The Use of Crisis Workplace Technology to Protect Communication Processes of Critical Infrastructure

This paper deals with a protection of the national and
European infrastructure. It is issue nowadays. The paper deals with
the perspectives and possibilities of "smart solutions" to critical
infrastructure protection. The research project deals with computers
aided technologies are used from the perspective of new, better
protection of selected infrastructure objects. Protection is focused on
communication and information channels. These communication and
information channels are very important for the functioning of the
system of protection of critical infrastructure elements.





References:
[1] Barta, J., Sadovska, V., Srnik, A., Urbanek, J. F. Protection of
Information and Communication Systems. Environmental Software
Systems. Fostering Information Sharing., 2013, vol. 2013, no. 413, p.
302-310. ISSN 1868-4238.
[2] Bozek, F., Jesonkova, L., Dvorak, J., Bozek, A. General Procedure of
Risk Management. Ekonomika a management, no. 3, 2012. p. 15-24.
ISSN 1802-3975.
[3] Czech Republic, Act No. 239/2000 Coll., on the Integrated Rescue
System and on amendment of certain codes, in latter wording", In Czech
Republic Statute Book, 2000.
[4] Ludik, T., Navratil, J., Langerova, A., Process Oriented Architecture for
Emergency Scenarios in the Czech Republic", In International
Conference on Business Process Management. Venice: World Academy
of Science, Engineering and Technology, 2011.
[5] Ludik, T., Racek, J. Process Methodology for Emergency Management.
IFIP Advances in Information and Communication Technology,
Heidelberg: Springer, 2011, 359, od s. 302-309, 8 s. ISSN 1868-4238.
2011. od s. 302-309, 8 s.
[6] Mitnick, K. D., Simon W. L. The art of deception: controlling the
human element of security. Indianapolis, Ind.: Wiley, xvi, 2002. 352 pp.
ISBN 07-645-4280-X
[7] Prochazkova, D. et al. Bezpecnost a krizoverizeni. 1. vyd. Praha: Police
history, 2006. 255 s. ISBN 80-86477-35-5.
[8] Rehak D, Grasseova M. The ways of assessing the security of
organization information systems through SWOT analysis, pp. 162-184.
DOI: 10.4018/978-1-61350-311-9.ch007. In ALSHAWI, Mustafa,
ARIF, Mohammed (eds.). Cases on E-Readiness and Information
Systems Management in Organizations: Tools for Maximizing Strategic
Alignment. 1st edition. Hershey, PA, USA: IGI Global, 2011. 318 p.
ISBN 978-1-61350-311-9. DOI: 10.4018/978-1-61350-311-9
[9] Urbanek J. F., Barta, J.,Heretik, J., Navratil, J., Prucha, J. Cybernetic
Camouflage on Human Recipient - Visual Illusion INTERFACE. In:
The 9th WSEAS International Conference on Circuits, Systems,
Electronic, Control & Signal Processing (CSECS´10). Řecko: WSEAS,
2010, p. 22-33. ISBN 978-960-474-262-2.
[10] Urbánek, J. F. et al. Scénářeadaptivníkamufláže, Brno: Tribun EU,
2012.130 pp. ISBN: 978-80-263-0211-7.
[11] Urbanek J. F. et al.Crisis Scenarios. Brno: University of Defence, 2013,
240 p. ISBN 978-80-7231-934-3.