The Telecoms Inclusion Principle

Author(s):  
Chris W. Johnson

Communications and information technologies play an increasingly important role both within and between national critical infrastructures. From the food that we eat to the water that we drink, to the energy that we use across all modes of transportation to the systems that protect us when we travel in those systems; we rely on information infrastructures. These interdependencies will increase rapidly in coming years. For instance, the European SESAR programme and the US NextGen initiative are using computational systems to increase the efficiency and maintain the safety of air traffic management with increasing numbers of flights. Similarly, a range of ‘smart grid’ initiatives depend upon computational infrastructures to coordinate the supply and demand of renewable and conventional power sources. The benefits that are provided by telecommunications and information technologies also creates new vulnerabilities, for instance, it is increasingly difficult for national critical infrastructures to recover and reorganise their service provision in the aftermath of computational failures. It is for these reasons that this chapter proposes a telecoms inclusion principle. This states that it order to assess the resilience of any national critical infrastructure we must consider the failure modes and resilience capabilities of telecommunications infrastructures. A consequence of this principle is that the failure of telecommunications infrastructures must be considered in all contingency plans, in drills and exercises, as well as the recovery strategies that are used to mitigate the consequences of an adverse event.

2011 ◽  
Vol 317-319 ◽  
pp. 2091-2096
Author(s):  
Zhi Li Wu ◽  
Xiao Liu

Abstract. Civic critical infrastructure systems have become an inter-connected networked system due to the all kinds of interdependencies. Under the circumstance of emergent events, disruption or failure of one system may lead to the cascading effect on other interdependent systems. We develop a mathematic model based on supply and demand relation of multi-network systems considering the coupling characteristic of critical infrastructures when emergent events happen. The model can offer the emergency strategy to the urgent accident by analyzing events chain after single node fails. The numerical results indicate the approach taken in this research can break through the limit of conventional emergency strategy within single system of dispatching standby products as inventory and to better optimize the total loss of the whole networked system.


Author(s):  
Євген Віталійович Брежнєв ◽  
Герман Вікторович Фесенко ◽  
Вячеслав Сергійович Харченко

The world trends in increasing of threats of natural and man-made nature, a level of terrorist threats, the number and complexity of cyberattacks have caused the actualization of needs for critical information infrastructure protection and improvement it's informational security and functional safety. A critical information infrastructure is considered as a set of information and telecommunication systems, improper operation of which may lead to the occurrence of an accident of critical infrastructure (energy, transport, etc.), as well as to decrease in quality of its services. The subject of paper’s study is the mechanisms for ensuring the safety (protection) of critical information infrastructures. The purpose of the paper is to substantiate the approach to the development of methodological foundations and technologies for assessing and ensuring the safety (protection) of critical information infrastructures taking into account the state and capabilities of modern information technologies. The methods used are: systems analysis methods, mathematical optimization methods, safety, and risk theory methods. The following results were obtained. The main tasks of the critical infrastructure protection system are formulated. The necessity of using the system of protection of critical information infrastructure as part of the system of protection of critical infrastructure is substantiated. The concept and principles of the methodology for assessing and ensuring the safety (protection) of critical information infrastructures are developed, working hypotheses, methods and models necessary for their implementation are suggested. The way of interaction of the elements of the proposed methodology, tasks and elements of the critical infrastructure protection system is shown. The results obtained are aimed at solving of one fundamental problem such as the existence of a contradiction between the intensive development of critical information infrastructures, negative influences and threats of various nature and the lack of methodological foundations, models, methods and information technologies for assessment and assurance of critical information infrastructure security and safety. The results obtained should be used to create elements of informational and analytical support for the decision maker in solving tasks related to the assessment and security (protection) of critical infrastructure


2020 ◽  
Vol 2 (1) ◽  
pp. 35-42
Author(s):  
Hemalatha R ◽  
Rhesa M.J. ◽  
Revathi S

The hest for technological advancement in mobile communication is due to augmentation of wireless user. The deployment of 5G mobile communication is less than 4G mobile communication due to challenges in security like cyberwarfare, espionage, critical infrastructure threats. Nevertheless, critic of neurological discomforts, tissue damage in living organisms occur in the existence of EMF radiation. Also, physical scarcity for spectral efficiency arises due to ubiquitous data traffic. Inspite of these disputes data rate, low latency, device to device communication is also a challenge. In this paper we provide a survey on radiation effects, security threats, traffic management.


2021 ◽  
Vol 11 (16) ◽  
pp. 7228
Author(s):  
Edward Staddon ◽  
Valeria Loscri ◽  
Nathalie Mitton

With the ever advancing expansion of the Internet of Things (IoT) into our everyday lives, the number of attack possibilities increases. Furthermore, with the incorporation of the IoT into Critical Infrastructure (CI) hardware and applications, the protection of not only the systems but the citizens themselves has become paramount. To do so, specialists must be able to gain a foothold in the ongoing cyber attack war-zone. By organising the various attacks against their systems, these specialists can not only gain a quick overview of what they might expect but also gain knowledge into the specifications of the attacks based on the categorisation method used. This paper presents a glimpse into the area of IoT Critical Infrastructure security as well as an overview and analysis of attack categorisation methodologies in the context of wireless IoT-based Critical Infrastructure applications. We believe this can be a guide to aid further researchers in their choice of adapted categorisation approaches. Indeed, adapting appropriated categorisation leads to a quicker attack detection, identification, and recovery. It is, thus, paramount to have a clear vision of the threat landscapes of a specific system.


Author(s):  
David Mendonça ◽  
William A. Wallace ◽  
Barbara Cutler ◽  
James Brooks

AbstractLarge-scale disasters can produce profound disruptions in the fabric of interdependent critical infrastructure systems such as water, telecommunications and electric power. The work of post-disaster infrastructure restoration typically requires information sharing and close collaboration across these sectors; yet – due to a number of factors – the means to investigate decision making phenomena associated with these activities are limited. This paper motivates and describes the design and implementation of a computer-based synthetic environment for investigating collaborative information seeking in the performance of a (simulated) infrastructure restoration task. The main contributions of this work are twofold. First, it develops a set of theoretically grounded measures of collaborative information seeking processes and embeds them within a computer-based system. Second, it suggests how these data may be organized and modeled to yield insights into information seeking processes in the performance of a complex, collaborative task. The paper concludes with a discussion of implications of this work for practice and for future research.


2021 ◽  
Vol 1 (2) ◽  
Author(s):  
Ecler Jaqua ◽  
Terry Jaqua ◽  
Van Nguyen

Supply and demand are amongst the essential requirements before starting up a business. Understanding the quantity of a commodity wished to be sold by producers based on different prices and the item needed by consumers wish purchasing is essential in coming up with ideas. Based on the understanding of this and background research on costs in healthcare, specifically family medicine, it is found that healthcare is amongst the essential requirements, and thus the critical focus of the business idea in a physician’s practice focusing on family medicine care in the US. Starting up the business is based on healthcare demands in the market and further the pricing strategy utilized by most family medicine clinics. Through a connection to the business based on visits in hospitals and the quality offered by these service providers, it is noted that the demand is high and is the most expensive sector in the world, but care is ineffective (The Peterson Center on Healthcare, n.d.) thus leading to searching for effective alternatives by consumers. This creates a potential for offering the most effective services to cater to the demands, and as noted by the Peterson Center on Healthcare (n.d.), the US healthcare system is the most expensive, and costs are projected to grow dramatically in the coming years thus creating the most significant business opportunity to entrepreneurs. By adjusting the resources and trying to cater to the demand in various locations, the key idea is to cater to the need and profit from the sector. The concern of gaining information in the market is research on different healthcare websites and the prices offered and the quality of their services. This will aid in adjusting the prices effectively and thus retaining the demand and supply chain.


Author(s):  
Larysa Getman ◽  

The article discusses approaches to the interpretation of the concept of a service, its specific differences from a physical product and the main features as an object of purchase and sale in the relevant market. Based on the analysis and systematization of existing scientific views, the main features of the service market and the features of the interaction of supply and demand in the service sector are revealed. The practice of functioning of the service market demonstrates the high dynamics of market processes, a pronounced segmentation of demand for services, a high degree of differentiation of services, a high rate of capital turnover and the important role of non-price barriers to entry into the market. The essence and value of the customer's customer loyalty for successful commercial activities and increasing the competitiveness of the manufacturer-supplier of the service has been investigated. Loyalty becomes an indicator of business performance and its ability to innovate. A customer-oriented business philosophy, where a wide range of factors of influence on the formation of customer loyalty is taken into account and used, will allow the company to count on long-term relationships with the consumer and will attract new customers through his positive experience. The possibilities and features of the application of competitive strategies by firms in the field of service activities were analyzed. The main trends in the development of the services market in the current stage, namely the processes of its digitalization, have been investigated. The buyer today is interested not only in price and quality, but also in good service. If a company meets customer service demand through the introduction of chat bots, self- service terminals, mobile applications, etc., then this contributes to the formation of a positive customer experience, which ultimately increases sales. The features and advantages of using information technologies both in business activities and in the implementation of consumer choice have been determined.


2021 ◽  
Vol 7 (1) ◽  
Author(s):  
Sean Atkins ◽  
Chappell Lawson

ABSTRACT The US Financial Services Sector (FSS) is commonly regarded as one of the most successful in addressing cybersecurity through public–private partnership and as a potential model for less advanced sectors. However, how well the sector has actually fared remains poorly understood. Based on publicly available material and in-depth interviews with those intimately involved in business–government collaboration on cybersecurity in the FSS, we analyze how and why collaboration evolved into its current form. We find that considerable gaps remain, which both reveal limitations in the current policy framework for the FSS and suggest lessons for other critical infrastructure sectors.


Sign in / Sign up

Export Citation Format

Share Document