Skip to main content

Recommendations for the Creation of Usable Critical Infrastructure for the Delivery of Priority Services of State Bodies

  • Conference paper
  • First Online:
Critical Infrastructure Protection in the Light of the Armed Conflicts (HCC 2022)

Abstract

This paper presents the conclusions derived from the experience of IT technicians employed in the state bodies of the Republic of Serbia during wartime and subsequent treatments of similar problems in a government environment. Due to global circumstances and given conditions, the experience was gained on specific needs and ways of designing and maintaining usable critical infrastructure to deliver priority services to state bodies. The experience is combined with expertise in implementing ISO standards in this area. The empirically recognized guidelines and solutions, supported with standards, can help create recommendations to tackle the problems following current events. These recommendations can be directed to IT experts employed in state bodies to allow them to be efficient in normal circumstances without infrastructure disruptions and in situations when total disruptions of critical infrastructure may occur. Maintaining priority services on such infrastructure is undoubtedly a technological but also an organizational and procedural challenge. The paper presents a global strategic-operational-tactical model emphasizing cooperation with procedural and organizational factors as a prerequisite for a functional technical framework for managing infrastructure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wróbel R (2019) Dependencies of elements recognized as critical infrastructure of the state. Transp Res Procedia 40:1625–1632. https://doi.org/10.1016/j.trpro.2019.07.225

    Article  Google Scholar 

  2. Scholz C, Schauer S, Latzenhofer M (2022) The emergence of new critical infrastructures. Is the COVID-19 pandemic shifting our perspective on what critical infrastructures are? Int J Disaster Risk Reduct 83:103419. https://doi.org/10.1016/j.ijdrr.2022.103419

  3. Pirbhulal S, Gkioulos V, Katsikas S (2021) A systematic literature review on RAMS analysis for critical infrastructures protection. Int J Crit Infrastruct Prot 33:100427. https://doi.org/10.1016/j.ijcip.2021.100427

    Article  Google Scholar 

  4. Mouratidis H, Islam S, Santos-Olmo A, Sanchez LE, Ismail UM (2023) Modelling language for cyber security incident handling for critical infrastructures. Comput Secur 128:103139. https://doi.org/10.1016/j.cose.2023.103139

    Article  Google Scholar 

  5. Markopoulou D, Papakonstantinou V (2021) The regulatory framework for the protection of critical infrastructures against cyberthreats: identifying shortcomings and addressing future challenges: the case of the health sector in particular. Comput Law Secur Rev 41:105502. https://doi.org/10.1016/j.clsr.2020.105502

    Article  Google Scholar 

  6. Große C, Olausson PM (2019) Blind spots in interaction between actors in Swedish planning for critical infrastructure protection. Saf Sci 118:424–434. https://doi.org/10.1016/j.ssci.2019.05.049

    Article  Google Scholar 

  7. Franchina L, Inzerilli G, Scatto E, Calabrese A, Lucariello A, Brutti G, Roscioli P (2021) Passive and active training approaches for critical infrastructure protection. Int J Disaster Risk Reduct 63:102461. https://doi.org/10.1016/j.ijdrr.2021.102461

    Article  Google Scholar 

  8. Dragović R, Dragović D, Kačanovski V, Klipa Đ (2016) Information security in a virtual environment. In: Proceedings YUINFO conference, vol 21, pp 39–43

    Google Scholar 

  9. Dragovic R, Ivkovic M, Perovic B, Klipa D (2011) Dataveillance and data mining as a technology support to the process of investigation. In: Proceedings of 19th telecommunications forum (TELFOR), vol 19, pp 1257–1260. https://doi.org/10.1109/telfor.2011.6143780

  10. Dragović R, Ivković J, Dragović D, Klipa Đ, Radišić D, Nikolic V (2015) Decision support system as a support for strategic management of state administration. In: Proceedings of YUINFO conference, vol 20, pp 417–422

    Google Scholar 

  11. Dragović R, Dragović D, Perović B, Klipa Đ (2013) Strategic management in the judiciary based on decision support systems. In: Proceedings of YUINFO conference, vol 18

    Google Scholar 

  12. Ivanović Z, Dragović R, Uljanov S (2012) Strategic regulation model on the high-tech crime vulnerable targets. Western Balkans: from stabilization to integration. In: Proceedings of international scientific conference, pp 456–467

    Google Scholar 

  13. International Organization for Standardization homepage. ISO 22301, ISO/IEC 27001, ISO 9001, ISO 45001, ISO/IEC 20000-1, ISO 21500, ISO 19011. http://www.iso.org

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dalibor Dobrilovic .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dragović, R., Dobrilovic, D., Dragović, D. (2024). Recommendations for the Creation of Usable Critical Infrastructure for the Delivery of Priority Services of State Bodies. In: Kovács, T.A., Nyikes, Z., Berek, T., Daruka, N., Tóth, L. (eds) Critical Infrastructure Protection in the Light of the Armed Conflicts. HCC 2022. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-47990-8_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-47990-8_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-47989-2

  • Online ISBN: 978-3-031-47990-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics