Integrated Model for Security and Protection of Critical Infrastructure

Abstract

The creation of a matrix of minimum mandatory requirements for building a reliable system to counter potential terrorist threats is essential to increase the security and protection of critical infrastructure. In order to obtain an objective assessment of the success achieved in terms of necessary level of security and the extent to which is reached the reliability of critical infrastructure we should use a standardized approach and criteria. This is the purpose of this article, namely, to present the characteristics of a methodology for creation and the characteristics of an integrated, standardized model in this area, which can become the foundation of a comprehensive approach to the successful implementation of the so called L-strategy, i.e. protection of the individual and infrastructures against the threat of terrorism.

Share and Cite:

Stoichev, K. (2014) Integrated Model for Security and Protection of Critical Infrastructure. Open Access Library Journal, 1, 1-7. doi: 10.4236/oalib.1101124.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] Yachev, R., Project Team by NDA, Stoichev, K., Project Team by IMSETHAC-BAS (2013) Development of a Security and Protection Model of the Airport External Perimeter. Collection of Materials with the Results of the Project: “Development of Tools Needed to Coordinate Inter-Sectoral Power and Transport CIP Activities at a Situation of Multilateral Terrorist Threat. Increasing of the Protection Capacity of Key CIP Objects in BULGARIA-BULCIP”.
[2] Directive 2008/114/EC of the Council of the EU on the Identification and Designation of European Critical Infrastructures and the Assessment of the Need to Improve Their Protection.
[3] Vitanov, L., Project Team by NDA, Stoichev, K., Project Team by IMSETHAC-BAS (2013) Modeling of Advanced System for Security and Water Channels Protection of the NPP. Collection of Materials with the Results of the Project: “Development of Tools Needed to Coordinate Inter-Sectoral Power and Transport CIP Activities at a Situation of Multilateral Terrorist Threat. Increasing of the Protection Capacity of Key CIP Objects in BULGARIA-BULCIP”.
[4] de Léon, J.C.V. (2006) Vulnerability: A Conceptual and Methodological Review. Source 4.
[5] Security Policy: What It Is and Why—The Basics. SANS Institute InfoSec Reading Room.
[6] Stoichev, K., Business Continuity Model of the NPP’ System for Removing the Heat, International Workshop (2012) Business Continuity Management of the Nuclear Power Plant System. Modeling and Procedures Development of Advanced System for Security and Water Channel Protection of the NPP. Kozloduy NPP.
[7] ECP-601: Effective Business Continuity Management. The Institute for Business Continuity Training, US.
[8] ISO 9001:2008 Quality Management Systems—Requirements; ISO 22301:2012 “Societal Security—Business Continuity Management Systems—Requirements”.
[9] ISO 22301:2012 Societal Security—Business Continuity Management Systems. Requirements.
[10] ISO/IEC 27001:2013 Information Technology—Security Techniques—Information Security Management Systems—Requirements.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.