dc.contributor.author | Katina, Joana, | |
dc.contributor.author | Plėta, Tomas, | |
dc.contributor.author | Petkevičius, Romualdas, | |
dc.contributor.author | Lelešienė, Lina, | |
dc.date.accessioned | 2023-12-22T07:06:11Z | |
dc.date.available | 2023-12-22T07:06:11Z | |
dc.date.issued | 2023. | |
dc.identifier.issn | 2345-0282 | |
dc.identifier.other | (crossref_id)146213212 | |
dc.identifier.uri | https://etalpykla.vilniustech.lt/xmlui/handle/123456789/153593 | |
dc.description.abstract | Acceleration of scientific and technical progress, speeding up of technological changes, IT process globalisation and integration of OT processes invoked new challenges in preparing cyber strategies. Issues with adapting strategy for a particular specificity, region and specific cyber-attacks are not applicable. Therefore, a natural need arises to adjust the process for future cyber-attacks. It should be noted that the vast majority of organisations still need to possess a strategy that has been developed in correlation with future cyber-attacks. A part of organisations, irrespective of the lack of methodology and necessary infrastructure at the initial stage, commenced applying strategic management methods as a more dynamic environment demanded adequate changes in the cyber security within the organisation itself. The organisation started to plan such changes because, at the initial stage of the strategic management theory development, the strategy was understood as a plan drawn up to achieve the set objectives, regardless of the future need. Implementing such strategic procedures is grounded on something other than scientific calculations and is often associated with excessive use of funds. Therefore, the main goal of this article is to determine how much the r-Interdiction Median Problem with Fortification (RIMF) module can be used as a model for deciding methods for protecting critical infrastructure systems. | eng |
dc.format | PDF | |
dc.format.extent | p. 86-96. | |
dc.format.medium | tekstas / txt | |
dc.language.iso | eng | |
dc.relation.isreferencedby | RePec | |
dc.relation.isreferencedby | EconBiz | |
dc.relation.isreferencedby | Index Copernicus | |
dc.rights | Laisvai prieinamas internete. | |
dc.source.uri | https://talpykla.elaba.lt/elaba-fedora/objects/elaba:184509859/datastreams/MAIN/content | |
dc.title | Industrial Control Systems (ICS) cyber prediction model / | |
dc.type | Straipsnis kitoje DB / Article in other DB | |
dcterms.license | Creative Commons – Attribution – 4.0 International | |
dcterms.references | 26 | |
dc.type.pubtype | S3 - Straipsnis kitoje DB / Article in other DB | |
dc.contributor.institution | Vilniaus universitetas | |
dc.contributor.institution | Vilniaus Gedimino technikos universitetas | |
dc.contributor.institution | Mykolo Romerio universitetas | |
dc.contributor.faculty | Verslo vadybos fakultetas / Faculty of Business Management | |
dc.subject.researchfield | T 007 - Informatikos inžinerija / Informatics engineering | |
dc.subject.en | cyber security | |
dc.subject.en | fortification | |
dc.subject.en | critical infrastructure | |
dc.subject.en | r-Interdiction Median Problem with Fortification | |
dcterms.sourcetitle | Insights into regional development. | |
dc.description.issue | no. 1 | |
dc.description.volume | vol. 5 | |
dc.publisher.name | VšĮ Entrepreneurship and Sustainability Center | |
dc.publisher.city | Vilnius | |
dc.identifier.doi | 146213212 | |
dc.identifier.doi | 10.9770/IRD.2023.5.1(6) | |
dc.identifier.elaba | 184509859 | |