dla Urzędu Miejskiego w Gdańsku przez Politechnikę Gdańską. System ten jest przeznaczony...
-
Research Platform for Monitoring, Control and Security of Critical Infrastructure Systems
Publication -
Assessment of the level of reliability of power supplies of the objects of critical infrastructure
Publication -
Integrated safety and security analysis of hazardous plants and systems of critical infrastructure
PublicationThis article addresses an integrated safety and security analysis approach of hazardous industrial plants and systems of critical infrastructure. Nowadays due to new hazards that emerge there are opinions among experts that these issues require an integrated approach in life cycle, from the design concept, through the design and operation of the plant, to its decommissioning. It is proposed to start from an interesting methodology...
-
Redesign of the Research Platform for Monitoring, Control and Security of Critical Infrastructure Systems
PublicationCritical Infrastructure Systems (CISs) play a key role in modern societies. Their sustainable operation depends heavily on the performance of dedicated structures and algorithms targeting monitoring, control and security aspects. In previous work a Research Platform (RP) for the design and simulation of such systems was presented. This works updates the information on the RP through the description of major hardware and software...
-
Planning of the seaports critical infrastructure protection in the light of the ISPS Code requirements
PublicationPorty morskie mają bardzo istotny udział w międzynarodowych morsko-lądowych łańcuchach transportowych oraz duży wpływ na efektywność handlu zagranicznego. Ponieważ również silnie oddziałują na regionalną gospodarkę i społeczeństwo, mogą być miejscem szczególnie narażonym na różnego rodzaju zagrożenia ich bezpieczeństwa. Dlatego też powinny być szczególnie chronione jako obiekty infrastruktury krytycznej państwa. Ochrona portów...
-
Journal of Critical Infrastructure Policy
Journals -
Algorithms for spatial analysis and interpolation of discrete sets of Critical Infrastructure hazard data
PublicationNowo opracowane zaawansowane narzędzia technologii informacyjnych i komunikacyjnych (TIK) ujawniają swoją przydatność do przewidywania różnego rodzaju zagrożeń oraz minimalizowania związanego z nimi potencjalnego ryzyka. Jednakże większość tych narzędzi operuje jedynie na niektórych typach infrastruktury i zaniedbuje ich przestrzenne interakcje z otoczeniem oraz innymi strukturami. Niniejszy artykuł zawiera propozycje kilku algorytmów...
-
Coastal zone critical infrastructure protection using dedicated geographical information system
PublicationW pracy przeanalizowano kilka infrastruktur krytycznych dla Trojmiasta z wykorzystaniem CARVER2. Wyniki zostale poddane analizie z wykorzystaniem systemu GIS.
-
Spatial analysis of Critical Infrastructure risk assessment results using a Web-based GIS
PublicationArtykuł prezentuje Sieciowy System Informacji Przestrzennej dla Szacowania i Wizualizacji Infrastruktur Krytycznych i ich Zagrożeń, stworzony dla Urzędu Miejskiego w Gdańsku przez Politechnikę Gdańską. System ten jest przeznaczony do przetwarzania przestrzennego i mapowania wyników różnych analiz Infrastruktur Krytycznych, zaś CARVER2 pełni w nim rolę głównego ''sensora''.
-
Operational Analysis of Fire Alarm Systems with a Focused, Dispersed and Mixed Structure in Critical Infrastructure Buildings
Publication -
Organizational culture as prerequisite of proactive safety and security management in critical infrastructure systems including hazardous plants and ports
PublicationThis article addresses selected aspects of organizational culture to be considered in the context of knowledge based proactive safety and security management of plants, ports and systems of critical infrastructure. It has been often emphasized in the domain literature that business effectiveness of such plants and their resilience against hazards and threats to avoid major accidents depends substantially on human and organizational...
-
Safety Analysis for the Operation Process of Electronic Systems Used Within the Mobile Critical Infrastructure in the Case of Strong Electromagnetic Pulse Impact
Publication -
Wireless Networks as an Infrastructure for Mission-Critical Business Applications
PublicationDespite the dynamic growth of wireless network systems, their pres-ence in business-support infrastructure has been limited. In the article we provide an overview of generic corporate network architecture and examine usefulness of available wireless network solutions in such systems. Following this overview we analyze new wireless network architecture which currently undergoes standardization process - wireless mesh. It can result...
-
Functional safety and cyber security analysis for life cycle management of industrial control systems in hazardous plants and oil port critical infrastructure including insurance
PublicationThis report addresses selected methodological aspects of proactive reliability, functional safety and cyber security management in life cycle of industrial automation and control systems (IACS) in hazardous plants and oil port critical installations based on the analysis of relevant hazards / threats and evaluation of related risks. In addition the insurance company point of view has been also considered, because nowadays the insurer,...
-
Algorithms for processing and visualization of Critical Infrastructure security data as well as simulation and analysis of threats = Algorytmy przetwarzania i wizualizacji danych dotyczących bezpieczeństwa infrastruktur krytycznych oraz symulacji i analizy zagrożeń
PublicationRozprawa traktuje o algorytmach przetwarzania danych dotyczących różnego rodzaju zagrożeń, w szczególności wyników analiz ryzyka infrastruktur krytycznych, pozwalających na przestrzenną analizę tych danych w kontekście geograficznym za pomocą dedykowanego Systemu Informacji Przestrzennej. Prezentowane metody analizy zgrupowań Infrastruktur Krytycznych oraz propagacji ich zagrożeń wykorzystują wyniki syntetycznej analizy podatności...
-
GB-SAR in the Diagnosis of Critical City Infrastructure—A Case Study of a Load Test on the Long Tram Extradosed Bridge
Publication -
International Journal of Critical Infrastructure Protection
Journals -
Approach to security assessment of critical infrastructures' information systems
PublicationThis study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...
-
Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures
PublicationIn the last years critical infrastructures have become highly dependent on the information technologies and exposed to cyberattacks. Because the effects of the attacks can be detrimental, it is crucial to comprehensively asses the security of the infrastructures' information systems. This chapter describes MAlSim - the simulator of malicious software based on software agents, developed for the needs of a testbed for critical infrastructures...
-
Integrated approach for functional safety and cyber security management in maritime critical infrastructures
PublicationThe work is devoted important issues of the management in maritime critical infrastructure of functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to cyber security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with...
-
Management of seaport critical infrastructures of integrated sea-land transport chains
PublicationW morsko-lądowych łańcuchach transportowych logistyczne procesy integracyjne przebiegają pomiędzy trzema podstawowymi ogniwami: żeglugą morską, portami morskimi i transportem zaplecza. W tym ujęciu morsko-lądowe łańcuchy transportowe, które stanowią przestrzenno-czasową kombinację lądowych i morskich ogniw transportowych, stają się także najwyższą formą integracji portów i żeglugi z innymi gałęziami transportu, wymagającą stałego...
-
Current issues of functional safety and cybersecurity analysis of the industrial and critical infrastructures
PublicationThis article addresses some functional safety assessment procedures with cybersecurity aspects in critical industrial installations with regard to the functional safety requirements specified in standards IEC 61508 and IEC 61511. The functional safety management includes hazard identification, risk analysis and assessment, specification of overall safety requirements and definition of safety functions. Based on the risk assessment...
-
International Journal of Critical Infrastructures
Journals -
Standards on Cyber Security Assessment of Smart Grid
PublicationSecurity evaluation of communication systems in smart grid poses a great challenge to the developers and operators. In recent years many new smart grid standards were proposed, which paradoxically results in the difficulty in finding a relevant publication in this plethora of literature. This paper presents the results of a systematic analysis which aimed at addressing this issue by identifying standards that present sound security...
-
Geographical information system for analysis of critical infrastructures and their hazards due to terrorism, man-originated catastrophes and natural disasters for the city of gdansk.
PublicationArtykuł prezentuje System Informacji Przestrzennej dla oceny i wizualizacji Infrastruktur Krytycznych i ich zagrożeń, stworzony przez Katedrę Systemów Geoinformatycznych dla Miasta Gdańska. System pozwala na przestrzenną analizę i mapowanie wyników przetwarzania danych dotyczących Infrastruktur Krytycznych pochodzących m.in. z modułu CARVER2.
-
Tomasz Zubowicz dr inż.
PeopleTomasz Zubowicz has received his M.Sc. Eng. degree in Control Engineering from the Faculty of Electrical and Control Engineering at the Gda{\'n}sk University of Technology (GUT) in $2008$. He received his Ph.D. Eng. (Hons.) in the field of Control Engineering from the same faculty in $2019$. In $2012$ he became a permanent staff member at the Department of Intelligent Control and Decision Support Systems at GUT and a member of...
-
Rafał Leszczyna dr hab. inż.
PeopleDr hab. Rafal Leszczyna is an associate professor at Gdansk University of Technology, Faculty of Management and Economics. He holds the M.Sc. degrees of Computer Science and Business Management. In December, 2006 he earned a Ph.D. in Computer Science, specialisation - Computer Security at the Faculty of Electronics, Telecommunications and Informatics of Gdansk University of Technology. Between 2004 and 2008 he worked in the European...
-
CIP Security Awareness and Training: Standards and Practice
PublicationThese are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognised by international and national standardisation bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...
-
CIP Security Awareness and Training: Standards and Practice
PublicationThese are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognized by international and national standardization bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...
-
SafeCity – a GIS-based tool profiled for supporting decision making in urban development and infrastructure protection
PublicationThis paper presents a system for analysis of municipal Critical Infrastructures, which offers integrated tools for target analysis, hazard scenario simulations and spatial analysis within a remotely accessible Web-based Geographic Information System. The system has been applied to research conducted in the city of Gdansk with the aid of blast attack, chemical leakage and flood hazard scenarios, as well as a spatial density algorithm,...
-
Towards a process based management system for oil port infrastructure in context of insurance
PublicationThis article addresses selected methodological aspects of a process based management system based on analysis of hazards and threats and risk evaluation for an oil port infrastructure in context of insurance. The oil port terminal is regarded as important system of the critical infrastructure that require careful system oriented approach to deal with integrated aspects of environmental, safety and security management to reduce...
-
Testing Situation Awareness Network for the Electrical Power Infrastructure
PublicationThe contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and Communication Technologies (ICT) in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent...
-
Janusz Górski prof. dr hab. inż.
People -
Integrated functional safety and cyber security analysis
PublicationThe chapter is devoted some important issues of the functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with regard of the evaluation assurance levels (EAL)...
-
The Assessment of the Influence of Low-Frequency Electromagnetic Fields Originated from the Power Infrastructure on Humans’ Health
PublicationThe objective of this study is to assess the impact of low-frequency electromagnetic fields (LF EMFs) generated by power infrastructure on the nearby environment. Measurements of electric (E) and magnetic (H) field intensities were conducted around high-voltage power lines, transformer stations and facilities related to them. Numerical simulations were also performed to model the distribution of the field values around real buildings...
-
Innovative Web-Based Geographic Information System for Municipal Areas and Coastal Zone Security and Threat Monitoring Using EO Satellite Data
PublicationThe paper presents a novel design of a Web-based Safe City & Coastal Zone GIS (SCCZ-GIS). The system integrates data acquired from different remote sensing and geospatial data sources for the purpose monitoring the security of the coastal zone, its inhabitants and Critical Infrastructure. The system utilises several innovative technologies and solutions, and is capable of direct co-operation with different remote sensing data sources...
-
Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics
PublicationThe contemporary electric power system is highly dependent on Information and Communication Technologies which results in its exposure to new types of threats, such as Advanced Persistent Threats (APT) or Distributed-Denial-of-Service (DDoS) attacks. The most exposed components are Industrial Control Systems in substations and Distributed Control Systems in power plants. Therefore, it is necessary to ensure the cyber security of...
-
Wireless Link Selection Methods for Maritime Communication Access Networks—A Deep Learning Approach
PublicationIn recent years, we have been witnessing a growing interest in the subject of communication at sea. One of the promising solutions to enable widespread access to data transmission capabilities in coastal waters is the possibility of employing an on-shore wireless access infrastructure. However, such an infrastructure is a heterogeneous one, managed by many independent operators and utilizing a number of different communication...
-
Using EO satellite data in Safe City and Coastal Zone web-GIS
PublicationThe paper presents a novel design of a web-based Safe City & Coastal Zone GIS (SCCZ-GIS) which integrates data acquired from different remote sensing and geospatial data sources for monitoring the security of the coastal zone, its inhabitants and Critical Infrastructure. The system utilizes several innovative technologies and directly co-operates with different remote sensing data sources and services, like a satellite ground station...
-
Comparative Analysis of Developed Rainfall Intensity–Duration–Frequency Curves for Erbil with Other Iraqi Urban Areas
PublicationRainfall Intensity–Duration–Frequency (IDF) relationships are widely used in water infrastructure design and construction. IDF curves represent the relationship between rainfall intensity, duration, and frequency, and are obtained by analyzing observed data. These relationships are critical for the safe design of flood protection structures, storm sewers, culverts, bridges, etc. In this study, the IDF curves and empirical IDF formulas...
-
Response of high voltage disconnector under seismic excitation - experimental and numerical study
PublicationThe efficiency of the energetic infrastructure system is a very import safety issue in the region experienced by the ground motion. The aim of the present paper is to show the results of the experimental and numerical study focused on the earthquake-induced response of the high voltage disconnector, which is an important element of energetic network. First, the impact tests as well as the sweep-sine shaking table tests were conducted....
-
Knowledge-based functional safety and security management in hazardous industrial plants with emphasis on human factors
PublicationExisting and emerging new hazards have significant potential to impact destructively operation of technical systems, hazardous plants, and systems / networks of critical infrastructure. The programmable control and protection systems play nowadays an important role in reducing and controlling risk in the process of hazardous plant operation. It is outlined how to deal with security related hazards concerning such systems to be...
-
Procedure based functional safety and information security management of industrial automation and control systems on example of the oil port installations
PublicationThe approach addresses selected technical and organization aspects of risk mitigation in the oil port installations with regard to functional safety and security requirements specified in standards IEC 61508, IEC 61511 and IEC 62443. The procedure for functional safety management includes the hazard identification, risk analysis and assessment, specification of overall safety requirements and definition of...
-
A survey of strategies for communication networks to protect against large-scale natural disasters
PublicationRecent natural disasters have revealed that emergency networks presently cannot disseminate the necessary disaster information, making it difficult to deploy and coordinate relief operations. These disasters have reinforced the knowledge that telecommunication networks constitute a critical infrastructure of our society, and the urgency in establishing protection mechanisms against disaster-based disruptions. Hence, it is important...
-
RECODIS: Resilient Communication Services Protecting End-user Applications from Disaster-based Failures
PublicationDisaster-based failures can seriously disrupt any communication network, making its services unavailable. Such disruptions may be caused by natural disasters, technology-related failures, or malicious attacks, and they are observably increasing in number, intensity and scale. When network services that are a part of critical infrastructure become unavailable, commercial and/or societal problems are inevitable. The issue of limiting...