Show simple item record

dc.contributor.authorKatina, Joana,
dc.contributor.authorPlėta, Tomas,
dc.contributor.authorPetkevičius, Romualdas,
dc.contributor.authorLelešienė, Lina,
dc.date.accessioned2023-12-22T07:06:11Z
dc.date.available2023-12-22T07:06:11Z
dc.date.issued2023.
dc.identifier.issn2345-0282
dc.identifier.other(crossref_id)146213212
dc.identifier.urihttps://etalpykla.vilniustech.lt/xmlui/handle/123456789/153593
dc.description.abstractAcceleration of scientific and technical progress, speeding up of technological changes, IT process globalisation and integration of OT processes invoked new challenges in preparing cyber strategies. Issues with adapting strategy for a particular specificity, region and specific cyber-attacks are not applicable. Therefore, a natural need arises to adjust the process for future cyber-attacks. It should be noted that the vast majority of organisations still need to possess a strategy that has been developed in correlation with future cyber-attacks. A part of organisations, irrespective of the lack of methodology and necessary infrastructure at the initial stage, commenced applying strategic management methods as a more dynamic environment demanded adequate changes in the cyber security within the organisation itself. The organisation started to plan such changes because, at the initial stage of the strategic management theory development, the strategy was understood as a plan drawn up to achieve the set objectives, regardless of the future need. Implementing such strategic procedures is grounded on something other than scientific calculations and is often associated with excessive use of funds. Therefore, the main goal of this article is to determine how much the r-Interdiction Median Problem with Fortification (RIMF) module can be used as a model for deciding methods for protecting critical infrastructure systems.eng
dc.formatPDF
dc.format.extentp. 86-96.
dc.format.mediumtekstas / txt
dc.language.isoeng
dc.relation.isreferencedbyRePec
dc.relation.isreferencedbyEconBiz
dc.relation.isreferencedbyIndex Copernicus
dc.rightsLaisvai prieinamas internete.
dc.source.urihttps://talpykla.elaba.lt/elaba-fedora/objects/elaba:184509859/datastreams/MAIN/content
dc.titleIndustrial Control Systems (ICS) cyber prediction model /
dc.typeStraipsnis kitoje DB / Article in other DB
dcterms.licenseCreative Commons – Attribution – 4.0 International
dcterms.references26
dc.type.pubtypeS3 - Straipsnis kitoje DB / Article in other DB
dc.contributor.institutionVilniaus universitetas
dc.contributor.institutionVilniaus Gedimino technikos universitetas
dc.contributor.institutionMykolo Romerio universitetas
dc.contributor.facultyVerslo vadybos fakultetas / Faculty of Business Management
dc.subject.researchfieldT 007 - Informatikos inžinerija / Informatics engineering
dc.subject.encyber security
dc.subject.enfortification
dc.subject.encritical infrastructure
dc.subject.enr-Interdiction Median Problem with Fortification
dcterms.sourcetitleInsights into regional development.
dc.description.issueno. 1
dc.description.volumevol. 5
dc.publisher.nameVšĮ Entrepreneurship and Sustainability Center
dc.publisher.cityVilnius
dc.identifier.doi146213212
dc.identifier.doi10.9770/IRD.2023.5.1(6)
dc.identifier.elaba184509859


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record