THE CYBER SECURITY OF CRITICAL INFRASTRUCTURES IN AN INCREASINGLY CONNECTED WORLD
In an increasingly connected world, critical infrastructures have become more vulnerable than ever to cyber security threats, whether they come from national states, criminal organizations or individuals. This new vulnerability stems from fundamental changes in the technological systems of organizations (government and private). In this regard, the Virtual Critical Infrastructure of any organization / nation represents an arena where security is absolutely imperative. Cyber protection has become crucial in every sector of activity, and the absence of measures to protect critical infrastructures threatens to cause huge damage to the functioning of the company.
Rizea, M. et al. UN (United Nations). World Urbanization Prospects: The 2018 Revision, Key Facts. 2018.
Available online: https://population.un.org/wup/Publications/Files/WUP2018-KeyFacts.pdf (accessed on
Riffat, S.; Powell, R.; Aydin, D. Future cities and environmental sustainability. Future Cities Environ. 2016, 2,
Hay, A.H.; Willibald, S. Making Resilience Accessible. Access: An Enabler of Community Resilience.
Southern Harbour. 2017. Available online: https://www.southernharbour.net/assets/docs/SH_Access%
WhitePaper_2017_0307%C6%92.pdf (accessed on 14 January 2019).
Hay, A. Surviving catastrophic events: Stimulating community resilience. In Infrastructure Risk and Resilience:
Transportation; IET: Stevenage, UK, 2013; pp. 41–46.
Alexandrescu, G., Văduva, Gh. Infrastructuri critice. pericole, ameninţări la adresa acestora. sisteme de protecţie. Editura Universităţii Naţionale de Apărare „Carol I”, Bucureşti, 2006.
How to Cite
The published articles are subject to copyright law. All rights are reserved to the “Carol I” National Defense University, regardless of whether all or part of the material are considered, especially the rights to translation, reprinting, re-use of illustrations, quotations, broadcasting through the media, reproduction on microfilms or any other way and storage in data banks. Any replicas without the associated fees are authorized provided the source is acknowledged.