Skip to main content
Top

2024 | Book

Critical Infrastructure Protection in the Light of the Armed Conflicts

Editors: Tünde Anna Kovács, Zoltán Nyikes, Tamás Berek, Norbert Daruka, László Tóth

Publisher: Springer Nature Switzerland

Book Series : Advanced Sciences and Technologies for Security Applications

insite
SEARCH

About this book

This book summarizes the latest findings in critical infrastructure protection and related research areas. Armed conflicts and wars are now closer to Europe than at any time in the last several decades, and the protection of critical infrastructures has gained new prominence. This situation has also revealed the vulnerability of critical infrastructure and the importance of its protection.

The development of technologies, cybertechnologies, and digitalization in all aspects of our daily lives implies new security challenges in critical infrastructure protection and security science and this book addresses the four main dimensions of critical infrastructure protection:
1. Physical protection
2. Cybersecurity
3. Political security
4. Individual security

The issue of physical security has accompanied humanity since its birth. Nowadays, this issue has become even more important due to technological advances, as this is the security area that people physically experience—physical protection, including protection against explosions and ballistic attacks, but also defense of objects and guaranteeing transportation security.

Cyberspace represents the fifth domain of warfare and a central security question in our age. The base of cyberspace defense is high-quality hardware and expert support. With our lives increasingly digital, cybersecurity's core elements include safety awareness and informatics.

Political security, the third dimension, is shaped by diverse political ideologies influencing economies, societies, and other aspects of life. This book explores topics such as migration policies, defense against terrorism, national and international security, and public safety.

The fourth dimension, individual security, spans healthcare, food safety, energy supplies, and economic security. Each chapter of this book emphasizes security, focusing on Central Europe while addressing global concerns. Authored by researchers, experts, and scholars, this book is invaluable for Ph.D. students, professionals, and educators worldwide.

The fourth dimension, individual security, spans healthcare, food safety, energy supplies, and economic security. Each chapter of this book emphasizes security, focusing on Central Europe while addressing global concerns. Authored by researchers, experts, and scholars, this book is invaluable for Ph.D. students, professionals, and educators worldwide.

The fourth dimension, individual security, spans healthcare, food safety, energy supplies, and economic security. Each chapter of this book emphasizes security, focusing on Central Europe while addressing global concerns. Authored by researchers, experts, and scholars, this book is invaluable for Ph.D. students, professionals, and educators worldwide.

The fourth dimension, individual security, spans healthcare, food safety, energy supplies, and economic security. Each chapter of this book emphasizes security, focusing on Central Europe while addressing global concerns. Authored by researchers, experts, and scholars, this book is invaluable for Ph.D. students, professionals, and educators worldwide.

The fourth dimension, individual security, spans healthcare, food safety, energy supplies, and economic security. Each chapter of this book emphasizes security, focusing on Central Europe while addressing global concerns. Authored by researchers, experts, and scholars, this book is invaluable for Ph.D. students, professionals, and educators worldwide.

The fourth dimension, individual security, spans healthcare, food safety, energy supplies, and economic security. Each chapter of this book emphasizes security, focusing on Central Europe while addressing global concerns. Authored by researchers, experts, and scholars, this book is invaluable for Ph.D. students, professionals, and educators worldwide.

The fourth dimension, individual security, spans healthcare, food safety, energy supplies, and economic security. Each chapter of this book emphasizes security, focusing on Central Europe while addressing global concerns. Authored by researchers, experts, and scholars, this book is invaluable for Ph.D. students, professionals, and educators worldwide.

Table of Contents

Frontmatter
Intelligence and Protection of Key (Critical) Infrastructure Objects

The protection of critical infrastructure has always been one of the priorities of every state. Simply, without the normal functioning of key infrastructure facilities, the whole society and the state are prevented from normal functioning. The Russian aggression against Ukraine showed all the cruelty of war, but also the importance of the functioning of key infrastructure facilities. The merciless war and the planners of that war designated water sources, water supply, power transmission lines, hydropower plants, thermal power plants, heating plants, and nuclear power plants as the main targets. These objects were not only the target of kinetic force projection but were also attacked from the cyber zone. The role of the intelligence services in the protection of critical infrastructure facilities is irreplaceable considering the mechanisms and information that the intelligence services have at their disposal. It is also important to point out that the process of educating members of the security services and intelligence services that deal with the protection of critical infrastructure is extremely important because through this process new threats are detected that come from different sources with the application of different enforcement techniques.

Darko Trifunovic
Examination of UV Radiation During Inert Gas Arc Welding

During the arc welding process, many parameters must be taken into account to create the right joint. For this reason, the welding parameters are of particular importance during the procedure. On the other hand, technologists only recently started focusing on dealing with the harmful effects that occur during welding. Arc welding is one of the widely used processes in industrial practice, so we focused our research primarily on this technology and prepared our experiments to measure the ultraviolet (UV) radiation generated in the process. Among the processes, arc welding with shielding gas is the most frequently used process, which must be investigated from the point of view of UV radiation, after several studies have shown that arc welding with coated electrodes has a lower intensity of UV radiation than other arc welding processes. Our main goal is to determine the appropriate measurement technique for the UV radiation produced during arc welding depending on the type of shielding gas. In addition, it is also worth mentioning that this procedure is widespread in mechanized and automated industrial practice, so the research aims to designate a possible safety zone depending on the harmful radiation during industrial application.

Márton Schramkó, Péter Pinke, Tünde Anna Kovács
Current Legal Challenges Related to Social Networking Sites

The way social networking sites work can be seen as extremely complex. There are a number of issues associated with them that could even challenge the functioning of states. The largest global social platforms set their own operational framework, making it extremely difficult for state legislation and enforcement to effectively keep up with the pace they dictate. In this paper, we outline the legal challenges posed by social networking sites, outlining the areas of law involved and suggesting possible solutions. Our analysis is of an overview nature, drawing on Hungarian and some European Union and European state regulations and good practices.

Csenge Halász
Cyber Threats to Consumers and Other Risks in the Field of E-commerce Security

The acceleration of digitalization has been driven by the strong stimulus of the digital revolution announced by the European Union, social and economic conditions, and the Covid-19 pandemic. In this context, e-commerce in Hungary grew by nearly 35% in 2019 and 2020. However, the acceleration of digitalization has also been accompanied by an increase in risks. In the European Union, the NIS 2 Directive, published in December 2022, entered into force on 16 January 2023. Member states have 21 months from the entry into force of the NIS 2 Directive to transpose its provisions into national law, with a final deadline of October 2024. The NIS 2 Directive defines the actors in critical sectors and other critical sectors, which include digital service providers, online marketplace providers, online search engine providers and social media platform providers. The NIS 2 Directive sets out a common cybersecurity regulatory framework aimed at enhancing the level of cybersecurity in the European Union. The cybersecurity aspects of e-commerce are also affected by several consumer protection legislations adopted in the European Union, which approach the issue from the consumer rights perspective. One of the most significant risks is the marketing of counterfeit or unsafe products.

Judit Barta, Zita Nyikes
Space Weather Effects on Critical Infrastructure

Gas pipelines, transmission lines, overhead wires, transformers, GNSS navigation, and telecommunication systems are part of critical infrastructure. Industry, transportation, service operations, farming, and everyday life highly depend on this infrastructure. However, these systems are very sensitive to solar activity. Therefore, all activities above are vulnerable and defenseless against the catastrophic changes in Earth’s cosmic environment. The Solar System is dominated by the influence of our star. In the Solar System, all objects are gravitationally bound and the radiation of the Sun provides the energy for example for the terrestrial biosphere. A small fraction of the energy produced in the core of our star turns into a magnetic field and emits the constant high-velocity flow, the solar wind. Solar magnetic activity produces radiation and ejects matter from the upper atmosphere of our star. The magnetic field of the solar wind interacts with the planetary magnetic fields and atmospheres. These phenomena, called Space Weather have a serious influence on the radiation environment of Earth where telecommunication, Global Navigation Satellite System, meteorological, and other purpose satellites are located. The conductivity and transparency of the higher partly ionized atmospheric layer, the ionosphere also depend on solar radiation and activity. This fact makes the navigation and communication systems dependent on solar activity. Finally, the solar magnetic activity creates magnetic variations in the terrestrial magnetic field and induces currents in gas pipelines, transmission lines, overhead wires, and transformers. In this short briefing, we introduce the solar activity phenomena, and their influence on our planet’s cosmic neighborhood and pro- vide a detailed description of the Space Weather effects on critical infrastructure. We describe the Hungarian national and global space weather forecast centres and capabilities. Finally, we share some guidelines on how to prepare for extreme space weather events.

Gábor Facskó, Gergely Koban, Nikolett Biró, Munkhjargal Lkhagvadorj
Exploring the Nexus Between Critical Infrastructure, Fragility and Peace Operations

It is said that the end purpose of a peace mission is to win people’s hearts and minds. And when it comes to winning them, infrastructure seems to be the ‘arms and legs’, through which it becomes possible. According to the United Nations Office for Project Services (UNOPS), infrastructure is a ‘double-edged sword’, and should be understood as systems comprised of assets, institutions and knowledge. In fragile contexts, states are usually unable to commit to the major financial investments required to maintain state functionality and preserve social order and stability without international support. Therefore, it is important to clarify how critical infrastructure can be interpreted and used during and after armed conflicts and explore the politics of the built environment in conflict-torn societies, especially when an international peace operation is to be deployed. The aim of this paper is to add some comments to such topics by outlining five ways through which the nexus between critical infrastructure and peace operations can be better grasped and to explore how the latter can break the vicious circle of (infrastructural) fragility.

Richárd Schneider
Terrorist Threats to African Hospitals

This research is conducted on health facilities, their security staff and their relationship with terrorist attacks. The article is comprised of various chapters, to clarify the different kinds of aspects of terrorist activities regarding hospitals and their staff. The author begins by analysing the armed attacks on hospitals, then he goes on to examine the hospitals’ staff’s involvement in the terrorist acts, and finally, he concludes with the situation of the healthcare facilities. He goes on to examine the various dangers that the healthcare facilities are prone to on the continent, and he tries to do is outmost to describe the terrorist activities that threaten the countries at stake. He summarizes the article by giving his findings about how the threats should be eliminated at the institutions. He hopes to give some interesting insights into what relations are between terrorist acts and healthcare facilities.

János Besenyő
Surface Modification of Metallic Materials Using Laser and Plasma Technologies

This paper explores three different methods for improving the surface properties of various materials based on laser and plasma technologies. In the first study, electrochemically deposited gold on the surface of commercially pure titanium was remelted using a laser, resulting in the formation of a mechanically robust surface containing the intermetallic Ti3Au. This surface also showed improved roughness and biocompatibility, making it well-suited for biomedical applications. Similarly in the second study, laser surface texturing of Ti6Al4V was followed by the deposition of a ZnO thin film using atomic layer deposition (ALD) technology. This resulted in a surface that was more corrosion resistant and had enhanced tribological properties, making it ideal for use in various but mainly biomedical applications. Finally, the third study explored the use of powder plasma transferred arc welding (PPTAW) technology to coat the surface of structural steel with a nickel-based MMC containing WC reinforcement. This coating significantly improved the abrasive wear performance of the steel substrate. These studies demonstrate the effectiveness of various surface modification techniques for improving the properties of different materials and highlight the potential for these techniques in a range of nowadays advanced applications.

Marcin Adamiak, Augustine N. S. Appiah, Anna Woźniak, Oktawian Bialas
Threats and Vulnerabilities in Web Applications and How to Avoid Them

This paper presents the 10 most common web threats and vulnerabilities, determined by OWASP Foundation. Daily, individuals make use of web applications and websites to read, gather, and exchange a massive amount of information. That is the reason why web developers and users of web applications must increase awareness of potential threats and expand their knowledge of web security. The introduction part brings information about OWASP Foundation and deals with terms of web application security. The main reasons for security problems in the development and usage of web applications are given. Key concepts of web application security are described. In the chapter, the Top 10 web application security risks are presented. Based on several examples, possible security flaws are shown and explained. For each threat, several potential scenarios are listed, highlighting areas to be mindful of and providing guidance on safeguarding against them.

Zlatko Čović
Managing Climate Change Risks in Critical Infrastructure Protection with Examples from the European Financial Sector

Extreme weather events fostered by climate change jeopardise the smooth operation of critical infrastructures and thus threaten the availability of essential services, including financial services. As these extreme events are predicted to become more frequent, the proper management of natural hazards is essential in critical infrastructure protection. This paper first describes the risk management of natural hazards. Then examines the European financial sector approaches the issue of climate change and natural hazards in general, based on publicly available sector-specific data. It will then give an overview of the preparedness of some European banks, based on our survey. In the end it attempts to identify areas for further improvement. Although the focus has been put on the members of the European banking industry, the results and conclusions may be applicable in other sectors as well. Moreover, the findings and best practices may be of service to auditors, legislators and researchers.

Tamás Somogyi
Bionic Hand with Phalanx Built-In Servos

Losing one or both hands is a devastating experience, as the human hand is used for numerous activities, such as eating, working or conveying emotions. Thus, restoring a lost limb is a rather important goal, to give back a crucial functionality to a person who was lost. Currently, most academic papers use a muscle-like approach to achieve such an object, while commercially available solutions to restore one’s limb are done by embedded motors and controllers. In this paper, we focus on creating a prosthetic hand, as close to biomimicry as possible, by embedding a DC motor, a controller, and a series of gears into each phalanx of the hand, which could be used as a prosthetic hand close to biomimicry. This is achieved with inexpensive and readily available components and technologies such as 3D printing, keeping the device’s costs to a minimum. With said device, we hope to discover the reason why institutes prefer one approach to another.

Daniel Sályi, Döníz Borsos
Review of the Maintenance Strategies, and Failures in the Aspects of the Reliability

In this paper, the life cycle of an industrial machine is reviewed. Changes in condition during normal use of the machine or machine component are shown, and the effect of maintenance on this condition is also described. After a theoretical presentation of component life, an example with the probability of failure of in-flight failure cases is presented, followed by some statistical data on fracture failure. The article also covers maintenance strategies from run-to-failure to R and T strategies such as RCM, RBI, TQM and TPM. After the maintenance strategies, the technical diagnostics and its advantages are reviewed, then the vibration analysis in a simple case and the eddy current test are briefly examined in one example.

Csenge Huszák, Péter Pinke, Tünde Anna Kovács
The Use of Information Security Methods and Techniques in the Education of Software Engineers

This paper brings information about activities and information security methods and techniques that are used in the education of software engineers at Subotica Tech—College of Applied Sciences in Serbia. The objective of this paper is to outline the information security domains covered in the curriculum of Subotica Tech—College of Applied Sciences. These domains are integrated into various undergraduate and postgraduate courses offered by Subotica Tech. The education system incorporates innovative techniques, such as hackathon-based learning and collaborative team projects, to introduce new approaches and methodologies. The second chapter briefly describes the ISSES project that was crucial for developing a master’s program in information security. Information about B.Sc. and M.Sc. study programs at Subotica Tech is presented. Competition in information security which was conducted within the ISSES project is described. The following section provides information on a new approach in computer science education, HBL (Hackathon Based Learning). The main characteristics of HBL are outlined, along with the hackathon process itself, and examples from both academia and industry are presented. The next chapter offers details on the testing and implementation of methods to prevent threats defined in the OWASP Top 10 document. These methods and techniques are mandatory for students during creating their projects.

Zlatko Čović, Igor Fürstner
Risk Assessment of Industrial Collaborative Welding Robots: A Critical Review of Methodologies and Limitations

This review presents a comprehensive analysis of the risk assessment of collaborative welding robots in industrial applications that are designed to work alongside human operators, offering potential benefits such as increased productivity and improved worker safety. However, the use of this type of collaboration also introduces new risks, including collision with human operators and exposure to welding toxic hazards. In this paper, we will discuss various approaches for hazard identification and risk analysis through a general examination of the relevant literature on risk assessment methodologies including ISO Standards, the case studies highlight the importance of considering factors such as the robot’s speed and trajectory, welding materials, and the operator’s proximity to the robot, and strategies on how to eliminate the identified hazards or mitigate risks associated with the deployment of collaborative welding robots in industrial settings. This review provides valuable insights for industries or companies aiming to implement collaborative welding robots in their work environments while minimizing the potential hazards or risks associated with their use and ensuring the safety and well-being of their human operators.

Nada El Yasmine Aichaoui, Tünde Anna Kovács
Recommendations for the Creation of Usable Critical Infrastructure for the Delivery of Priority Services of State Bodies

This paper presents the conclusions derived from the experience of IT technicians employed in the state bodies of the Republic of Serbia during wartime and subsequent treatments of similar problems in a government environment. Due to global circumstances and given conditions, the experience was gained on specific needs and ways of designing and maintaining usable critical infrastructure to deliver priority services to state bodies. The experience is combined with expertise in implementing ISO standards in this area. The empirically recognized guidelines and solutions, supported with standards, can help create recommendations to tackle the problems following current events. These recommendations can be directed to IT experts employed in state bodies to allow them to be efficient in normal circumstances without infrastructure disruptions and in situations when total disruptions of critical infrastructure may occur. Maintaining priority services on such infrastructure is undoubtedly a technological but also an organizational and procedural challenge. The paper presents a global strategic-operational-tactical model emphasizing cooperation with procedural and organizational factors as a prerequisite for a functional technical framework for managing infrastructure.

Rade Dragović, Dalibor Dobrilovic, Dragan Dragović
Industrial IoT and 5G in Critical Information Infrastructures

Industrial IoT can revolutionize how products are manufactured, and industrial processes are managed, enabling real-time data collection and analysis. In addition, 5G and industrial IoT can revolutionize industrial companies’ operations by providing faster data transfer speeds, lower latency, and higher capacity. The author conducted a comparative analysis of academic literature and peer-reviewed reports to identify potential solutions for industrial IoT devices in critical infrastructures. Based on this, he examined how 5G technology can be deployed in critical infrastructures and their ability to support the industrial IoT devices and systems deployed there. The research found that 5G technology has the potential to enhance the security, reliability, and efficiency of critical infrastructures. However, implementing 5G technology in critical infrastructures requires careful consideration of various factors such as network coverage, latency, and interoperability. Furthermore, the study suggests that policymakers and industry leaders should collaborate to develop comprehensive guidelines and standards for securely deploying 5G technology in critical infrastructures. This will ensure that the benefits of 5G technology are maximized while minimizing potential risks.

Andras Toth
Analysis and Evaluation of the Transport Sector During the COVID-19 Epidemic: Budapest Versus Amman

The COVID-19 epidemic is considered a focal point in many ways and to fight the disease many countries adopted preventive instructions and forced procedures, this research will measure from the users’ perspective whether the applied restrictions on transportation and mobility that had been used during COVID 19 epidemic were efficient and worked effectively to prevent the spread of the disease, a questionnaire with the necessary tools was implemented to make a comparison between two capitals: Budapest_Hungary and Amman_Jordan. The major descriptive and analysis plan concentrated on the frequency of usage of each transport mode and outdoor activities as a matrix question before and during the epidemic with multiple-choice simultaneously in a grid format. The results were analyzed by utilizing SPSS and AMOS to reach the final model. Exploratory Factor Analysis (EFA) and Confirmatory Factor Analysis (CFA) were conducted to identify and explain the relationship between variables. After computing the measurement, the results showed that the best fit structural models for Amman and Budapest were improved significantly by utilizing the hypotheses together.

Malak Majed Shatnawi, Zoltán Rajnai
Future of BB-PPDR: Evolution and 5G Security Aspects

The aim of my research is to show what security challenges the future Unified Digital Radio Communications System (EDR) will face due to the current and future information security environment, the 5G technology to be used, and the possible involvement of public mobile operators.

Tamas Zsolt Kardos
Safety Requirement of Vehicle’s Design and Testing Methods

The article discusses passive testing regulations for new vehicles, which were introduced to improve vehicle safety. Passive tests are designed to measure a vehicle’s ability to protect its occupants in the event of a crash. European Union regulations require car manufacturers to subject their vehicles to rigorous passive testing before putting them on the market. These tests include crash tests that simulate different crash conditions to assess vehicle toughness and safety, the results of these tests are then published to allow consumers to compare the safety performance of different vehicle models. Car manufacturers are also evaluated on the results of these tests and can be penalized if they fail to meet established safety standards. Passive testing regulations have made significant progress in vehicle safety. Modern vehicles are equipped with advanced safety technologies such as airbags, pre-tensioner seat belts and child restraint systems, which were developed in response to the results of these tests.

Omar Trabelsi, Tünde Anna Kovács
Enhancing Cybersecurity in Industrial Control Systems Through GRC Framework: Principles, Regulations, and Risk Assessment

Information security’s primary purpose is to safeguard confidentiality, integrity, and availability. Moreover, as a result of the current global expansion, protecting ICS networks and infrastructure is a necessary activity. This article discusses the most important security strategy definitions, including the GRC, which is a framework for a comprehensive risk management strategy, plan, or foundation that identifies and categorizes all risks a company faces. The GRC framework directs the enterprise’s comprehensive response to risks and legal obligations. The writers also discussed information security concepts, physical security, and incident response.

Haya Altaleb, Zoltán Rajnai
Image Transmission with LoRaWAN in Agriculture

LoRaWAN technology is utilized in various critical infrastructure protection areas, including agriculture. Low data rates, small payload sizes, and long data transmission distances characterize this network communication technology. It can be a suitable choice for simple agricultural sensor data collection applications where small data sets need to be transmitted over distances of several kilometres at periodic intervals. However, image transmission is not a typical application, as LoRaWAN is not designed for this purpose. In agricultural applications, there may be cases where images need to be transmitted, but no cellular network is available. Such issues typically occur in agricultural areas in Africa. This research deals with image transmission solutions using LoRaWAN technology while considering the technological limitations associated with image transmission. In the case of pest monitoring, it may be necessary to send one or two images per day. The paper also describes relevant applications for LoRaWAN image transmission methods under various conditions.

Döníz Borsos
Creating Cyber Resiliency in Critical Infrastructures

Modern threat actors, also known as Advanced Persistent Threat (APT) groups, have devised complex, sophisticated ways and methods to infiltrate the IT/OT infrastructure, causing businesses to crumble and be left entirely at the mercy of these threat actors. Industries such as Water, Power, Nuclear, Energy, Health, Automobile, Banking Sector, Heavy Industries, Electricity generation, and others fall under the category of critical infrastructure. In the current year, nation-State threat actors have targeted various critical infrastructures, such as the Nuclear and Energy sectors. It is vital to note that critical infrastructure must be protected at all times, whether there is war, conflict, political unrest, or any other unforeseen circumstance. Sharing and transferring information across trusted boundaries and air-gapped systems have become essential in industries that rely on ubiquitous and interconnected systems. Such exchange of information should occur in a manner that does not expose sensitive information, critical systems, or networks and does not introduce security vulnerabilities. Organizations should not rely on a single security control but instead, adopt a solution that addresses multiple controls while working together. Secrecy, consistency, and availability of resources, systems, networks, or high-end industrial and manufacturing applications are three security demands that Cross-domain Solutions (CDS) solutions successfully fulfill.

Attila Mate Kovacs
Impacts of COVID on Cybersecurity

The COVID-19 pandemic has completely changed our daily lives, as we have become more dependent on digital services, including the Internet, than ever before due to confinement. Social distancing has been advised during the pandemic, so online infrastructure has become a central hub for communication, commerce, work and learning. The COVID-19 pandemic gave an unprecedented boost to the acceleration of digitization. Organizations were forced to quickly digitize their processes and business models, as well as create flexible and remote work environments, reach customers and manage employees primarily through digital channels. The new challenges created an opportunity for the cyber security sector to evolve and respond to the rapidly growing number of cyber security attacks and the growing number of cyber security attacks. Ignoring cyber-threats and cyber-attacks can have significant economic, reputational, operational, legal and compliance consequences, which is why dealing with the topic is justified. The publication examines and analyzes its impact on cyber risks during COVID-19, as well as mitigating measures that organizations can take.

Zsolt Mihály Szabó
Critical Infrastructure Protection Options Against the Misuse of Explosives

Today’s military actions have had an unprecedented impact on critical infrastructures and have put countries, the European commonwealths, in a very difficult situation. Attacks on infrastructures and the problems of their performance have caused and may continue to cause not only economic but also political crises. Critical infrastructures are threatened by a number of dangers, which are, above all, an unhelpful consequence of technological progress. Of these threats, the most brutal are those related to the misuse of explosives and explosives-related offences. Unfortunately, there are numerous examples of explosive attacks on critical infrastructure and the attacks are still tangible today. We must therefore look at ways and means of effectively countering blast attacks and draw conclusions from the attacks that have taken place that can make further defenses effective.

Norbert Daruka
Analysis of the Turbocompressor Rotor Dynamics Taking into Account Features of Active Magnetic Bearings Using Specialized Computing Systems

The article includes an analysis of various computational engineering analysis tools in terms of evaluating the dynamics of rotors in active magnetic bearings (AMBs). An analysis of the dynamics of the rotor of a turbocompressor of a gas-pumping unit is considered, taking into account AMBs which are used as systems for control of motion stability. Two different software packages were used to simulate the rotor dynamics of the rotor-AMBs system: the first is a package for general technical engineering analysis and the second is a specialized computing system for the simulation of rotor dynamics characteristics of different rotor-bearing systems. Both programs are based on the application of finite element methods. The work aims to identify the advantages and disadvantages of using different software packages for modelling and calculating rotor dynamics characteristics of the rotors supported by AMBs. The identification is based on various static and dynamic analyses. The results of numerical experiments are presented in the form of calculations of critical speeds and modes of oscillation (precession), as well as maps of the critical speeds and frequency–response characteristics. This makes it possible to judge the possibility of the resonance regimes of the system and prevent dangerous situations. Obtained results indicate the accuracy and adequacy of the results generated in different software packages. The results could be used to determine the applicability of certain software packages depending on the specific needs of researcher.

Mykhailo Kuchma, Gennadii Martynenko
The Possibility of Energy Enterprises Technological Units’ Protection from the Fragmentation Effect of Ammunition

The analysis of rocket and artillery strikes on the energy complex of Ukraine since February 24, 2022 has been carried out. It is shown that most of the country's energy infrastructure has received some kind of damage. Based on this, an analysis of the ammunition used for strikes was carried out, and their main characteristics were given. The analysis showed that most of the weapons have a high-explosive and fragmentation effect. The main structures for protecting open technological installations from fragments are considered. The main calculation methods for determining the probability of object hitting (an open technological installation) by a fragmentation field are considered. On the basis of the analysis, calculations of the damage probability and the possibility of protecting technological installations from frags were made. It is shown that the use of a protective structure makes it possible to reduce the probability of hitting an object at extreme distances up to 80% with a protection area of 10% of the vulnerable area to 99% with 90% of the vulnerable area.

Afanasenko Kostiantyn, Lypovyi Volodymyr, Kalchenko Yaroslav, Hryhorenko Oleksandr
Importance of Vehicle’s Unloaded Weight Optimization: The Personal Injury Severity Point of View

In the automotive industry, long-term sustainability, carbon–neutral production and vehicle operation have become the most important aspect to be achieved, for which manufacturers see the transition to full electrification as an option and a means to a long-term solution. In addition to meeting environmental concerns, it is also necessary to meet the needs and wishes of customers when designing new models. These are emerging on the market as requirements for range, safety and reliability, in addition to comfort needs. To meet environmental and user requirements at the same time, manufacturers have to make trade-offs, which are most evident in the weight of the vehicle. Unfortunately, based on the current state of the art, one of the most effective means of increasing traveling range is still to increase the number or size of batteries, which of course entails an increase in the weight of the vehicle. Increased unloaded weight means more kinetic energy and momentum during vehicle use, which clearly has a negative impact on the collision energy and the consequences of an accident. The present study therefore investigates the impact of the increasing presence of electric vehicles on public roads, using injury probability indicators for crash safety focusing for the head injury criteria.

József Kertész, Tünde Anna Kovács
Developing a Mesh for Electromagnetic Shielding of Vehicles’ Electronic Devices

Designing a new Faraday cage requires new material, which is lightweight and easy to manufacture, but metals like aluminium and steel are heavy materials. Therefore, this research aims to test the materials that can be good for electromagnetic shielding and lightweight, so copper, carbon fiber, and fiberglass have been tested to define their shielding effectiveness at the range of frequency between 320 and 960 MHz. An electromagnetic wave consists of a magnetic and electric field, so two types of antennae have been used in this research. The antennas are the Schwarzbeck USLP9143 log periodic antenna and the second magnetic loop antenna. The efficiency of the material that has been tested differs because of the frequency and the noisy source in the environment but all of them could be good materials for new composite material.

Mariam Shbanah, Tünde Anna Kovács, Zoltán Nyikes
Integrated Physical Protection of Emergency Water Production Facilities

In an emergency water production facility where a hazardous substance is also used, in addition to property protection, it is also vital to comply with safety regulations. Once the security concept has been developed, it is vital to design the right proportions of the defense subsystems when designing the complex security system. The author presents the specifics that need to be considered to implement integrated physical protection in the field of water supply.

Tamás Berek
Exploring Some Possible Applications of DRM Drones

The following study is going to present the possibilities for using drones in some technological aspects. One of these aspects is the use of drones as components of the critical infrastructure, while the second aspect is as a technology for the protection of the critical infrastructure. The author presents the already existing technologies as the solution that guarantees the functioning of critical infrastructures for years. Besides presenting the air, land and underwater applicability of these technologies, the author also presents the possibility of using a wonderful device called a drone.

Zoltán Nyikes, László Tóth
Application of Incremental Sheet Forming for Cladding Panels with Customized Design

Incremental sheet metal forming provides great freedom in unique and versatile shaping of sheet metal at low cost. Products may be industrial parts, design products, covering elements, or reengineered items. This technology may be applied to manufacture any product that requires small number of parts and possesses complicated geometry. In this work, forming development of incremental sheet forming production technology suitable for the industrial production of cladding panels is presented. The manufactured cladding panels may increase thermal energy efficiency, improve aesthetics, and may be used in fire protection. In this paper, the corresponding literature and technology review is presented, followed by the description of technology planning, and presenting the modular uniquely shaped protective wall cladding products with customized design aesthetics.

Richárd Baumgartner, Viktor Gonda
Hungarian Regulation of Personnel Entry Control to Nuclear Power Plant I

In Hungary, the minimum requirements for the physical protection of nuclear power plants are regulated by specific sectoral legislations, unlike other critical national installations, due to the specific characteristics of the field. To facilitate compliance with international standards, the conceptual framework and technical criteria required by national legislation, and to ensure a sufficiently effective system against the attacks defined in the Design Basis Threat for the installation, guidelines are provided to assist the Designers and Operators of the Physical Protection System. The study introduces the nuclear power plant’s defense related key national legislation and basic terms, in accordance with international agreements and recommendations.

Ákos Bunyitai
Hungarian Regulation of Personnel Entry Control to Nuclear Power Plant II

A critical infrastructure’s protection is a key element in a State’s defense strategy. In Hungary, the minimum requirements for the physical protection of nuclear power plants are strictly regulated. The study presents the minimum requirements for personnel entry control into the complex protection system of nuclear power plants through national legislation and guidance documents, with reference to international guidance documents, standards and scientific publications.

Ákos Bunyitai
Connections Enabling Command and Control

In the advent of the 5th generation wire and wireless networks’ development, it is advisable to elaborate the technical procedures available for the better understanding the network parameters designed in the IMT-2020 recommendations as well as considering the need of those in processing the signal sequence from the space segment. In this essay, I am going to identify specific requirements for the extension of 5th generation telecommunications networks for the space segment.

Attila Gulyás
Legal Aspects of Network Security

In this article, we will examine some of the international- EU- and Hungarian legal frameworks for network security, summarize them and outline possible directions so that the legal regulations can adapt as quickly as possible to the new technologies and challenges emerging as a result of the ever-accelerating technical development. In today’s world, data, information technology and network security are closely intertwined concepts, which is why the legal regulations mostly treat them together, so the topic of our investigation is also aligned with this.

Levente Durczy, Kornélia Lazányi, Zsolt Sziklai, András Molnár
Thoughts on the Place and Role of Cybersecurity Awareness

The present paper examines the main aspects and main elements of the generally visible manifestations of cybersecurity awareness related to the human factor. Today’s modern info-communication solutions have opened up new opportunities and directions in this field, which can increase the efficiency of related activities and indirectly strengthen the human side of cybersecurity. The awareness itself goes beyond the traditional role of training or compliance with existing requirements in the regulatory environment, as the ultimate goal is to create an expectation of more security-aware thinking and behaviour. Numerous studies and surveys emphasize that, in the corporate or public sector, threats related to human resources are of particular importance. At the same time, various solutions for defence and cyber security awareness, as well as possibilities for increasing efficiency, are receiving more and more attention.

Imre Dobak, Sandor Magyar
Social and Ethical Issues of the Military Use of Artificial Intelligence

Thanks to machine learning algorithms, computers can now also perform military tasks. Accordingly, the starting question of the research is whether we should definitely examine the social, ethical, and legal issues arising during military use, as well as other human aspects of Artificial Intelligence (AI). The starting point for the investigation was the analysis of the countries’ AI strategies and related documents. In the study, we did not go into the analysis of the current situation, we only focused on the starting points. Based on what was described, we created an opportunity to carry out further analyses.

Imre Négyesi
Quantum Computers—Security Threats and Solutions

This article discusses the potential of quantum computers to revolutionize many areas of science and technology, including cryptography. While traditional IT security relies on encryption algorithms to safeguard data and authentication processes, quantum computers pose a threat to this security by their ability to perform mathematical operations much faster than classical computers, potentially breaking encryption algorithms such as RSA and Elliptic Curve Cryptography (ECC). Brute-force attacks and cryptanalytic attacks are two main approaches for attackers to exploit vulnerabilities or weaknesses in a system or network, but quantum computers may increase their efficacy to a level that poses a significant risk to IT security. The article also highlights the need for quantum-resistant encryption algorithms to address these potential security threats and discusses blockchain as a potential alternative approach to increasing security of IT systems.

Sára Szatmáry
Are Self-driving Cars a Safer Solution?

Traffic accidents result in the death of approximately 1.3 million people each year. The occurrence of these crashes is influenced by both human behaviour and environmental factors. Therefore, it is important to address these factors and promote safe driving behaviours to reduce the risk of accidents and improve road safety. One potential solution to the problem might be provided by autonomous technology. Self-driving cars can greatly improve road safety by eliminating human errors that lead to accidents such as speeding, distracted driving, and driving under the influence of alcohol or drugs. They are equipped with advanced sensors and technologies that can detect and respond to potential hazards more quickly and effectively than a human driver. Additionally, they can ensure that all passengers are wearing seat belts and can even enforce the use of child restraints. Self-driving cars have the potential to reduce the number of accidents caused by poor road design and reckless driving and can be programmed to obey traffic laws. Despite advances in self-driving car technology, challenges such as safety concerns, infrastructure and regulatory development, and public trust in the technology remain significant obstacles that must be addressed before widespread deployment can be achieved. This study aims to assess the safety and the perception thereof of self-driving cars compared to traditional vehicles by analysing relevant international literature and official data on the topic.

Rozália Szatmáry, Kornélia Lazányi
Neuro-fuzzy Vulnerability Evaluation According to Excellence Criteria

A method is presented for the evaluation of the effects of the vulnerabilities on corporate assets. An AI assistant performs this evaluation using the knowledge bases of state- and professional authorities (e.g.: the national banks, the European Banking Association—EBA). This AI assistant gives advice on the vulnerabilities reported by the users relying on ISACA, ISO, and NIST standards. Fuzzy metrics evaluate the individual vulnerabilities. The countermeasures are classified according to the targeted operational excellence criteria using the three pillars of corporate operations.

Bence Tureczki, Katalin Szenes
Investigating the Effect of Adding Multiwalled Carbon Nanotubes on the Morphological Properties of Polybutylene Terephthalate

The effect of reinforcement with multi-walled carbon nanotubes (MWCNTs) on the crystallization behavior at non-isothermal melting of polybutylene terephthalate (PBT) was studied using a differential scanning calorimetry at the following cooling rates 2, 5, 10, 20 °C/min, after preparing the samples by adding different ratios of MWCNTs to PBT 0.2, 0.4, 0.6, 0.8, 1, 1.2 wt% using extrusion connected to the mixer. In general, the results showed that the addition of carbon nanotubes led to an improvement in the crystallization rate, a higher crystallization initiation temperature and a crystallization peak temperature. With the increase in the content of MWCNTs, the exothermic peaks became wider. On the other hand, the rise in the cooling rate caused a decrease in the temperature of these peaks. Moreover, it was observed from the results that the presence of MWCNTs made crystallization start at an early stage because these CNTs acted as a strong nucleating agent that enhanced the nucleation of PBT when compared to neat PBT. It also gave a large area for crystal growth thus the structure of PBT became more stable. Furthermore, this addition influenced the properties of the polymer because of increasing the amount of crystallization, where the results indicated that the enthalpy of melting increased with the increase in the rate of addition, but this increase reduced with the increase in the cooling rate. These results show the clear interfere of carbon nanotubes in the polymer matrix.

Zoubeida Taha, Andrea Ádámné Major
An Analysis of What e-Administration Information Security Means in Hungary

The term “public services” refers to activities involving producing public goods and related services that create economic value, such as healthcare, water supply, law enforcement, public safety, education, or environmental protection. Most of these current services have an internet-based interface suitable for e-government. Transferring the operation of these services from physical to online creates new kinds of opportunities that malicious actors can exploit for their purposes. The digital transformation of public services highlights the need for extensive expertise in cybersecurity, data and knowledge sharing, and synergistic collaborations of all stakeholders to achieve high-quality information security. This paper analyses what information security means for e-administration in Hungary today and the related legal framework.

Marianna Ádám, Vid Sebestyén Honfi, Zsolt Illési, Pál Bárkányi
An Algorithm for Determining the Parameters of Oil Spill Fire

Many emergency situations that arise in chemical, processing and transport industries are resulted from the emergency spill and ignition of flammable liquid. In this case, the spread of fire to neighboring objects represents a particular danger. Therefore, the elaboration of the fire-fighting measures requires taking into account the heat flow of the fire and as a result the information is needed on the shape and area of the spill. The model was constructed to determine the liquid spread dynamics and this model represents the system of differential equations. The first equation is of a parabolic type and it describes the liquid spread taking into consideration its consumption for infiltration, filling surface asperities and the burnout. Surface asperities are taken into consderation by the term equation that includes an average depth of asperities. To define the spill area we need to take into account the amount of the liquid required for the filling of those asperities during the liquid spill. The second equation is an ordinary differential equation and it describes the infiltration of liquid into the depth of the ground. Consideration was given to the instantaneous and continuous types of spill. The first type of spill occurs in the case of the catastrophic collapse of the liquid-containing tank and the second type is peculiar for the tank or pipeline damages. The finite difference method was used for the equation system solution. The developed algorithm enables the definition of the spill area, dynamics of its change and the liquid layer thickness.

Oliinik Volodymyr
Cyber Security Challenges in Construction

Today, one of the greatest business assets of any Company is in-formation: business secrets, customer data, business plans, internal knowledge about developments and projects. In-formation and the knowledge base based on it is one of the most important assets without which it is impossible to conduct business and remain competitive. Corporate information is an intellectual asset that is coveted by others: competing states and business rivals, and in extreme cases, criminal circles and terrorist organizations. Industrial espionage is an existing story. Security is an approach that is about nothing less than discipline. It is about discipline. For workers to comply, that discipline has to be written down, what exactly they have to comply with, they have to be held to account, because people do what they do not out of malice, but because we have not defined the rules. The IT systems in the construction sector are also undergoing significant development, responding to changes and developments in the outside world, in order to be competitive and effective in meeting organizational objectives and basic tasks. Responding to threats from cyberspace cannot be achieved on an ad-hoc basis by dealing with the consequences, but requires a strong focus on prevention. Therefore, strategic thinking is of utmost importance in the construction sector.

Nikolett Katalin Bús, Zoltán Nyikes
Human Dynamics in Armed Conflicts

Armed conflicts are characterized by a multitude of human dynamics influenced by cultural, social, political, and psychological factors that impact behaviour, decision-making, and interactions during conflicts. This understanding is critical in providing effective support to military personnel exposed to high-stress and high-risk situations. Combat exposure can lead to mental health issues such as PTSD, depression, and anxiety, with social hierarchies and organizational culture within the military adding tension and unease. In line with this, military leadership requires a different set of skills, experiences, and perspectives than business-related leadership. The leader-subordinate relationship in military settings is influenced by shared goals, communication, training and development, feedback and recognition, organizational culture, and trust. Trust can be an effective proxy for control in armed personnel when certain conditions are met, however, the operation of well-established monitoring systems is essential to ensure compliance with legal and ethical standards. The article emphasizes the need for a tailored approach to leadership in the military, taking into account specific circumstances and external factors that may influence the relationship between leaders and subordinates.

Kornélia Lazányi
Metadata
Title
Critical Infrastructure Protection in the Light of the Armed Conflicts
Editors
Tünde Anna Kovács
Zoltán Nyikes
Tamás Berek
Norbert Daruka
László Tóth
Copyright Year
2024
Electronic ISBN
978-3-031-47990-8
Print ISBN
978-3-031-47989-2
DOI
https://doi.org/10.1007/978-3-031-47990-8