Cyber security is the most critical aspect nowadays of our technologically based lives. Government institutions, banking sectors, public and private services, nuclear power plants, power grid operators, water suppliers or waste water treatment companies use information technologies in their day-to-day operations. Everything that uses technologies are based on communication and information systems and that means that it depends on cyber security. The public and private sector each year spend millions of dollars on technologies, security software and hardware devices that will increase the cyber security inside their companies, but they are still vulnerable. The main problem of this situation is that cyber security is still usually treated as a technical aspect or technology which can be easily implemented inside the organization and this implementation will guarantee cyber security. This attitude must change, because cyber security nowadays is something more than just the technology. This article presents the taxonomy of the critical infrastructure attacks, analyzes attack vectors and attack methods used to damage critical infrastructure as well as the most common cyber security mistakes which organizations make in the cyber security field when trying to make themselves safer from vulnerabilities. The main aim of this article is to provide theoretical aspects of the cyber security management model which can be used to ensure security of critical infrastructure in an organization or company. The cyber security management model that is presented in this article is analyzed from management perspectives and is not concerned with technological aspects and products that are used to protect critical infrastructure from cyber security attacks and vulnerabilities.
The purpose of the paper is to analyze the vulnerabilities of Critical Energy Infrastructures' systems in the event of cyber-attack. The global tendency of cyber-attacks puts Critical Energy Infrastructures on one of the first places for targets. Critical Infrastructure Protection (CIP) has become an increasingly relevant topic in the global industrial environment, as the consequences of cyber-attacks toward ICS can result in physical disruption and loss of human lives. The analysis presented in the paper will take into consideration three different case scenarios of cyber-attacks to Critical Energy Infrastructures, and will evaluate the outcomes and the tactics used by the organizations' response and recovery.
Tikslas-išanalizuoti veiksnius, turėjusius įtakos socialiniam marketingui atsirasti, tradicinio ir socialinio marketingo sąlyčio taškus bei pateikti naudingas rekomendacijas dėl socialinio marketingo kampanijos parengimo ir vykdymo, siekiant viešinti ir tobulinti elekt roninės valdžios paslaugų projektus. Metodologija-nagrinėjant anksčiau nurodytus veiksnius, skatinančius socialinio mar ketingo atsiradimą, socialinio marketingo naudojimo ypatybes ir tikslus, taikyti sisteminės analizės bei koncepcinės lyginamosios analizės metodai leidžia geriau atskleisti socialinio mar ketingo taikymo ypatybes bei pateikti socialinio marketingo kampanijos organizavimo modelį. Rezultatai-atskleistas socialinio marketingo evoliucijos procesas, pateiktas socialinio marketingo panaudojimo ir marketingo kampanijos parengimo teorinis modelis, kuris padės įtraukti daugiau suinteresuotų visuomenės grupių, diegiant naujas bei plėtojant jau esamas elektroninės valdžios teikiamas paslaugas, taip pat pagelbės organizacijoms, atsakingoms už elektroninės valdžios paslaugų kūrimą ir viešinimą, lengviau įgyvendinti ir plėtoti jų kuruo jamus projektus.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.