The Use of Crisis Workplace Technology to Protect Communication Processes of Critical Infrastructure

Autor: Jiri Barta, Jiri F. Urbanek
Jazyk: angličtina
Rok vydání: 2014
Předmět:
ISSN: 1868-4238
DOI: 10.5281/zenodo.1096665
Popis: This paper deals with a protection of the national and European infrastructure. It is issue nowadays. The paper deals with the perspectives and possibilities of "smart solutions" to critical infrastructure protection. The research project deals with computers aided technologies are used from the perspective of new, better protection of selected infrastructure objects. Protection is focused on communication and information channels. These communication and information channels are very important for the functioning of the system of protection of critical infrastructure elements.
{"references":["Barta, J., Sadovska, V., Srnik, A., Urbanek, J. F. Protection of\nInformation and Communication Systems. Environmental Software\nSystems. Fostering Information Sharing., 2013, vol. 2013, no. 413, p.\n302-310. ISSN 1868-4238.","Bozek, F., Jesonkova, L., Dvorak, J., Bozek, A. General Procedure of\nRisk Management. Ekonomika a management, no. 3, 2012. p. 15-24.\nISSN 1802-3975.","Czech Republic, Act No. 239/2000 Coll., on the Integrated Rescue\nSystem and on amendment of certain codes, in latter wording\", In Czech\nRepublic Statute Book, 2000.","Ludik, T., Navratil, J., Langerova, A., Process Oriented Architecture for\nEmergency Scenarios in the Czech Republic\", In International\nConference on Business Process Management. Venice: World Academy\nof Science, Engineering and Technology, 2011.","Ludik, T., Racek, J. Process Methodology for Emergency Management.\nIFIP Advances in Information and Communication Technology,\nHeidelberg: Springer, 2011, 359, od s. 302-309, 8 s. ISSN 1868-4238.\n2011. od s. 302-309, 8 s.","Mitnick, K. D., Simon W. L. The art of deception: controlling the\nhuman element of security. Indianapolis, Ind.: Wiley, xvi, 2002. 352 pp.\nISBN 07-645-4280-X","Prochazkova, D. et al. Bezpecnost a krizoverizeni. 1. vyd. Praha: Police\nhistory, 2006. 255 s. ISBN 80-86477-35-5.","Rehak D, Grasseova M. The ways of assessing the security of\norganization information systems through SWOT analysis, pp. 162-184.\nDOI: 10.4018/978-1-61350-311-9.ch007. In ALSHAWI, Mustafa,\nARIF, Mohammed (eds.). Cases on E-Readiness and Information\nSystems Management in Organizations: Tools for Maximizing Strategic\nAlignment. 1st edition. Hershey, PA, USA: IGI Global, 2011. 318 p.\nISBN 978-1-61350-311-9. DOI: 10.4018/978-1-61350-311-9","Urbanek J. F., Barta, J.,Heretik, J., Navratil, J., Prucha, J. Cybernetic\nCamouflage on Human Recipient - Visual Illusion INTERFACE. In:\nThe 9th WSEAS International Conference on Circuits, Systems,\nElectronic, Control & Signal Processing (CSECS´10). Řecko: WSEAS,\n2010, p. 22-33. ISBN 978-960-474-262-2.\n[10] Urbánek, J. F. et al. Scénářeadaptivníkamufláže, Brno: Tribun EU,\n2012.130 pp. ISBN: 978-80-263-0211-7.\n[11] Urbanek J. F. et al.Crisis Scenarios. Brno: University of Defence, 2013,\n240 p. ISBN 978-80-7231-934-3."]}
Databáze: OpenAIRE