PROTECTION OF THE CRITICAL INFRASTRUCTURE – BEHAVIORAL ANALYSIS

Authors

  • Teodora Gechkova UNWE, Sofia, Bulgaria
  • Tiana Kaleeva UNWE, Sofia, Bulgaria

Keywords:

Critical infrastructure, Security threats, Behavioral analysis, Protection programs

Abstract

The report describes the importance of the critical infrastructure for the normal functioning of the societies. It is essential for the security, defense and wellbeing of the countries, as well as their political and economic life. The material offers a definition of critical infrastructure, the most commonly included sectors and components of it and the concept of a united critical infrastructure between numerous member states. Along that, different challenges for the critical infrastructures are presented:
 Threats – natural, human and technical/accidental;
 Risks – technological, economic, human-factor, terrorist attacks, criminal actions and cyber-security;
 Vulnerable sectors – energy, critical manufacturing, water systems, transportation systems, commercial facilities, chemical, food and agriculture.
The report outlines the positive influence of the behavioral analysis in preserving security and defense. It is especially important for overcoming the challenges critical infrastructure is facing. It is a provider of new technology and approach for maintaining security and promoting sustainability.
The UK government Project Servator is presented as an example of a good practice in this field. It is designed to be used by trained specialists in crowded places in detection of suspicious or hostile behavior and out of ordinary activities.
In addition to project Servator, an Action Counters Terrorism Awareness E-learning project is applied in UK aiming to encourage the citizens to pay attention, efficiently identify unusual behavior and promptly report it. It also provides information what actions should be undertaken in case of bomb threats or weapons attack.
Analogically, the USA Department of Homeland Security has implemented “If You See Something, Say Something” campaign. Its target is to raise awareness over the mass public through educational posters and brochures with specific information how to spot abnormal behavior.
Moreover, the report presents the NEC’s Behavior Detection system as another good method of managing the security of crowded places which are part of the critical infrastructure. The program is an efficient instrument in spotting suspicious behavior and masked individuals, detecting intrusions to prohibited areas and identifying spaces with concentration of huge amount of people.

Author Biographies

Teodora Gechkova, UNWE, Sofia, Bulgaria

Department National and Regional Security

Tiana Kaleeva, UNWE, Sofia, Bulgaria

Department National and Regional Security

References

ACT Awareness E-learning and ACT App [Online]. Available at: https://www.highfieldelearning.com/act-awareness-e-learning-faqs (Accessed: 17 September 2021)

Action Counters Terrorism, Awareness E-learning [Online]. Available at: https://ct.highfieldelearning.com/index.php?mode=landing (Accessed: 20 September 2021)

CIPSEC website, ICS/SCADA networks threats and defense [Online]. Available at: https://www.cipsec.eu/content/icsscada-networks-threats-and-defenses (Accessed: 20 September 2021)

Counter Terrorism Policing website, Project Servator [Online]. Available at: https://www.counterterrorism.police.uk/servator/ (Accessed: 18 September 2021)

Counter Terrorism Policing website, Report Suspicious Activities [Online]. Available at: https://act.campaign.gov.uk/ (Accessed: 17 September 2021)

European Council, Directive 114/2008 on the identification and designation of European critical infrastructures and the assessment of the need to improve their protection, 2008.

Federal Virtue Training Environment website, Cybersecurity and Critical Infrastructure [Online]. Available at: https://fedvte.usalearning.gov/publiccourses/critical101/0060.htm (Accessed: 20 September 2021)

Homeland Security website, If You See Something, Say Something [Online]. Available at: https://www.dhs.gov/see-something-say-something/about-campaign/seesay-day (Accessed: 22 September 2021)

NEC official website, Critical infrastructure, Behavioral Analysis [Online]. Available at: https://www.nec.com/en/global/solutions/safety/criticalinfrastructure/behaviordetection.html (Accessed: 15 September 2021)

NEC official website, Secure, visible and efficient critical infrastructure [Online]. Available at: https://www.nec.com/en/global/solutions/safety/criticalinfrastructure/index.html (Accessed: 15 September 2021)

NEC official website, Advanced Image Analytics, Behavior Detection Solution Brochure [Online]. Available at: https://www.nec.com/en/global/solutions/safety/criticalinfrastructure/pdf/NEC_BDS_brochure_10082017_v3.pdf (Accessed: 15 September 2021)

NEC official website, Featured Technologies - Crowd Behavior Analysis [Online]. Available at: https://www.nec.com/en/global/rd/technologies/crowd/index.html (Accessed: 15 September 2021)

Tal, J., America’s Critical Infrastructure: Threats, Vulnerabilities and Solutions (2018), [Online]. Available at: https://www.securityinfowatch.com/access-identity/access-control/article/12427447/americas-critical-infrastructure-threats-vulnerabilities-and-solutions (Accessed: 22 September 2021)

UK Government website, Ministry of Defense Police: Project Servator [Online]. Available at: https://www.gov.uk/guidance/ministry-of-defence-police-project-servator (Accessed: 20 September 2021)

Downloads

Published

2021-10-07

How to Cite

Gechkova, T., & Kaleeva, T. (2021). PROTECTION OF THE CRITICAL INFRASTRUCTURE – BEHAVIORAL ANALYSIS. KNOWLEDGE - International Journal , 48(1), 205–208. Retrieved from https://ikm.mk/ojs/index.php/kij/article/view/4710

Most read articles by the same author(s)