Depending on the amount of data to process, file generation may take longer.

If it takes too long to generate, you can limit the data by, for example, reducing the range of years.

Article

Download file Download BibTeX

Title

Critical Infrastructure Security Management in the Era of Cyber Threats

Authors

[ 1 ] Wydział Bezpieczeństwa Narodowego, Akademia Sztuki Wojennej | [ P ] employee

Scientific discipline (Law 2.0)

[6.6] Management and quality studies

Year of publication

2025

Published in

European Research Studies Journal

Journal year: 2025 | Journal volume: Vol. XXVIII | Journal number: Issue 2

Article type

scientific article

Publication language

english

Keywords
PL
Abstract

EN Purpose: This article analyses contemporary cyber threats against critical infrastructure and identifies effective strategies for managing its security under conditions of increasing digitisation. The study focuses on assessing the impact of attacks on the energy, transportation, water supply, and healthcare sectors and identifying institutional and legislative measures to strengthen the resilience of these systems. Research Methodology/Approach: The paper uses theoretical methods, including literature analysis, cybersecurity industry reports and case studies of selected incidents that affected critical infrastructure in 2023-2025. The first part characterises the main types of cyber attacks (ransomware, DDoS, APT) and the sectors most vulnerable to disruption. This follows an analysis of the consequences of selected attacks on state and private infrastructure operations. The final section presents a systemic approach to security management, including the concepts of resilience, redundancy, business continuity and legislative solutions such as the NIS2 directive and national infrastructure protection programs. The research problem was formulated: What cyber threats pose the most significant challenge to critical infrastructure security, and what strategies can ensure adequate protection? The hypothesis is that effective protection of critical infrastructure requires integrated actions based on technology, regulation and cross-sector and international coordination. Results: The conclusions of the analysis indicate that critical infrastructure remains one of the most common targets of cyberattacks, and their effects are often cascading and cross-border. Protecting these assets requires a systems approach that combines threat detection technologies, business continuity planning, collaboration between operators and security services, and regulatory alignment with the dynamically changing threat landscape. Practical implications: The findings are essential for state security institutions, critical service operators and policymakers. Adequate infrastructure protection requires technological investment and awareness-building among management and operational staff, as well as regular training, resilience testing and security audits. Lessons can be used in the design of public policies and the development of crisis management plans. Originality/Value: The article brings value by comprehensively addressing the problem of critical infrastructure security management in the context of growing cyber threats. It combines technological, institutional and legal analysis to formulate practical recommendations for national and international protection systems. It emphasises the need to strengthen cross-border cooperation and harmonise protection standards within structures such as the European Union and NATO.

Date of online publication

20.06.2025

Pages (from - to)

610 - 621

DOI

10.35808/ersj/4000

URL

https://ersj.eu/journal/4000

Comments

Bibliografia na stronach 620-621.

License type

CC BY (attribution alone)

Open Access Mode

open journal

Open Access Text Version

final published version

Release date

20.06.2025

Date of Open Access to the publication

at the time of publication

Full text of article

Download file

Access level to full text

public

Ministry points / journal

100