Data Governance to Counter Hybrid Threats against Critical Infrastructures

Author:

Pestana Gabriel1ORCID,Sofou Souzanna2

Affiliation:

1. INOV—INESC Inovação, 1000-029 Lisbon, Portugal

2. SATWAYS Ltd., 14122 Athens, Greece

Abstract

Hybrid threats exploit vulnerabilities in digital infrastructures, posing significant challenges to democratic countries and the resilience of critical infrastructures (CIs). This study explores integrating data governance with business process management in response actions to hybrid attacks, particularly those targeting CI vulnerabilities. This research analyzes hybrid threats as a multidimensional and time-dependent problem. Using the Business Process Model and Notation, this investigation explores data governance to counter CI-related hybrid threats. It illustrates the informational workflow and context awareness necessary for informed decision making in a cross-border hybrid threat scenario. An airport example demonstrates the proposed approach’s efficacy in ensuring stakeholder coordination for potential CI attacks requiring cross-border decision making. This study emphasizes the importance of the information security lifecycle in protecting digital assets and sensitive information through detection, prevention, response, and knowledge management. It advocates proactive strategies like implementing security policies, intrusion detection software tools, and IT services. Integrating Infosec with the methodology of confidentiality, integrity, and availability, especially in the response phase, is essential for a proactive Infosec approach, ensuring a swift stakeholder response and effective incident mitigation. Effective data governance protects sensitive information and provides reliable digital data in CIs like airports. Implementing robust frameworks enhances resilience against hybrid threats, establishes trusted information exchange, and promotes stakeholder collaboration for an emergency response. Integrating data governance with Infosec strengthens security measures, enabling proactive monitoring, mitigating threats, and safeguarding CIs from cyber-attacks and other malicious activities.

Funder

European Union

Publisher

MDPI AG

Reference30 articles.

1. Cybersecurity in the Digital Age: Developing Robust Strategies to Protect against Evolving Global Digital Threats and Cyber Attacks;Sendjaja;Int. J. Sci. Soc.,2024

2. Savolainen, J. (2019). Hybrid Threats and Vulnerabilities of Modern Critical Infrastructure—Weapons of Mass Disturbance (WMDi)?, Hybrid CoE—The European Centre of Excellence for Countering Hybrid Threats.

3. European Commission (2024, May 24). EU-HYBNET—Empowering a Pan-European Network to Counter Hybrid Threats. Grant Agreement No. 883054. Available online: https://euhybnet.eu/.

4. Giannopoulos, G., Smith, H., and Theocharidou, M. (2021). The Landscape of Hybrid Threats: A Conceptual Model (Public Version), Publications Office of the European Union. EUR 30585 EN.

5. Composite Indicators Used in Measuring Hybrid Threats;Andreica;Proc. Int. Conf. Bus. Excell.,2023

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3