Depending on the amount of data to process, file generation may take longer.

If it takes too long to generate, you can limit the data by, for example, reducing the range of years.

Chapter

Download BibTeX

Title

Protection of Critical Infrastructure in Cyberspace

Authors

[ 1 ] Katedra Prawa Cyberbezpieczeństwa i Nowych Technologii, Instytut Prawa, Akademia Sztuki Wojennej | [ P ] employee

Scientific discipline (Law 2.0)

[6.7] Law

Year of publication

2022

Chapter type

chapter in monograph

Publication language

english

Keywords
EN
  • Critical infrastructure
  • Cybersecurity
  • Public administration
  • Critical services
  • Critical service operator
PL
  • Administracja publiczna
  • Bezpieczeństwo narodowe
  • Bezpieczeństwo teleinformatyczne
  • Infrastruktura krytyczna
Abstract

EN Critical infrastructure plays a key role in the functioning of any modern state. One of the primary tasks of the state is to ensure adequate protection, not only for the critical infrastructure itself but also for relevant information on how to ensure its security. Critical infrastructure consists of physical and cybernetic systems, such as facilities, equipment or installations. The responsibility for proper functioning of critical infrastructure rests with state authorities and with the administrators of selected facilities, installations or equipment or services. As a result of events being the consequence of human activity or natural forces, critical infrastructure may be destroyed, damaged or disrupted, thus putting at risk the life and property of citizens. Such events have a negative impact on the economic development of the state. Hence, the protection of critical infrastructure is one of the priorities of every state. The essence of the tasks associated with critical infrastructure lies not only in ensuring its protection against risks, but also in ensuring that any possible damage or disruption to its functioning is as short-lived as possible, easy to eliminate, and does not cause additional losses to the citizens and the economy.

Date of online publication

12.08.2022

Pages (from - to)

79 - 92

URL

http://www.lex-localis.press/index.php/LexLocalisPress/catalog/book/ThePublicDimensionofCybersecurity

Book

The Public Dimension of Cybersecurity

License type

CC BY-NC-ND (attribution - noncommercial - no derivatives)

Open Access Mode

publisher's website

Open Access Text Version

final published version

Release date

12.08.2022

Date of Open Access to the publication

at the time of publication

Ministry points / chapter

20

Ministry points / chapter (humanities, social sciences and theology)

20