{"title":"Methodology of Situational Management of Critical Infrastructure Security","authors":"Michael J. Wisniewski","doi":"10.2478/fman-2020-0004","DOIUrl":null,"url":null,"abstract":"Abstract The article discusses the issues of the critical infrastructure security management from the perspective of entities responsible for its security and development of an integral model of critical infrastructure security, and shows the methodology of situational management of critical infrastructure safety. Proposed solutions are used for CI mapping, enabling the generation of adverse event scenarios, estimation of the risks dependent on the considered CI, and determination of decision problem, indicating a set of protection activities for elimination or reduction of the risk in the security threshold.","PeriodicalId":43250,"journal":{"name":"Foundations of Management","volume":"12 1","pages":"43 - 60"},"PeriodicalIF":0.4000,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Foundations of Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2478/fman-2020-0004","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"MANAGEMENT","Score":null,"Total":0}
引用次数: 1
Abstract
Abstract The article discusses the issues of the critical infrastructure security management from the perspective of entities responsible for its security and development of an integral model of critical infrastructure security, and shows the methodology of situational management of critical infrastructure safety. Proposed solutions are used for CI mapping, enabling the generation of adverse event scenarios, estimation of the risks dependent on the considered CI, and determination of decision problem, indicating a set of protection activities for elimination or reduction of the risk in the security threshold.