{"id":3190,"date":"2024-10-17T13:49:03","date_gmt":"2024-10-17T10:49:03","guid":{"rendered":"https:\/\/fti.dp.ua\/conf\/?p=3190"},"modified":"2024-10-17T13:49:05","modified_gmt":"2024-10-17T10:49:05","slug":"10177-1340","status":"publish","type":"post","link":"https:\/\/fti.dp.ua\/conf\/2024\/10177-1340\/","title":{"rendered":"Cyber \u200b\u200bsecurity of critical infrastructure: challenges of innovation and threats of digital technologies"},"content":{"rendered":"\n<h1 class=\"wp-block-heading citation_title\">Cyber \u200b\u200bsecurity of critical infrastructure: challenges of innovation and threats of digital technologies<\/h1>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<h5 class=\"wp-block-heading citation_author\"><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong>Anna Andrukh<\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/h5>\n\n\n\n<p class=\"citation_author_url\"><em>ORCID: <a href=\"https:\/\/orcid.org\/0009-0001-7175-8199\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/orcid.org\/0009-0001-7175-8199<\/a><\/em><\/p>\n\n\n\n<p><em>State University of Trade and Economics<\/em><\/p>\n<\/div><\/div>\n\n\n\n<div style=\"height:1em\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<h5 class=\"wp-block-heading citation_author\"><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong>Yurii Yurchenko<\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/h5>\n\n\n\n<p class=\"citation_author_url\"><em>ORCID: <a href=\"https:\/\/orcid.org\/0000-0002-8047-7647\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/orcid.org\/0000-0002-8047-7647<\/a><\/em><\/p>\n\n\n\n<p><em>State University of Trade and Economics<\/em><\/p>\n<\/div><\/div>\n\n\n\n<div style=\"height:1em\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Purpose<\/strong>. The article aims to explore the characteristics, development prospects, and potential threats associated with the cybersecurity of critical infrastructure. As critical systems become increasingly dependent on digital technologies and inter-connected networks, safeguarding these infrastructures from cyberattacks is par-amount. <strong>Design \/ Method \/ Approach<\/strong>. This research adopts a conceptual ap-proach, drawing from case studies, technical reports, and regulatory frameworks to synthesize the current state of cybersecurity in sectors like energy, telecommunications, and transportation. The study evaluates the integration of emerging technologies such as Artificial Intelligence (AI) and Internet of Things (IoT) in enhancing the resilience of critical systems, while highlighting their vulnerabilities. <strong>Findings<\/strong>. The research demonstrates that although AI and IoT technologies are enhancing efficiency and control, they also introduce significant risks, including new cybersecurity challenges, regulatory gaps, and vulnerabilities in supervisory control systems like SCADA. <strong>Theoretical Implications<\/strong>. This study contributes to a deeper theoretical understanding of critical infrastructure cybersecurity by ad-dressing both the opportunities and risks associated with technological advance-ments. It offers a conceptual model for balancing innovation with security measures. <strong>Practical Implications<\/strong>. For policymakers and practitioners, the paper provides actionable recommendations on strengthening regulatory frameworks, improving resilience to cyberattacks, and implementing more secure IoT and AI deployments in critical systems. <strong>Originality \/ Value<\/strong>. The research offers a com-prehensive overview of the dual nature of technological advancements in critical infrastructure, combining analysis of cybersecurity innovations with an exploration of the challenges and gaps that need to be addressed. <strong>Research Limitations \/ Future Research<\/strong>. The study relies on available literature and reports; future re-search should involve empirical investigations on the long-term impact of cyber-security measures in critical infrastructure.<\/p>\n\n\n\n<div style=\"height:18px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-right is-layout-flex wp-container-core-buttons-is-layout-765c4724 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/cims.fti.dp.ua\/j\/article\/view\/210\" target=\"_blank\" rel=\"noreferrer noopener\">ACCESS ARTICLE<\/a><\/div>\n<\/div>\n\n\n\n<div style=\"height:18px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-default\"\/>\n\n\n\n<div style=\"height:1em\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group is-vertical is-content-justification-right is-layout-flex wp-container-core-group-is-layout-b6c475e2 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-group is-content-justification-right is-nowrap is-layout-flex wp-container-core-group-is-layout-fd526d70 wp-block-group-is-layout-flex\"><div class=\"taxonomy-post_tag wp-block-post-terms\"><a href=\"https:\/\/fti.dp.ua\/conf\/tag\/cims-2024-autumnal\/\" rel=\"tag\">CIMS 2024 Autumnal<\/a><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2024-10-17T13:49:03+03:00\">October 17, 2024<\/time><\/div><\/div>\n\n\n<div class=\"taxonomy-category wp-block-post-terms\"><a href=\"https:\/\/fti.dp.ua\/conf\/session\/info-tech-2\/\" rel=\"tag\">Information Technology and Cybersecurity<\/a><\/div><\/div>\n\n\n\n<div style=\"height:1em\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-default\"\/>\n","protected":false},"excerpt":{"rendered":"<p>Cyber \u200b\u200bsecurity of critical infrastructure: challenges of innovation and threats of digital technologies Anna Andrukh ORCID: https:\/\/orcid.org\/0009-0001-7175-8199 State University of Trade and Economics Yurii Yurchenko ORCID: https:\/\/orcid.org\/0000-0002-8047-7647 State University of Trade and Economics Purpose. The article aims to explore the characteristics, development prospects, and potential threats associated with the cybersecurity of critical infrastructure. As critical systems become increasingly dependent on digital technologies and inter-connected networks, safeguarding these infrastructures from cyberattacks is par-amount. Design \/ Method \/ Approach. This research adopts &hellip; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[35],"tags":[38],"class_list":["post-3190","post","type-post","status-publish","format-standard","hentry","category-info-tech-2","tag-cims-2024-autumnal"],"_links":{"self":[{"href":"https:\/\/fti.dp.ua\/conf\/wp-json\/wp\/v2\/posts\/3190","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fti.dp.ua\/conf\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fti.dp.ua\/conf\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fti.dp.ua\/conf\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/fti.dp.ua\/conf\/wp-json\/wp\/v2\/comments?post=3190"}],"version-history":[{"count":1,"href":"https:\/\/fti.dp.ua\/conf\/wp-json\/wp\/v2\/posts\/3190\/revisions"}],"predecessor-version":[{"id":3191,"href":"https:\/\/fti.dp.ua\/conf\/wp-json\/wp\/v2\/posts\/3190\/revisions\/3191"}],"wp:attachment":[{"href":"https:\/\/fti.dp.ua\/conf\/wp-json\/wp\/v2\/media?parent=3190"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fti.dp.ua\/conf\/wp-json\/wp\/v2\/categories?post=3190"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fti.dp.ua\/conf\/wp-json\/wp\/v2\/tags?post=3190"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}