Otwarty dostęp

Methodology of Situational Management of Critical Infrastructure Security


Zacytuj

Figure 1

Dependence between national security, civil planning, and critical infrastructure (Source: Wiśniewski, 2019, p.14)
Dependence between national security, civil planning, and critical infrastructure (Source: Wiśniewski, 2019, p.14)

Figure 2

The civil planning cycle (Source: Dz.U., 2019, Item 209)
The civil planning cycle (Source: Dz.U., 2019, Item 209)

Figure 3

The canon of CI characterization (Source: Wiśniewski and Ostrowska, 2016, pp.118–119)
The canon of CI characterization (Source: Wiśniewski and Ostrowska, 2016, pp.118–119)

Figure 4

Dependence of the MSMCIS steps on IMCIS elements (Source: Wiśniewski, 2019, p.24)
Dependence of the MSMCIS steps on IMCIS elements (Source: Wiśniewski, 2019, p.24)

Figure 5

An example of a graphic illustration of the dependence of CI entities (Source: Wiśniewski, 2019, p.52)
An example of a graphic illustration of the dependence of CI entities (Source: Wiśniewski, 2019, p.52)

Figure 6

Dependencies of elements of the CI situation model (Source: Wiśniewski, 2019, pp.53–55)
Dependencies of elements of the CI situation model (Source: Wiśniewski, 2019, pp.53–55)

Figure 7

Example of identification of CI dependencies in the considered modelNote: Ellipses are Cis (Vα), rectangles are threats (Zα,β), full arrows mean the dependencies of the considered CI (Gn), and dashed arrows mean threats’ excitation (Hn)?(Source: Wiśniewski, 2019, p.63)
Example of identification of CI dependencies in the considered modelNote: Ellipses are Cis (Vα), rectangles are threats (Zα,β), full arrows mean the dependencies of the considered CI (Gn), and dashed arrows mean threats’ excitation (Hn)?(Source: Wiśniewski, 2019, p.63)

Figure 8

An example of decision problem (Source: Own elaboration)
An example of decision problem (Source: Own elaboration)

Figure 9

An example of calculating the value of solution cost for a decision problem (Source: Own elaboration)
An example of calculating the value of solution cost for a decision problem (Source: Own elaboration)

Figure 10

Procedures for implementing the MSMCIS (Source: Wiśniewski, 2019, p.92 and p.94)
Procedures for implementing the MSMCIS (Source: Wiśniewski, 2019, p.92 and p.94)

Figure 11

The model of dependencies of the Refinery ORLEN Inc., the Basell Orlen Polyolefins Ltd, and the Production Facility Orlen Oil Ltd (Source: Wiśniewski, 2019, p.106)
The model of dependencies of the Refinery ORLEN Inc., the Basell Orlen Polyolefins Ltd, and the Production Facility Orlen Oil Ltd (Source: Wiśniewski, 2019, p.106)

Figure 12

Illustration of the considered flat decision problem (Source: Wiśniewski, 2019, p.113)
Illustration of the considered flat decision problem (Source: Wiśniewski, 2019, p.113)

Figure 13

Illustration of the considered hierarchical decision problem (Source: Wiśniewski, 2019, p.124)
Illustration of the considered hierarchical decision problem (Source: Wiśniewski, 2019, p.124)

Figure 14

Matrix record of the considered hierarchical decision problem (Source: Wiśniewski, 2019, p.125)
Matrix record of the considered hierarchical decision problem (Source: Wiśniewski, 2019, p.125)

Entities responsible for CI security (Source: Wiśniewski, 2019, p.19)

Local government levelStateThe Council of MinistersGovernment Security Center (State level)
Governmental Crisis Management Team (GCMT)
ProvinceVoivod
Provincial Crisis Management Team (PCMT)Provincial Center for Crisis Management
DistrictDistrict officer
District Crisis Management Team (DCMT)District Center for Crisis Management
CommunityMayor / Mayor of the city
Commune Crisis Management Team (CCMT)Commune Center for Crisis Management
The level of the CI operatorSystems of CICI entities

Synthetic record of the situation of the Refinery ORLEN inc., the Basell Orlen Polyolefins ltd. and the Production Facility Orlen Oil ltd (Source: Wiśniewski, 2019, p.104)

CIFunctionalitiesThreatsVulnerability
MarkValue of functionalityMarkTypeExcited threatProbabilityEffectMarkDegree of reduction of vulnerability
V1Φ1,193%Z1,1INexplosion, environmental contamination0.7−47% (Φ1,1)M1,1,10.460.88
−37% (Φ1,2)
−13% (Φ1,3)M1,1,20.31
Φ1,293%Z1,2INfire0.56−42% (Φ1,1)M1,2,10.160.31
−36% (Φ1,2)
−46% (Φ1,3)
Φ1,393%Z1,3IN-0.81−9% (Φ1,1)M1,3,10.160.31
−9% (Φ1,3)
V2Φ2,193%Z2,1INexplosion, environmental contamination0.42–94% (Φ2,1)M2,1,10.270.56
M2,1,20.18
Z2,2INfire0.35−48% (Φ2,1)M2,2,10.170.94
Z2,3IN-0.61−5% (Φ2,1)M2,3,10.520.82
V3Φ3,193%Z3,1INexplosion, environmental contamination0.58−55% (Φ3,1)M3,1,10.050.92
−34% (Φ3,2)
−65% (Φ3,3)M3,1,20.75
Φ3,293%Z3,2INfire0.52−41% (Φ3,1)M3,2,10.140.83
−27% (Φ3,2)
−38% (Φ3,3)
Φ3,393%Z3,3IN-0.49−18% (Φ3,1)M3,3,10.260.36
−19% (Φ3,2)
−15% (Φ3,3)

An example of synthetic characteristics of the stage of MSMCIS (Source: Wiśniewski, 2019, p.86)

The name of the stageEstablishment of a team
The goal of the stageUsed utilitiesInput dataOutput data
Establishment of the list of members in the analytical team responsible for CI securityModel of CI situationMatrix of competenceCharacteristics of CIList of CI stakeholdersList of analytical team members
Procedure

analysis of stakeholders considered IK and selection of team members

evaluation of matrix of analytical team competence

Synthetic record of the risk of functionality loss for considered CI entities after adding new safeguards (Source: Own elaboration)

CIThreatProbabilityEffectVulnerabilitySafeguardInherent riskResidual risk
VαZα,βPΦα,γΔΦα,γUα,βΣMα,β,λRiRr
V1Z1,10.7Φ1,147%0.880.8828.95%0.00%
Φ1,237%22.79%0.00%
Φ1,313%8.01%0.00%
Z1,20.56Φ1,142%0.810.7219.05%2.12%
Φ1,239%17.69%1.97%
Φ1,346%20.87%2.32%
Z1,30.81Φ1,19%0.310.292.26%0.15%
Φ1,39%2.26%0.15%
Sum of risk forΦ1,150.26%2.26%
Φ1,240.48%1.97%
Φ1,331.13%2.46%

List of CI systems in the EU and Poland (Source: Dz.U.UE., 2008, No. 345, Item 75, Article 2b; Dz.U., 2019, Item 209, Article 3, Point 2)

European CI systemsPolish CI systems

Electricity

Oil

Gas

Road transport

Rail transport

Air transport

Inland waterways transport

Ocean and short-sea shipping and ports

Energy, fuel and energy supply systems

Communication systems

Tele-information network systems

Financial systems

Food supply systems

Water supply systems

Health protection systems

Transportation systems

Rescue systems

Systems ensuring the continuity of public administration activities

Systems of production, storing and use of chemical and radioactive substances, including pipelines for hazardous substances

Synthetic record of the risk of functionality loss for considered CI entities (Source: Wiśniewski, 2019, p.105)

CIThreatProbabilityEffectVulnerabilitySafeguardInherent riskResidual risk
VαZα,βPΦα,γΔΦα,γUα,βMα,βRiRr
V1Z1,10.7Φ1,147%0.880.7728.95%3.62%
Φ1,237%22.79%2.85%
Φ1,313%8.01%1.00%
Z1,20.56Φ1,142%0.810.1619.05%15.29%
Φ1,239%17.69%14.20%
Φ1,346%20.87%16.74%
Z1,30.81Φ1,19%0.310.162.26%1.09%
Φ1,39%2.26%1.09%
Sum of risk forΦ1,150.26%20.00%
Φ1,240.48%17.05%
Φ1,331.13%18.84%
V2Z2,10.42Φ2,194%0.560.4522.11%4.34%
Z2,20.35Φ2,148%0.910.1715.29%12.43%
Z2,30.61Φ2,15%0.820.522.50%0.92%
Sum of risk forΦ2,239.90%17.69%
V3Z3,10.58Φ3,155%0.920.829.35%3.83%
Φ3,234%18.14%2.37%
Φ3,365%34.68%4.52%
Z3,20.52Φ3,141%0.830.1417.70%14.71%
Φ3,227%11.65%9.69%
Φ3,338%16.40%13.63%
Z3,30.49Φ3,118%0.360.263.18%0.88%
Φ3,219%3.35%0.93%
Φ3,315%2.65%0.74%
Sum of risk forΦ3,150.22%19.42%
Φ3,233.15%12.99%
Φ3,353.73%18.89%